searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
  • (IN)SECURE Magazine

iOS

Get our top stories in your inbox

How hard is it to address Apple’s in-app deletion requirements and implement privacy compliance?

March 30, 2022

Transcend released the results of its latest survey of technology decision makers, which assessed their readiness for Apple’s in-app deletion requirements for iOS apps that …

Apple fixes actively exploited iOS, macOS zero-day (CVE-2022-22620)

February 11, 2022

Another month, another zero-day (CVE-2022-22620) exploited in the wild that has been fixed by Apple. About CVE-2022-22620 CVE-2022-22620 is a use after free issue in WebKit, …

February 2022 Patch Tuesday forecast: A rough start for 2022

February 4, 2022

January 2022 Patch Tuesday was a rough one for Microsoft — and us. In the week following Patch Tuesday, Microsoft was forced to pull and subsequently re-issue several updates …

Apple fixes security feature bypass in macOS (CVE-2021-30892)

October 29, 2021

Apple has delivered a barrage of security updates for most of its devices this week, and among the vulnerabilities fixed are CVE-2021-30892, a System Integrity Protection …

Apple fixes iOS zero-day exploited in the wild (CVE-2021-30883)

October 12, 2021

With the newest iOS and iPad updates, Apple has fixed another vulnerability (CVE-2021-30883) that is being actively exploited by attackers. About CVE-2021-30883 CVE-2021-30883 …

Skyflow Fintech Privacy Vault accelerates product development for software teams

October 9, 2021

Skyflow announced a new zero trust data privacy vault that allows software teams to build and ship next-generation financial apps and systems faster. The new Fintech Privacy …

CommScope introduces ARRIS SURFboard G34 and G36 DOCSIS 3.1 cable modem and Wi-Fi 6 routers

October 6, 2021

The technological innovation running through homes today demands incredible bandwidth, speed, and a strong network connection. To meet those increasing demands CommScope …

Approov offers free pinning generator tool to protect against automated attacks on APIs

October 1, 2021

Approov introduced the Mobile Certificate Pinning Generator, a free tool to help mobile-first companies make Man-in-the-Middle (MitM) attacks targeting mobile app APIs a thing …

A new zero-day is being exploited to compromise Macs (CVE-2021-30869)

September 24, 2021

Another zero-day in Apple’s software (CVE-2021-30869) is being actively exploited by attackers, forcing the company to push out security updates for macOS Catalina and …

McAfee’s online protection service protects information across all online activities

September 22, 2021

McAfee launched its online protection service providing personalized and unified experiences focused on identity and privacy – the protection areas that matter most to …

Apple fixes “zero-click” iMessage zero-day exploited to deliver spyware (CVE-2021-30860)

September 14, 2021

Apple has released security updates for macOS, iOS, iPadOS, watchOS and Safari that patch two vulnerabilities (CVE-2021-30860, CVE-2021-30858) that are being exploited in …

JumpCloud raises $159M to accelerate expansion of its cloud directory platform

September 14, 2021

JumpCloud announced a $159M series F round led by Sapphire Ventures with additional participation from Owl Rock, Whale Rock Capital, Sands Capital, and Endeavor Catalyst. …

Posts navigation

1 2 3 4 5 … 30

Featured news

  • Taking the right approach to data extortion
  • You should be able to trust organizations that handle your personal data
  • VMware issues critical fixes, CISA orders federal agencies to act immediately (CVE-2022-22972)
Easily migrate to the cloud with CIS Hardened Images

What's new

Taking the right approach to data extortion

What does prioritizing cybersecurity at the leadership level entail?

Vishing cases reach all time high

Paying the ransom is not a good recovery strategy

Don't miss

Taking the right approach to data extortion

What does prioritizing cybersecurity at the leadership level entail?

You should be able to trust organizations that handle your personal data

3 key elements to protect a Kubernetes cluster

Ransomware still winning: Average ransom demand jumped by 45%

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Newsletters
  • Product showcase
  • Twitter

In case you’ve missed it

  • Data centers on steel wheels: Can we trust the safety of the railway infrastructure?
  • Good end user passwords begin with a well-enforced password policy
  • Keep your digital banking safe: Tips for consumers and banks
  • Is cybersecurity talent shortage a myth?

(IN)SECURE Magazine ISSUE 71 (March 2022)

  • Why security strategies need a new perspective
  • The evolution of security analytics
  • Open-source code: How to stay secure while moving fast
Read online
© Copyright 1998-2022 by Help Net Security
Read our privacy policy | About us | Advertise