Zeljka Zorz
![user](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100823/user-400x200.jpg)
Cybercriminals using fake job listings to steal money, info from applicants
Be extra careful when looking for a job online, the Internet Crime Complaint Center (IC3) warns: cybercriminals are using fake job listings to trick applicants into sharing …
![Apple privacy](https://img.helpnetsecurity.com/wp-content/uploads/2019/11/09092722/apple-privacy-400x200.jpg)
Did Apple drop end-to-end encrypted iCloud backups because of the FBI?
Two years ago, Apple abandoned its plan to encrypt iPhone backups in the iCloud in such a way that makes it impossible for it (or law enforcement) to decrypt the contents, a …
![Honeywell](https://img.helpnetsecurity.com/wp-content/uploads/2020/01/22114743/honeywell-logo-red-400x200.jpg)
Honeywell Maxpro VMS/NVR systems vulnerable to hijacking
Honeywell’s Maxpro VMS and NVR, network video recorders and video management systems deployed in commercial, manufacturing and energy facilities around the world, sport …
![Internet Explorer](https://img.helpnetsecurity.com/wp-content/uploads/2020/01/21163538/ie-tunnel-400x200.jpg)
Micropatch simulates workaround for recent zero-day IE flaw, removes negative side effects
ACROS Security has released a micropatch that implements the workaround for a recently revealed actively exploited zero-day RCE flaw affecting Internet Explorer …
![Citrix](https://img.helpnetsecurity.com/wp-content/uploads/2020/01/09121726/citrix-logo-1-400x200.jpg)
First patches for the Citrix ADC, Gateway RCE flaw released
As attackers continue to hit vulnerable Citrix (formerly Netscaler) ADC and Gateway installations, Citrix has released permanent fixes for some versions and has promised to …
![Mitsubishi](https://img.helpnetsecurity.com/wp-content/uploads/2020/01/21123750/mitsubishi-logo-stars-400x200.jpg)
Mitsubishi Electric discloses data breach, possible data leak
Japanese multinational Mitsubishi Electric has admitted that it had suffered a data breach some six months ago, and that “personal information and corporate confidential …
![code](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095702/code-magnify-400x200.jpg)
Microsoft Application Inspector: Check open source components for unwanted features
Want to know what’s in an open source software component before you use it? Microsoft Application Inspector will tell you what it does and spots potentially unwanted …
![Facebook](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102441/facebook-400x200.jpg)
Facebook users will be notified when their credentials are used for third-party app logins
Facebook will (finally!) explicitly tell users who use Facebook Login to log into third-party apps what information those apps are harvesting from their FB account. At the …
![Google Smart Lock](https://img.helpnetsecurity.com/wp-content/uploads/2020/01/15133748/google-smart-lock-phone-400x200.jpg)
High-risk Google account owners can now use their iPhone as a security key
Google users who opt for the Advanced Protection Program (APP) to secure their accounts are now able to use their iPhone as a security key. About Google’s Advanced Protection …
![Kubernetes](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093637/kubernetes2-400x200.jpg)
Kubernetes bug bounty program open to anyone, rewards up to $10,000
The Cloud Native Computing Foundation is inviting bug hunters to search for and report vulnerabilities affecting Kubernetes. Offered bug bounties range between $100 to …
![patch](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093958/patch3-400x200.jpg)
January 2020 Patch Tuesday: Microsoft nukes Windows crypto flaw flagged by the NSA
As forecasted, January 2020 Patch Tuesday releases by Microsoft and Adobe are pretty light: the “star of the show” is CVE-2020-0601, a Windows flaw flagged by the …
![OWASP](https://img.helpnetsecurity.com/wp-content/uploads/2020/01/14114243/owasp1-400x200.jpg)
Security pitfalls to avoid when programming using an API
OWASP’s API Security Project has released the first edition of its top 10 list of API security risks. The most common and perilous API security risks API abuse is an …