![iPhone 8](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102600/iphone8-400x200.jpg)
The tools criminals use to prepare a stolen iPhone for resale
Reselling stolen mobile phones is a lucrative business all over the globe, and iPhones are very much in demand. Whether lost or stolen, the iPhones are often locked by their …
![Medigate](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102630/medigate-400x200.jpg)
Medigate announces $5.35M seed round to protect connected medical devices
Israeli startup Medigate today announced $5.35 million in seed funding for its mission to secure the use of the millions of connected medical devices on healthcare provider …
![Foscam C1 HD](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102614/Foscam-C1-HD-400x200.jpg)
Critical flaws open Foscam C1 IP cameras to compromise
Cisco Talos researcher Claudio Bozzato has unearthed a dozen of critical vulnerabilities affecting the Foscam C1 series of indoor HD cameras. The Foscam C1 is one of the most …
![world](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105959/world-400x200.jpg)
Governments manipulate social media, threaten global Internet freedom
Governments around the world are dramatically increasing their efforts to manipulate information on social media, threatening the notion of the Internet as a liberating …
![gift](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105817/gift-400x200.jpg)
This year’s most hackable holiday gifts
McAfee announced its third annual Most Hackable Holiday Gifts list to help consumers identify potential security risks associated with popular gifts this holiday season. In …
![Android](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105803/android-1-400x200.jpg)
Google will remove apps that misuse Android Accessibility Services from Google Play
Android app developers whose offerings implement Accessibility Services for reasons other that helping users with disabilities use their apps have less then 30 days to switch …
![skull](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102623/skull-400x200.jpg)
IcedID: Original new banking Trojan emerges
IcedID, a new banking Trojan that does not seem to have borrowed code from other similar threats, has entered the financial cybercrime arena. It was first spotted in the wild …
![Lovense](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102627/lovense-app-400x200.jpg)
Teledildonics maker Lovense fixes bug to delete recordings of user sessions from phones
Late last week, a Reddit user took to the popular discussion site to reveal that the app that is used to control remote control sex toys made by Lovense “seems to be …
![GDPR CCTV](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102636/gdpr-cctv-400x200.jpg)
Is your CCTV system GDPR compliant?
Organisations are putting themselves at risk of breaching the GDPR because they’re failing to realise that the new regulation covers their CCTV systems and the visual data …
![euro](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194908/euro-400x200.jpg)
EMEA IT spending to exceed $1 trillion in 2018
IT spending in EMEA is projected to total $1 trillion in 2018, an increase of 4.9 percent from estimated spending of $974 billion in 2017, according to the latest forecast by …
![hands](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102804/hands-400x200.jpg)
Week in review: Top GDPR compliance risks, DDE attack mitigations, Node.js security
Here’s an overview of some of last week’s most interesting news and articles: Infosec expert viewpoint: Vulnerability patching Vulnerability patching is one of the …
![CIA](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104853/cia-400x200.jpg)
Vault 8: WikiLeaks starts releasing source code of alleged CIA cyber weapons
WikiLeaks is starting a new series of leaks, dubbed Vault 8, containing source code and materials allegedly stolen from the CIA. The Vault 8 leaks will ostensibly cover …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage