![mobile](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114042/mobile-400x200.jpg)
Apple updates its products, fixes iMessages zero-day
On Monday Apple has pushed out updates for its many products: iOS, OS X, OS X Server, Safari, watchOS, tvOS, and Xcode. Of these, the most eagerly awaited was that for iOS, as …
![password](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195208/password-400x200.jpg)
Growing security negligence in the workplace
A surprising disconnect exists between employees’ growing concern over the security of their personal information and their attitudes toward data security practices in …
![mobile payment encryption attack](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113448/mobile-payment-encryption-attack-400x200.jpg)
Encryption securing money transfers on mobile phones can be broken
A group of researchers has proved that it is possible to break the encryption used by many mobile payment apps by simply measuring and analysing the electromagnetic radiation …
![criminal](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113635/criminal-400x200.png)
Carbanak cyber-thieves’ newest attacks exposed
The infamous Carbanak group is again doing what it does best: attacks and compromises financial institutions, and tries to steal as much money as possible from them by taking …
![Apple Store](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194248/apple-store-400x200.jpg)
iOS zero-day breaks Apple’s iMessage encryption
A team of Johns Hopkins University researchers headed by computer science professor Matthew Green have discovered a zero-day flaw in Apple’s iOS encryption, which could …
![analytics IT assets](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09113947/analytics-400x200.jpg)
Google offers binary comparison tool BinDiff for free
In case you missed it, Google announced on Friday that BinDiff, a comparison tool for binary files, can now be downloaded for free. The tool is used to spot differences and …
![](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195728/laptop-eyes-technology-computer-400x200.jpg)
Insider threat protection with the DB Networks DBN-6300
Many high profile database breaches have resulted from the abuse of legitimate logon credentials. Identifying these apparent “insider threats” requires a new …
![Keyboard](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195309/keyboard3-400x200.jpg)
Lynis 2.2.0: New features, tests, and enhancements
Lynis is a popular open source security auditing tool, used to evaluate the security defenses of their Linux/Unix-based systems. It runs on the host itself, so it performs …
![light](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194851/light-400x200.jpg)
Demand for advanced DDoS mitigation on the rise
The increasing popularity of DDoS attacks as a tool to disrupt, harass, terrorize and sabotage online businesses is boosting demand for mitigation solutions. In the face of …
![world in hand](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194240/world-hand-400x200.jpg)
Week in review: Android adware infiltrates devices’ firmware, malvertising hits big Internet players, iOS design flaw lets malware in
Week in review: Android adware infiltrates devices’ firmware, malvertising hits big Internet players, iOS design flaw lets malware in Here’s an overview of some of last …
![car swerving hacking](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113500/road-sign-663362_1920-400x200.jpg)
It’s official: The FBI says car hacking is a real risk
With a public service announcement compiled jointly with the Department of Transportation and the National Highway Traffic and Safety Administration, the FBI has announced …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111204/twitter-android2-400x200.png)
Android adware infiltrates devices’ firmware, Trend Micro apps
Dubbed Gmobi by Dr. Web researchers, the malware comes in the form of a software development kit (SDK), and has been found in several legitimate applications by well-known …
Featured news
Sponsored
Don't miss
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days
- SSHamble: Open-source security testing of SSH services
- Traceeshark: Open-source plugin for Wireshark