OS X Yosemite's Spotlight Suggestions: Privacy killer or not?

Posted on 21 October 2014.  |  Spotlight can now also be used to make searches on the Internet, and it sends the users' search queries and information about their physical location to Apple.

China executes MITM attack against iCloud and Microsoft account holders

Posted on 20 October 2014.  |  China-based Internet users are in danger of getting their iCloud and Windows Live accounts hijacked.

Beware of Ebola-themed phishing, malware campaigns and hoaxes

Posted on 17 October 2014.  |  US-CERT released an advisory warning users about email scams and cyber campaigns using the Ebola virus disease as a theme.

Easily exploitable Drupal bug can lead to total site compromise

Posted on 16 October 2014.  |  Admins of sites that run Drupal 7 are advised to update to the latest version of the platform because it fixes a critical vulnerability.

Lessons learned developing Lynis, an open source security auditing tool

Posted on 15 October 2014.  |  Lynis unearths vulnerabilities, configuration errors, and provides tips for system hardening.

Spotlight

Staples customers likely the latest victims of credit card breach

Posted on 21 October 2014.  |  Multiple banks say they have identified a pattern of credit and debit card fraud suggesting that several Staples Inc. office supply locations in the Northeastern United States are currently dealing with a data breach.


What's New
Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Wed, Oct 22nd
Events
McAfee FOCUS 14
27 October - 29 October 2014.
INTERPOL World 2015
14 April - 16 April 2015.

Editor's choice

Delivering malicious Android apps hidden in image files

21 October 2014. | Researchers have found a way to deliver a malicious app to Android users by hiding it into what seems to be an encrypted image file.

OS X Yosemite's Spotlight Suggestions: Privacy killer or not?

21 October 2014. | Spotlight can now also be used to make searches on the Internet, and it sends the users' search queries and information about their physical location to Apple.

The Software Assurance Marketplace: A response to a challenging problem

20 October 2014. | The DHS Science and Technology Directorate has recognized how critical the state of software security is to the DHS mission.

Beware of Ebola-themed phishing, malware campaigns and hoaxes

17 October 2014. | US-CERT released an advisory warning users about email scams and cyber campaigns using the Ebola virus disease as a theme.

Tips for mitigating the financial impact of identity theft

16 October 2014. | Here are some practical tips on how consumers can better prepare for the likelihood of having their identity stolen.

Developing Lynis, an open source security auditing tool

15 October 2014. | Lynis unearths vulnerabilities, configuration errors, and provides tips for system hardening.

Detecting cyber attacks in a mobile and BYOD organization

14 October 2014. | Many organizations understand that traditional perimeter security defenses are not effective at identifying attacks on mobile devices.


    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //