Zeljka Zorz
![Xiaomi](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110559/xiaomi-400x200.jpg)
Xiaomi smartphones come equipped with backdoor
When you buy a new mobile device with certain apps already pre-installed on, you’re effectively forced to trust that the device maker or reseller (depending on who …
![iCloud spam](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110604/icloud_spam-400x200.jpg)
Mobile users actively spammed from compromised iCloud accounts
Spammers have been compromising North American Apple users’ iCloud accounts, and using them to send spammy text messages to mobile users in China. The messages advertise …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195446/cisco-400x200.jpg)
BENIGNCERTAIN-like flaw affects various Cisco networking devices
The leaking of BENIGNCERTAIN, an NSA exploit targeting a vulnerability in legacy Cisco PIX firewalls that allows attackers to eavesdrop on VPN traffic, has spurred Cisco to …
![power meter](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110611/power_meter-400x200.jpg)
ICS-CERT warns of remotely exploitable power meter flaws
Two remotely exploitable vulnerabilities, one of which can lead to remote code execution, have been found in Schneider Electric’s ION Power Meter products and FENIKS PRO Elnet …
![Pokemon Go](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111556/pokemon_go-400x200.jpg)
Bogus Pokémon GO guide app roots Android devices
The popularity of Pokémon GO is apparently on the wane, but there are still more than enough players to make it a good lure for cyber crooks. In fact, fake apps like the …
![Eyes](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112400/laptop-eyes-technology-computer-400x200.jpg)
What proposed Rule 41 changes mean for your privacy
Last week, US Senator Ron Wyden took the floor of the Senate to explain why his (and his colleagues’) Stopping Mass Hacking Act should be voted in. The bill, consisting …
![Adobe AIR](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110618/adobe_air-400x200.jpg)
Android apps based on Adobe AIR SDK send out unencrypted data
Developers using the Adobe AIR SDK should update to the latest version of the software development kit and rebuild the apps as soon as possible if they don’t want their …
![Google Nexus](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110621/google-nexus56-400x200.jpg)
Hack a Nexus from afar, get $200,000
Google has issued a challenge to bug hunters around the world: find a vulnerability or bug chain that achieves remote code execution on multiple Android devices knowing only …
![American Express](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110623/amex-400x200.jpg)
Amex users hit with phishing email offering anti-phishing protection
American Express users are being actively targeted with phishing emails impersonating the company and advising users to create an “American Express Personal Safe …
![ClixSense](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110626/clixsense-400x200.jpg)
6.6 million ClixSense users exposed in wake of site, company hack
If you’ve ever registered with ClixSense – and millions have – you can consider all your personal information shared with the service compromised. The …
![Chevrolet Suburban](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110628/chevrolet-suburban-interior-400x200.jpg)
GM recalls 3.6 million cars due to potentially fatal software defect
Last Friday, General Motors has announced that the owners of some 3.64 million of its vehicles will have to come in for a re-flash of their sensing and diagnostic module (SDM) …
![city](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110636/city-400x200.jpg)
Improve SecOps by making collaboration easier
There’s one word that we’ve consistently been hearing from information security pundits year after year: Collaboration. More often than not, they were talking …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality