<!DOCTYPE html>
<html lang="en-US"
	itemscope 
	itemtype="http://schema.org/Article" 
	prefix="og: http://ogp.me/ns#" >
<head>
	<meta charset="UTF-8" />
	<meta name="viewport" content="width=device-width, initial-scale=1.0" />
	<link rel="profile" href="http://gmpg.org/xfn/11" />
	<link rel="pingback" href="https://www.itsecuritynews.info/xmlrpc.php" />
	<!--[if IE]><script src="https://www.itsecuritynews.info/wp-content/themes/magazine-basic/library/js/html5.js"></script><![endif]-->
	<title>Apple Accepting Donations for Hurricane Harvey Relief Efforts | | IT Security News</title>

<!-- All in One SEO Pack 2.4.4.1 by Michael Torbert of Semper Fi Web Design[491,584] -->
<meta name="keywords"  content="autopost,macrumors: mac news and rumors - front page" />

<link rel="canonical" href="https://www.itsecuritynews.info/apple-accepting-donations-for-hurricane-harvey-relief-efforts/" />
<meta property="og:title" content="Apple Accepting Donations for Hurricane Harvey Relief Efforts | | IT Security News" />
<meta property="og:type" content="article" />
<meta property="og:url" content="https://www.itsecuritynews.info/apple-accepting-donations-for-hurricane-harvey-relief-efforts/" />
<meta property="og:image" content="https://www.itsecuritynews.info/wp-content/plugins/all-in-one-seo-pack/images/default-user-image.png" />
<meta property="og:site_name" content="IT Security News" />
<meta property="og:description" content="Apple has added banners to its United States website and iTunes Store in an effort to encourage its customers to donate to those affected by Hurricane Harvey. Similar to past relief efforts, users can choose to donate $5, $10, $25, $50, $100, or $200, and Apple will transfer 100 percent of the proceeds to the American Red Cross, which is providing relief efforts for people in the path of Hurricane Harvey. All donations will be processed as normal iTunes purchases through a connected Apple ID. Apple CEO Tim Cook tweeted about the donations early this morning, as rescue workers in Houston and other parts of southeast Texas attempt to help residents trapped in their homes by &quot;catastrophic flooding.&quot; Harvey made landfall late Friday night as a Category 4 hurricane and has since been downgraded to a tropical storm, which is expected to stay in the region over the next few days. Prayers for Texas and all those affected by #HurricaneHarvey. Join us in the" />
<meta property="article:published_time" content="2017-08-27T16:07:38Z" />
<meta property="article:modified_time" content="2017-08-27T16:07:38Z" />
<meta name="twitter:card" content="summary" />
<meta name="twitter:title" content="Apple Accepting Donations for Hurricane Harvey Relief Efforts | | IT Security News" />
<meta name="twitter:description" content="Apple has added banners to its United States website and iTunes Store in an effort to encourage its customers to donate to those affected by Hurricane Harvey. Similar to past relief efforts, users can choose to donate $5, $10, $25, $50, $100, or $200, and Apple will transfer 100 percent of the proceeds to the American Red Cross, which is providing relief efforts for people in the path of Hurricane Harvey. All donations will be processed as normal iTunes purchases through a connected Apple ID. Apple CEO Tim Cook tweeted about the donations early this morning, as rescue workers in Houston and other parts of southeast Texas attempt to help residents trapped in their homes by &quot;catastrophic flooding.&quot; Harvey made landfall late Friday night as a Category 4 hurricane and has since been downgraded to a tropical storm, which is expected to stay in the region over the next few days. Prayers for Texas and all those affected by #HurricaneHarvey. Join us in the" />
<meta name="twitter:image" content="https://www.itsecuritynews.info/wp-content/plugins/all-in-one-seo-pack/images/default-user-image.png" />
<meta itemprop="image" content="https://www.itsecuritynews.info/wp-content/plugins/all-in-one-seo-pack/images/default-user-image.png" />
			<script type="text/javascript" >
				window.ga=window.ga||function(){(ga.q=ga.q||[]).push(arguments)};ga.l=+new Date;
				ga('create', 'UA-44626150-1', 'auto');
				// Plugins
				ga('require', 'displayfeatures');
				ga('send', 'pageview');
			</script>
			<script async src="https://www.google-analytics.com/analytics.js"></script>
			<!-- /all in one seo pack -->
<link rel='dns-prefetch' href='//s0.wp.com' />
<link rel='dns-prefetch' href='//secure.gravatar.com' />
<link rel='dns-prefetch' href='//fonts.googleapis.com' />
<link rel='dns-prefetch' href='//s.w.org' />
<link rel="alternate" type="application/rss+xml" title="IT Security News &raquo; Feed" href="https://www.itsecuritynews.info/feed/" />
<link rel="alternate" type="application/rss+xml" title="IT Security News &raquo; Comments Feed" href="https://www.itsecuritynews.info/comments/feed/" />
		<script type="text/javascript">
			window._wpemojiSettings = {"baseUrl":"https:\/\/s.w.org\/images\/core\/emoji\/2.4\/72x72\/","ext":".png","svgUrl":"https:\/\/s.w.org\/images\/core\/emoji\/2.4\/svg\/","svgExt":".svg","source":{"concatemoji":"https:\/\/www.itsecuritynews.info\/wp-includes\/js\/wp-emoji-release.min.js?ver=4.9.3"}};
			!function(a,b,c){function d(a,b){var c=String.fromCharCode;l.clearRect(0,0,k.width,k.height),l.fillText(c.apply(this,a),0,0);var d=k.toDataURL();l.clearRect(0,0,k.width,k.height),l.fillText(c.apply(this,b),0,0);var e=k.toDataURL();return d===e}function e(a){var b;if(!l||!l.fillText)return!1;switch(l.textBaseline="top",l.font="600 32px Arial",a){case"flag":return!(b=d([55356,56826,55356,56819],[55356,56826,8203,55356,56819]))&&(b=d([55356,57332,56128,56423,56128,56418,56128,56421,56128,56430,56128,56423,56128,56447],[55356,57332,8203,56128,56423,8203,56128,56418,8203,56128,56421,8203,56128,56430,8203,56128,56423,8203,56128,56447]),!b);case"emoji":return b=d([55357,56692,8205,9792,65039],[55357,56692,8203,9792,65039]),!b}return!1}function f(a){var c=b.createElement("script");c.src=a,c.defer=c.type="text/javascript",b.getElementsByTagName("head")[0].appendChild(c)}var g,h,i,j,k=b.createElement("canvas"),l=k.getContext&&k.getContext("2d");for(j=Array("flag","emoji"),c.supports={everything:!0,everythingExceptFlag:!0},i=0;i<j.length;i++)c.supports[j[i]]=e(j[i]),c.supports.everything=c.supports.everything&&c.supports[j[i]],"flag"!==j[i]&&(c.supports.everythingExceptFlag=c.supports.everythingExceptFlag&&c.supports[j[i]]);c.supports.everythingExceptFlag=c.supports.everythingExceptFlag&&!c.supports.flag,c.DOMReady=!1,c.readyCallback=function(){c.DOMReady=!0},c.supports.everything||(h=function(){c.readyCallback()},b.addEventListener?(b.addEventListener("DOMContentLoaded",h,!1),a.addEventListener("load",h,!1)):(a.attachEvent("onload",h),b.attachEvent("onreadystatechange",function(){"complete"===b.readyState&&c.readyCallback()})),g=c.source||{},g.concatemoji?f(g.concatemoji):g.wpemoji&&g.twemoji&&(f(g.twemoji),f(g.wpemoji)))}(window,document,window._wpemojiSettings);
		</script>
		<style type="text/css">
img.wp-smiley,
img.emoji {
	display: inline !important;
	border: none !important;
	box-shadow: none !important;
	height: 1em !important;
	width: 1em !important;
	margin: 0 .07em !important;
	vertical-align: -0.1em !important;
	background: none !important;
	padding: 0 !important;
}
</style>
<link rel='stylesheet' id='app-banners-styles-css'  href='https://www.itsecuritynews.info/wp-content/plugins/appbanners/lib/smartbanner/jquery.smartbanner.min.css?ver=4.9.3' type='text/css' media='all' />
<link rel='stylesheet' id='google_fonts-css'  href='//fonts.googleapis.com/css?family=Cantata+One|Lato:300,700' type='text/css' media='all' />
<link rel='stylesheet' id='theme_stylesheet-css'  href='https://www.itsecuritynews.info/wp-content/themes/magazine-basic/style.css?ver=4.9.3' type='text/css' media='all' />
<link rel='stylesheet' id='font_awesome-css'  href='https://www.itsecuritynews.info/wp-content/themes/magazine-basic/library/css/font-awesome.css?ver=4.3.0' type='text/css' media='all' />
<link rel='stylesheet' id='social-logos-css'  href='https://www.itsecuritynews.info/wp-content/plugins/jetpack/_inc/social-logos/social-logos.min.css?ver=1' type='text/css' media='all' />
<link rel='stylesheet' id='jetpack_css-css'  href='https://www.itsecuritynews.info/wp-content/plugins/jetpack/css/jetpack.css?ver=5.7.1' type='text/css' media='all' />
<script type='text/javascript' src='https://www.itsecuritynews.info/wp-includes/js/jquery/jquery.js?ver=1.12.4'></script>
<script type='text/javascript' src='https://www.itsecuritynews.info/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.4.1'></script>
<script type='text/javascript'>
/* <![CDATA[ */
var related_posts_js_options = {"post_heading":"h4"};
/* ]]> */
</script>
<script type='text/javascript' src='https://www.itsecuritynews.info/wp-content/plugins/jetpack/_inc/build/related-posts/related-posts.min.js?ver=20150408'></script>
<link rel='https://api.w.org/' href='https://www.itsecuritynews.info/wp-json/' />
<link rel="EditURI" type="application/rsd+xml" title="RSD" href="https://www.itsecuritynews.info/xmlrpc.php?rsd" />
<link rel="wlwmanifest" type="application/wlwmanifest+xml" href="https://www.itsecuritynews.info/wp-includes/wlwmanifest.xml" /> 
<link rel='prev' title='SAP vulnerability that may get you Macbook at $1' href='https://www.itsecuritynews.info/sap-vulnerability-that-may-get-you-macbook-at-1/' />
<link rel='next' title='How to Improve Return on Investment for Security Assistance' href='https://www.itsecuritynews.info/how-to-improve-return-on-investment-for-security-assistance/' />
<meta name="generator" content="WordPress 4.9.3" />
<link rel='shortlink' href='https://wp.me/p7hb5p-2aYa' />
<link rel="alternate" type="application/json+oembed" href="https://www.itsecuritynews.info/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.itsecuritynews.info%2Fapple-accepting-donations-for-hurricane-harvey-relief-efforts%2F" />
<link rel="alternate" type="text/xml+oembed" href="https://www.itsecuritynews.info/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwww.itsecuritynews.info%2Fapple-accepting-donations-for-hurricane-harvey-relief-efforts%2F&#038;format=xml" />
<meta name="apple-itunes-app" content="app-id=1136199454">
<meta name="google-play-app" content="app-id=com.appspotr.id_674269520101114955">
<meta name="author" content="www.ITSecurityNews.info">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<script data-cfasync="false" src="//load.sumome.com/" data-sumo-platform="wordpress" data-sumo-site-id="35393a038f26cd18d430102662c132eb98f4fe5e77a5bee3346b81c887c35f23" async></script>
<link rel='dns-prefetch' href='//v0.wordpress.com'/>
<link rel='dns-prefetch' href='//i0.wp.com'/>
<link rel='dns-prefetch' href='//i1.wp.com'/>
<link rel='dns-prefetch' href='//i2.wp.com'/>
<link rel='dns-prefetch' href='//widgets.wp.com'/>
<link rel='dns-prefetch' href='//s0.wp.com'/>
<link rel='dns-prefetch' href='//0.gravatar.com'/>
<link rel='dns-prefetch' href='//1.gravatar.com'/>
<link rel='dns-prefetch' href='//2.gravatar.com'/>
<style type='text/css'>img#wpstats{display:none}</style><style>
#site-title a,#site-description{color:#333 !important}
#page{background-color:#ffffff}
.entry-meta a,.entry-content a,.widget a{color:#3D97C2}
</style>
	<style type="text/css" id="custom-background-css">
body.custom-background { background-image: url("https://www.itsecuritynews.info/wp-content/themes/magazine-basic/library/images/solid.png"); background-position: left top; background-size: auto; background-repeat: repeat; background-attachment: scroll; }
</style>
<link rel="icon" href="https://i1.wp.com/www.itsecuritynews.info/wp-content/uploads/2014/02/cropped-itsecuritynews-1.png?fit=32%2C32&#038;ssl=1" sizes="32x32" />
<link rel="icon" href="https://i1.wp.com/www.itsecuritynews.info/wp-content/uploads/2014/02/cropped-itsecuritynews-1.png?fit=192%2C192&#038;ssl=1" sizes="192x192" />
<link rel="apple-touch-icon-precomposed" href="https://i1.wp.com/www.itsecuritynews.info/wp-content/uploads/2014/02/cropped-itsecuritynews-1.png?fit=180%2C180&#038;ssl=1" />
<meta name="msapplication-TileImage" content="https://i1.wp.com/www.itsecuritynews.info/wp-content/uploads/2014/02/cropped-itsecuritynews-1.png?fit=270%2C270&#038;ssl=1" />
<script>

var adArray = [];



adArray.push("<center><p><strong>Ad Blocker?</strong></p><br>It seems that you are using some ad blocking software which is preventing the page from fully loading.<br> Please whitelist this website or disable ad blocking software<br>
</center>");


</script>

</head>

<body class="post-template-default single single-post postid-518826 single-format-standard custom-background">
	<div id="page" class="grid  ">
		<header id="header" class="row" role="banner">
			<div class="c12">
				<div id="mobile-menu">
					<a href="#" class="left-menu"><i class="fa fa-reorder"></i></a>
					<a href="#"><i class="fa fa-search"></i></a>
				</div>
				<div id="drop-down-search"><form role="search" method="get" class="search-form" action="https://www.itsecuritynews.info/">
				<label>
					<span class="screen-reader-text">Search for:</span>
					<input type="search" class="search-field" placeholder="Search &hellip;" value="" name="s" />
				</label>
				<input type="submit" class="search-submit" value="Search" />
			</form></div>

								<div class="title-logo-wrapper fl">
										<div class="header-group">
												<div id="site-title"><a href="https://www.itsecuritynews.info" title="IT Security News" rel="home">IT Security News</a></div>
						<div id="site-description">News and articles about cyber security, information security, vulnerabilities, exploits, patches, releases, software, features, hacks, laws, spam, viruses, malware, trojans.</div>					</div>
				</div>

				
				<div id="nav-wrapper">
					<div class="nav-content">
						<nav id="site-navigation" class="menus clearfix" role="navigation">
							<h3 class="screen-reader-text">Main menu</h3>
							<a class="screen-reader-text" href="#primary" title="Skip to content">Skip to content</a>
							<div id="main-menu" class="menu-menu-container"><ul id="menu-menu" class="menu"><li id="menu-item-245738" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-245738"><a href="https://www.itsecuritynews.info/advertising/">Advertising</a>
<li id="menu-item-312705" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-312705"><a href="https://www.itsecuritynews.info/advertising/sponsors/">Sponsors</a>
<li id="menu-item-238892" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-238892"><a href="https://www.itsecuritynews.info/privacy-policy/">Privacy Policy</a>
<li id="menu-item-238890" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-has-children sub-menu-parent menu-item-238890"><a href="https://www.itsecuritynews.info/social-media/">Social Media</a>
<ul class="sub-menu">
	<li id="menu-item-247111" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-247111"><a href="https://www.itsecuritynews.info/social-media/connect/">Connect via</a>
	<li id="menu-item-238894" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-238894"><a href="https://www.itsecuritynews.info/social-media/subscribe-to-daily-summary/">Subscribe to Daily Summary</a>
	<li id="menu-item-238893" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-238893"><a href="https://www.itsecuritynews.info/social-media/latest/">Latest IT Security News</a>
	<li id="menu-item-245590" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-245590"><a href="http://www.itsecuritynews.info/category/daily-summary/">Daily Summary</a>
	<li id="menu-item-368212" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-368212"><a href="http://www.itsecuritynews.info/category/weekly-summary/">Weekly Summary</a>
	<li id="menu-item-369112" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-369112"><a href="http://www.itsecuritynews.info/category/monthly-summary/">Monthly Summary</a>
</ul>

<li id="menu-item-238891" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-238891"><a href="https://www.itsecuritynews.info/it-security-consulting/">IT Security Consulting</a>
<li id="menu-item-238885" class="menu-item menu-item-type-custom menu-item-object-custom menu-item-238885"><a href="http://de.itsecuritynews.info">IT Sicherheitsnews auf Deutsch</a>
<li id="menu-item-238889" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-238889"><a href="https://www.itsecuritynews.info/contact/">Contact</a>
<li id="menu-item-246936" class="menu-item menu-item-type-post_type menu-item-object-page menu-item-246936"><a href="https://www.itsecuritynews.info/app/">Mobile Apps</a>
</ul></div>						</nav><!-- #site-navigation -->

											</div>
				</div>

			</div><!-- .c12 -->
		</header><!-- #header.row -->

		<div id="main" class="row">
	<div id="primary" class="c8" role="main">
			<article id="post-518826" class="post-518826 post type-post status-publish format-standard hentry category-macrumors-mac-news-and-rumors-front-page tag-autopost tag-macrumors-mac-news-and-rumors-front-page">

	    <header>
    <h1 class="entry-title">Apple Accepting Donations for Hurricane Harvey Relief Efforts</h1>
    <div class="entry-meta">
        <time class="published" datetime="2017-08-27">27. August 2017</time>    </div>
</header>

	    <div class="entry-content">
		    <p>Apple has added banners to its <a href="https://www.apple.com/">United States website</a> and iTunes Store in an effort to encourage its customers to <a href="https://buy.itunes.apple.com/WebObjects/MZFinance.woa/wa/buyCharityGiftWizard">donate</a> to those affected by Hurricane Harvey.</p><div class='code-block code-block-1' style='margin: 8px 0; clear: both;'>
<div class="ad-affiliate"> 
<!-- Start the div affiliate -->


<!-- horizontal 728x90 -->

<script async src="//pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>

<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-5751281961085733"
     data-ad-slot="2185401342"></ins>
<script>
(adsbygoogle = window.adsbygoogle || []).push({});
</script>


</div>

<script>
jQuery(function ($) {
	if ($(".ad-affiliate").height() === 0) {
		$(".ad-affiliate").html(adArray[Math.floor(adArray.length * Math.random())]);
	}
});
</script></div>

<p><img data-attachment-id="584271" data-permalink="https://www.itsecuritynews.info/hitb-security-conference-in-amsterdam-to-feature-innovative-research-on-attack-and-defense-topics/" data-orig-file="" data-orig-size="" data-comments-opened="0" data-image-meta="[]" data-image-title="HITB Security Conference in Amsterdam to feature innovative research on attack and defense topics" data-image-description="&lt;p&gt;The agenda for Day 1 of the 9th annual HITB Security Conference in The Netherlands has been announced and it&#8217;s packed with cutting edge research on a range of attack and defense topics from crypto currencies to fuzzing and more. Invoke-DOSfuscation: Techniques FOR %F IN (-style) DO (S-level CMD Obfuscation) In this presentation, Daniel Bohannon, a Senior Applied Security Researcher with MANDIANT’s Advanced Practices group, will dive deep into cmd.exe’s multi-faceted obfuscation opportunities beginning with &#8230; &lt;a href=&quot;https://www.helpnetsecurity.com/2018/01/18/hitb2018ams-accepted-talks/&quot; rel=&quot;nofollow&quot;&gt;[&#8230;]&lt;/p&gt;
&lt;p&gt;&lt;!-- Script version:m1-11.11.2016 18:03 --&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://itsecuritynews.info/advertising&quot; target=_blank&gt;Advertise on IT Security News.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Read the complete article: &lt;a href=&quot;https://www.itsecuritynews.info/transfer.html?url=http://feedproxy.google.com/~r/HelpNetSecurity/~3/obNale3R3ok/&quot; target=_blank&gt;HITB Security Conference in Amsterdam to feature innovative research on attack and defense topics&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
" data-medium-file="" data-large-file="" alt="" class="aligncenter size-full wp-image-584271" height="605" src="https://i2.wp.com/cdn.macrumors.com/article-new/2017/08/hurricane-harvey-apple-donations.jpg?resize=752%2C605" width="752" data-recalc-dims="1" /><br />
<br />
Similar to past relief efforts, users can choose to donate &#36;5, &#36;10, &#36;25, &#36;50, &#36;100, or &#36;200, and Apple will transfer 100 percent of the proceeds to the American Red Cross, which is providing relief efforts for people in the path of Hurricane Harvey. All donations will be processed as normal iTunes purchases through a connected Apple ID.</p>
<p>Apple CEO Tim Cook tweeted about the donations early this morning, as rescue workers in Houston and other parts of southeast Texas attempt to help residents trapped in their homes by &#8220;<a href="http://www.cnn.com/2017/08/27/us/harvey-landfall/index.html">catastrophic flooding</a>.&#8221; Harvey made landfall late Friday night as a Category 4 hurricane and has since been downgraded to a tropical storm, which is expected to stay in the region over the next few days.</p>
<p><center></p>
<blockquote class="twitter-tweet">
<p dir="ltr" lang="en">Prayers for Texas and all those affected by <a href="https://twitter.com/hashtag/HurricaneHarvey?src=hash">#<a href='https://twitter.com/search?q=HurricaneHarvey' target='_blank'>HurricaneHarvey</a></a>. Join us in the relief effort by donating: <a href="https://t.co/QLBMFOjaDG">https://t.co/QLBMFOjaDG</a></p>
<p>&mdash; Tim Cook (@tim_cook) <a href="https://twitter.com/tim_cook/status/901791855108530176">August 27, 2017</a></p></blockquote>
<p>
</center> Apple is known to create donation pages across its various storefronts in the wake of natural disasters. In the past, Apple has collected Red Cross relief funds for the <a href="https://www.macrumors.com/2017/08/11/apple-accepting-red-cross-donations-bc-fires/">British Columbia Wildfire</a>, <a href="https://www.macrumors.com/2016/10/10/apple-donations-hurricane-matthew/">Hurricane Matthew</a>, <a href="https://www.macrumors.com/2016/08/19/apple-itunes-donations-louisiana-flood-relief/">the 2016 Louisiana floods</a>, <a href="https://www.macrumors.com/2015/04/26/itunes-nepal-earthquake-relief/">the 2015 Nepal earthquake</a>, and many more.</p>
<div class="linkback">Tags: <a href="https://www.macrumors.com/roundup/itunes/">iTunes</a>, <a href="https://www.macrumors.com/roundup/red-cross/">Red Cross</a> </div>
<p><a href="https://forums.macrumors.com/threads/apple-donations-hurricane-harvey.2063661/">Discuss this article</a> in our forums</p>
<div class="feedflare">
<a href="http://feeds.macrumors.com/~ff/MacRumors-Front?a=-Pp_ctqEB8U:QuJrZHMDk8o:yIl2AUoC8zA"><img border="0" src="http://feeds.feedburner.com/~ff/MacRumors-Front?d=yIl2AUoC8zA" /></a> <a href="http://feeds.macrumors.com/~ff/MacRumors-Front?a=-Pp_ctqEB8U:QuJrZHMDk8o:6W8y8wAjSf4"><img border="0" src="http://feeds.feedburner.com/~ff/MacRumors-Front?d=6W8y8wAjSf4" /></a> <a href="http://feeds.macrumors.com/~ff/MacRumors-Front?a=-Pp_ctqEB8U:QuJrZHMDk8o:qj6IDK7rITs"><img border="0" src="http://feeds.feedburner.com/~ff/MacRumors-Front?d=qj6IDK7rITs" /></a>
</div>
<p><img alt="" height="1" src="http://feeds.feedburner.com/~r/MacRumors-Front/~4/-Pp_ctqEB8U" width="1" /></p>
<p><!-- Script version:10.5.2017 17:00 --></p>
<p>&nbsp;</p>
<p></p>
<p><a href="http://itsecuritynews.info/advertising" target=_blank>Advertise on IT Security News.</a></p>
<p>Read the complete article: <a href="https://www.itsecuritynews.info/transfer.html?url=https://www.macrumors.com/2017/08/27/apple-donations-hurricane-harvey/" target=_blank>Apple Accepting Donations for Hurricane Harvey Relief Efforts</a></p>
<p></p>
<div class="sharedaddy sd-sharing-enabled"><div class="robots-nocontent sd-block sd-social sd-social-icon sd-sharing"><h3 class="sd-title">Share this:</h3><div class="sd-content"><ul><li class="share-twitter"><a rel="nofollow" data-shared="sharing-twitter-518826" class="share-twitter sd-button share-icon no-text" href="https://www.itsecuritynews.info/apple-accepting-donations-for-hurricane-harvey-relief-efforts/?share=twitter" target="_blank" title="Click to share on Twitter"><span></span><span class="sharing-screen-reader-text">Click to share on Twitter (Opens in new window)</span></a></li><li class="share-facebook"><a rel="nofollow" data-shared="sharing-facebook-518826" class="share-facebook sd-button share-icon no-text" href="https://www.itsecuritynews.info/apple-accepting-donations-for-hurricane-harvey-relief-efforts/?share=facebook" target="_blank" title="Click to share on Facebook"><span></span><span class="sharing-screen-reader-text">Click to share on Facebook (Opens in new window)</span></a></li><li class="share-google-plus-1"><a rel="nofollow" data-shared="sharing-google-518826" class="share-google-plus-1 sd-button share-icon no-text" href="https://www.itsecuritynews.info/apple-accepting-donations-for-hurricane-harvey-relief-efforts/?share=google-plus-1" target="_blank" title="Click to share on Google+"><span></span><span class="sharing-screen-reader-text">Click to share on Google+ (Opens in new window)</span></a></li><li class="share-linkedin"><a rel="nofollow" data-shared="sharing-linkedin-518826" class="share-linkedin sd-button share-icon no-text" href="https://www.itsecuritynews.info/apple-accepting-donations-for-hurricane-harvey-relief-efforts/?share=linkedin" target="_blank" title="Click to share on LinkedIn"><span></span><span class="sharing-screen-reader-text">Click to share on LinkedIn (Opens in new window)</span></a></li><li class="share-skype"><a rel="nofollow" data-shared="sharing-skype-518826" class="share-skype sd-button share-icon no-text" href="https://www.itsecuritynews.info/apple-accepting-donations-for-hurricane-harvey-relief-efforts/?share=skype" target="_blank" title="Share on Skype"><span></span><span class="sharing-screen-reader-text">Share on Skype (Opens in new window)</span></a></li><li class="share-end"></li></ul></div></div></div><div class='sharedaddy sd-block sd-like jetpack-likes-widget-wrapper jetpack-likes-widget-unloaded' id='like-post-wrapper-107528547-518826-5a88d7c90784e' data-src='https://widgets.wp.com/likes/#blog_id=107528547&amp;post_id=518826&amp;origin=www.itsecuritynews.info&amp;obj_id=107528547-518826-5a88d7c90784e' data-name='like-post-frame-107528547-518826-5a88d7c90784e'><h3 class="sd-title">Like this:</h3><div class='likes-widget-placeholder post-likes-widget-placeholder' style='height: 55px;'><span class='button'><span>Like</span></span> <span class="loading">Loading...</span></div><span class='sd-text-color'></span><a class='sd-link-color'></a></div>
<div id='jp-relatedposts' class='jp-relatedposts' >
	<h3 class="jp-relatedposts-headline"><em>Related</em></h3>
</div>	    </div><!-- .entry-content -->

	        <footer class="entry">
	    <p class="tags">Tags: <a href="https://www.itsecuritynews.info/tag/autopost/" rel="tag">autopost</a> <a href="https://www.itsecuritynews.info/tag/macrumors-mac-news-and-rumors-front-page/" rel="tag">MacRumors: Mac News and Rumors - Front Page</a></p>	</footer><!-- .entry -->
	
	</article><!-- #post-518826 -->
			<div id="posts-pagination">
				<h3 class="screen-reader-text">Post navigation</h3>
				<div class="previous fl"><a href="https://www.itsecuritynews.info/sap-vulnerability-that-may-get-you-macbook-at-1/" rel="prev">&larr; SAP vulnerability that may get you Macbook at $1</a></div>
				<div class="next fr"><a href="https://www.itsecuritynews.info/how-to-improve-return-on-investment-for-security-assistance/" rel="next">How to Improve Return on Investment for Security Assistance &rarr;</a></div>
			</div><!-- #posts-pagination -->

			
<div id="comments" class="comments-area">

	
	
	
</div><!-- #comments .comments-area -->
			</div><!-- #primary -->

	<div id="secondary" class="c4 end" role="complementary">
		<aside id="text-5" class="widget widget_text">			<div class="textwidget"><table border=0>
<tr><td>
<a href="http://itsecuritynews.info/feed"><img src="https://i2.wp.com/sorin-mustaca.com/wp-content/uploads/2014/02/rss.png?w=752" data-recalc-dims="1"></a>
</td>
<td>
<a href="http://www.twitter.com/it_SecurityNews"><img src="https://i2.wp.com/sorin-mustaca.com/wp-content/uploads/2014/02/twitter.png?w=752" data-recalc-dims="1"></a>
</td>
 <td>
<a href="https://www.facebook.com/ITSecNewsInfo">
<img src="https://i0.wp.com/improve-your-security.org/wp-content/uploads/2014/02/facebook.png?w=752" data-recalc-dims="1"></a>
</td>
 <td>
<a href="http://google.com/+ItsecuritynewsInfo">
<img src="https://i0.wp.com/improve-your-security.org/wp-content/uploads/2014/02/g+.png?resize=40%2C40" width="40" height="40"  data-recalc-dims="1"></a>
</td>

</tr>
</table>
</div>
		</aside><aside id="search-2" class="widget widget_search"><form role="search" method="get" class="search-form" action="https://www.itsecuritynews.info/">
				<label>
					<span class="screen-reader-text">Search for:</span>
					<input type="search" class="search-field" placeholder="Search &hellip;" value="" name="s" />
				</label>
				<input type="submit" class="search-submit" value="Search" />
			</form></aside><aside id="text-2" class="widget widget_text"><h3 class="widget-title">Daily Summary</h3>			<div class="textwidget"><form action="https://feedburner.google.com/fb/a/mailverify" method="post" target="popupwindow" onsubmit="window.open('https://feedburner.google.com/fb/a/mailverify?uri=ItSecurityNewsAggregated', 'popupwindow', 'scrollbars=yes,width=800,height=500');return true"><p>Enter your email address:</p><p><input type="text"  name="email"/></p><input type="hidden" value="ItSecurityNewsAggregated" name="uri"/><input type="hidden" name="loc" value="en_US"/><input type="submit" value="Subscribe" /></p></form></div>
		</aside><aside id="custom_html-2" class="widget_text widget widget_custom_html"><h3 class="widget-title">Sponsors</h3><div class="textwidget custom-html-widget"><center>
<!-- <a href="http://www.shareasale.com/r.cfm?b=916266&u=1605492&m=52018&urllink=&afftrack=" target="_blank" >
<img src="https://i0.wp.com/www.itsecuritynews.info/wp-content/uploads/2017/12/heimdal-60p.png?w=752" alt="HeimdalPro" data-recalc-dims="1">
</a>
-->

<!-- <a href="http://track.scanguard.com/598aedecded54/click/mainpage" target=_blank>

<img src="https://i0.wp.com/www.itsecuritynews.info/wp-content/uploads/2017/08/sg_v1_300x2501.png?w=752" alt="Scanguard" data-recalc-dims="1">
</a>
-->
<a href="https://go.nordvpn.net/aff_c?offer_id=15&aff_id=10218&file_id=134" target="_blank"><img src="https://i1.wp.com/www.itsecuritynews.info/wp-content/uploads/2018/01/nordvpn.gif?resize=300%2C250" width="300" height="250" border="0" data-recalc-dims="1" /></a><img src="https://go.nordvpn.net/aff_i?offer_id=15&file_id=134&aff_id=10218" width="1" height="1" />
	
<a href="http://www.mustaca.com"  target="_blank">
<img src="https://i2.wp.com/www.mustaca.com/wp-content/uploads/2016/12/small.png?w=752" alt="Sorin Mustaca IT Security Consulting" data-recalc-dims="1">
	
</a>
</center></div></aside><aside id="top-posts-2" class="widget widget_top-posts"><ul>				<li>
										<a href="https://www.itsecuritynews.info/top-five-open-source-intelligence-osint-tools/" class="bump-view" data-bump-view="tp">
						Top Five Open Source Intelligence (OSINT) Tools					</a>
									</li>
							<li>
										<a href="https://www.itsecuritynews.info/criminals-abused-swift-to-steal-6m-from-central-bank-of-russia/" class="bump-view" data-bump-view="tp">
						Criminals Abused SWIFT to Steal $6M from Central Bank of Russia					</a>
									</li>
							<li>
										<a href="https://www.itsecuritynews.info/new-gootkit-banking-trojan-variant-pushes-the-limits-on-evasive-behavior-2/" class="bump-view" data-bump-view="tp">
						New Gootkit Banking Trojan variant pushes the limits on evasive behavior					</a>
									</li>
							<li>
										<a href="https://www.itsecuritynews.info/uk-gov-psst-belgium-buy-these-typhoon-fighter-jets-from-us-will-you/" class="bump-view" data-bump-view="tp">
						UK.gov: Psst. Belgium. Buy these Typhoon fighter jets from us, will you?					</a>
									</li>
							<li>
										<a href="https://www.itsecuritynews.info/it-security-news-daily-summary-52/" class="bump-view" data-bump-view="tp">
						IT Security News Daily Summary					</a>
									</li>
							<li>
										<a href="https://www.itsecuritynews.info/hands-up-who-hasnt-sued-intel-over-spectre-meltdown-chip-flaws/" class="bump-view" data-bump-view="tp">
						Hands up who HASN&#039;T sued Intel over Spectre, Meltdown chip flaws					</a>
									</li>
							<li>
										<a href="https://www.itsecuritynews.info/researchers-spotted-a-new-malware-in-the-wild-the-saturn-ransomware/" class="bump-view" data-bump-view="tp">
						Researchers spotted a new malware in the wild, the Saturn Ransomware					</a>
									</li>
							<li>
										<a href="https://www.itsecuritynews.info/oracle-weblogic-server-flaw-exploited-to-deliver-crypto-miners/" class="bump-view" data-bump-view="tp">
						Oracle WebLogic Server Flaw Exploited to Deliver Crypto-Miners					</a>
									</li>
							<li>
										<a href="https://www.itsecuritynews.info/free-ransomware-available-on-dark-web/" class="bump-view" data-bump-view="tp">
						Free Ransomware Available on Dark Web					</a>
									</li>
							<li>
										<a href="https://www.itsecuritynews.info/inside-the-capabilities-and-detection-of-udpos-malware/" class="bump-view" data-bump-view="tp">
						Inside the Capabilities and Detection of UDPoS Malware					</a>
									</li>
			</ul></aside><aside id="categories-2" class="widget widget_categories"><h3 class="widget-title">Categories</h3><form action="https://www.itsecuritynews.info" method="get"><label class="screen-reader-text" for="cat">Categories</label><select  name='cat' id='cat' class='postform' >
	<option value='-1'>Select Category</option>
	<option class="level-0" value="30983">(ISC)2 Blog&nbsp;&nbsp;(323)</option>
	<option class="level-0" value="2">(ISC)2 Blog infosec&nbsp;&nbsp;(13)</option>
	<option class="level-0" value="31783">(ISC)² Blog&nbsp;&nbsp;(140)</option>
	<option class="level-0" value="31823">A Journey in Security&nbsp;&nbsp;(5)</option>
	<option class="level-0" value="31536">A Journey through Security&nbsp;&nbsp;(143)</option>
	<option class="level-0" value="31078">Adobe Product Security Incident Response Team (PSIRT) Blog&nbsp;&nbsp;(89)</option>
	<option class="level-0" value="3">Adobe Product Security Incident Response Team (PSIRT) Blog infosec&nbsp;&nbsp;(5)</option>
	<option class="level-0" value="31209">Advanced Persistent Security&nbsp;&nbsp;(66)</option>
	<option class="level-0" value="31219">All Articles and Blogs&nbsp;&nbsp;(677)</option>
	<option class="level-0" value="31574">Arbor Networks Threat Intelligence&nbsp;&nbsp;(38)</option>
	<option class="level-0" value="31134">Arbor Threat Intelligence&nbsp;&nbsp;(49)</option>
	<option class="level-0" value="5">Arbor Threat Intelligence infosec&nbsp;&nbsp;(4)</option>
	<option class="level-0" value="31008">Ars Technica&nbsp;&nbsp;(1,374)</option>
	<option class="level-0" value="6">Ars Technica » Risk Assessment infosec&nbsp;&nbsp;(31)</option>
	<option class="level-0" value="7">Articles at ComputerworldUK infosec&nbsp;&nbsp;(3)</option>
	<option class="level-0" value="31348">BankInfoSecurity.com RSS Syndication&nbsp;&nbsp;(40)</option>
	<option class="level-0" value="31053">BitSight Security Ratings Blog&nbsp;&nbsp;(267)</option>
	<option class="level-0" value="8">BitSight Security Ratings Blog infosec&nbsp;&nbsp;(19)</option>
	<option class="level-0" value="31660">Blog | Avast EN&nbsp;&nbsp;(198)</option>
	<option class="level-0" value="31558">Blog | Imperva&nbsp;&nbsp;(171)</option>
	<option class="level-0" value="31317">BreachAlarm Data Security Blog&nbsp;&nbsp;(55)</option>
	<option class="level-0" value="9">BreachAlarm Data Security Blog infosec&nbsp;&nbsp;(11)</option>
	<option class="level-0" value="31247">Breaking Malware&nbsp;&nbsp;(220)</option>
	<option class="level-0" value="31089">BrightPlanet&nbsp;&nbsp;(215)</option>
	<option class="level-0" value="11">BrightPlanet infosec&nbsp;&nbsp;(7)</option>
	<option class="level-0" value="31643">Carbon Black&nbsp;&nbsp;(376)</option>
	<option class="level-0" value="31287">Carnal0wnage &amp; Attack Research Blog&nbsp;&nbsp;(14)</option>
	<option class="level-0" value="31670">CC 2017&nbsp;&nbsp;(14)</option>
	<option class="level-0" value="31198">Center for Internet Security Blog&nbsp;&nbsp;(33)</option>
	<option class="level-0" value="13">Center for Internet Security Blog infosec&nbsp;&nbsp;(1)</option>
	<option class="level-0" value="30938">CERT Recently Published Vulnerability Notes infosec&nbsp;&nbsp;(5)</option>
	<option class="level-0" value="31267">Check Point Blog&nbsp;&nbsp;(349)</option>
	<option class="level-0" value="30972">CHMag News Apps&nbsp;&nbsp;(1,152)</option>
	<option class="level-0" value="15">CHMag News Apps infosec&nbsp;&nbsp;(580)</option>
	<option class="level-0" value="31337">CipherCloud&nbsp;&nbsp;(187)</option>
	<option class="level-0" value="18">CipherCloud infosec&nbsp;&nbsp;(3)</option>
	<option class="level-0" value="19">Cisco Blog » Security infosec&nbsp;&nbsp;(14)</option>
	<option class="level-0" value="31101">Corporate Blog&nbsp;&nbsp;(2,026)</option>
	<option class="level-0" value="30950">Corporate Blog infosec&nbsp;&nbsp;(28)</option>
	<option class="level-0" value="31356">CUInfoSecurity.com RSS Syndication&nbsp;&nbsp;(76)</option>
	<option class="level-0" value="31015">Cyber Defense Magazine&nbsp;&nbsp;(624)</option>
	<option class="level-0" value="26">Cyber Defense Magazine infosec&nbsp;&nbsp;(33)</option>
	<option class="level-0" value="31237">Cyber Secure Car&nbsp;&nbsp;(1)</option>
	<option class="level-0" value="31278">Cyber Security Buzz&nbsp;&nbsp;(237)</option>
	<option class="level-0" value="31895">Cyber Security News&nbsp;&nbsp;(2)</option>
	<option class="level-0" value="31211">Cyber Security – American Security Today&nbsp;&nbsp;(691)</option>
	<option class="level-0" value="28">Cyber Trust Blog infosec&nbsp;&nbsp;(1)</option>
	<option class="level-0" value="31093">Cyber Trust Blog » Cloud Computing&nbsp;&nbsp;(2)</option>
	<option class="level-0" value="29">Cyber Trust Blog » Cloud Computing infosec&nbsp;&nbsp;(3)</option>
	<option class="level-0" value="31203">Cyber Trust Blog » Cybersecurity&nbsp;&nbsp;(2)</option>
	<option class="level-0" value="30">Cyber Trust Blog » Cybersecurity infosec&nbsp;&nbsp;(7)</option>
	<option class="level-0" value="31185">CyberCrime &amp; Doing Time&nbsp;&nbsp;(11)</option>
	<option class="level-0" value="31647">Cybereason&nbsp;&nbsp;(51)</option>
	<option class="level-0" value="30976">Cybersecurity&nbsp;&nbsp;(1,185)</option>
	<option class="level-0" value="32">Cybersecurity infosec&nbsp;&nbsp;(13)</option>
	<option class="level-0" value="31213">Cybersecurity – Cyber Trust Blog&nbsp;&nbsp;(1)</option>
	<option class="level-0" value="31027">Cylance Blog&nbsp;&nbsp;(622)</option>
	<option class="level-0" value="30947">Cyphort infosec&nbsp;&nbsp;(1)</option>
	<option class="level-0" value="31000">CYREN Blog RSS Feed&nbsp;&nbsp;(147)</option>
	<option class="level-0" value="33">CYREN Blog RSS Feed infosec&nbsp;&nbsp;(4)</option>
	<option class="level-0" value="34">Cyveillance Blog &#8211; The Cyber Intelligence Blog infosec&nbsp;&nbsp;(8)</option>
	<option class="level-0" value="31070">Cyveillance Blog – The Cyber Intelligence Blog&nbsp;&nbsp;(13)</option>
	<option class="level-0" value="35">Cyveillance Blog – The Cyber Intelligence Blog infosec&nbsp;&nbsp;(19)</option>
	<option class="level-0" value="36">daily summary&nbsp;&nbsp;(611)</option>
	<option class="level-0" value="31150">Dark Reading:&nbsp;&nbsp;(3,615)</option>
	<option class="level-0" value="39">Darkmatters infosec&nbsp;&nbsp;(19)</option>
	<option class="level-0" value="31780">Darknet&nbsp;&nbsp;(59)</option>
	<option class="level-0" value="41">Darknet &#8211; The Darkside infosec&nbsp;&nbsp;(2)</option>
	<option class="level-0" value="31274">Darknet – The Darkside&nbsp;&nbsp;(241)</option>
	<option class="level-0" value="42">Darknet – The Darkside infosec&nbsp;&nbsp;(13)</option>
	<option class="level-0" value="31358">DataBreachToday.com RSS Syndication&nbsp;&nbsp;(49)</option>
	<option class="level-0" value="31330">DDoS Attack Protection&nbsp;&nbsp;(16)</option>
	<option class="level-0" value="31080">Deeplinks&nbsp;&nbsp;(1,064)</option>
	<option class="level-0" value="46">Deeplinks infosec&nbsp;&nbsp;(181)</option>
	<option class="level-0" value="31040">Digital Guardian&nbsp;&nbsp;(772)</option>
	<option class="level-0" value="49">Digital Guardian infosec&nbsp;&nbsp;(50)</option>
	<option class="level-0" value="31036">Duo Security Bulletin&nbsp;&nbsp;(149)</option>
	<option class="level-0" value="50">Duo Security Bulletin infosec&nbsp;&nbsp;(24)</option>
	<option class="level-0" value="31857">DZone Security Zone&nbsp;&nbsp;(318)</option>
	<option class="level-0" value="31187">E Hacking News &#8211; Latest Hacker News and IT Security News&nbsp;&nbsp;(1,549)</option>
	<option class="level-0" value="52">E Hacking News &#8211; Latest Hacker News and IT Security News infosec&nbsp;&nbsp;(50)</option>
	<option class="level-0" value="31016">Engadget RSS Feed&nbsp;&nbsp;(26)</option>
	<option class="level-0" value="31290">English – We Live Security&nbsp;&nbsp;(88)</option>
	<option class="level-0" value="31390">English – WeLiveSecurity&nbsp;&nbsp;(112)</option>
	<option class="level-0" value="31029">Errata Security&nbsp;&nbsp;(368)</option>
	<option class="level-0" value="55">Errata Security infosec&nbsp;&nbsp;(16)</option>
	<option class="level-0" value="31142">eSecurityPlanet RSS Feed&nbsp;&nbsp;(1,094)</option>
	<option class="level-0" value="57">eSecurityPlanet RSS Feed infosec&nbsp;&nbsp;(66)</option>
	<option class="level-0" value="31354">Everyone&#8217;s Blog Posts &#8211; CISO Platform&nbsp;&nbsp;(277)</option>
	<option class="level-0" value="60">F-Secure Antivirus Research Weblog infosec&nbsp;&nbsp;(2)</option>
	<option class="level-0" value="31221">FCW: The business of federal technology&nbsp;&nbsp;(2,227)</option>
	<option class="level-0" value="30957">Fortinet Blog&nbsp;&nbsp;(50)</option>
	<option class="level-0" value="62">Fortinet Blog infosec&nbsp;&nbsp;(31)</option>
	<option class="level-0" value="31258">Fortinet Blog | Latest Posts&nbsp;&nbsp;(895)</option>
	<option class="level-0" value="31175">Fox-IT International blog&nbsp;&nbsp;(222)</option>
	<option class="level-0" value="64">Fox-IT International blog infosec&nbsp;&nbsp;(2)</option>
	<option class="level-0" value="31581">GBHackers On Security&nbsp;&nbsp;(4)</option>
	<option class="level-0" value="31226">GCN: News and Blogs&nbsp;&nbsp;(1,722)</option>
	<option class="level-0" value="31058">GFI Blog&nbsp;&nbsp;(350)</option>
	<option class="level-0" value="66">GFI Blog infosec&nbsp;&nbsp;(26)</option>
	<option class="level-0" value="30979">Gizmodo&nbsp;&nbsp;(228)</option>
	<option class="level-0" value="31152">Google Online Security Blog&nbsp;&nbsp;(169)</option>
	<option class="level-0" value="68">Google Online Security Blog infosec&nbsp;&nbsp;(7)</option>
	<option class="level-0" value="31849">GuardiCore – Data Center and Cloud Security&nbsp;&nbsp;(3)</option>
	<option class="level-0" value="31618">guest&nbsp;&nbsp;(1)</option>
	<option class="level-0" value="31033">Hacking News &#8212; ScienceDaily&nbsp;&nbsp;(175)</option>
	<option class="level-0" value="74">Hacking News &#8212; ScienceDaily infosec&nbsp;&nbsp;(16)</option>
	<option class="level-0" value="31047">HACKMAGEDDON&nbsp;&nbsp;(128)</option>
	<option class="level-0" value="75">HACKMAGEDDON infosec&nbsp;&nbsp;(9)</option>
	<option class="level-0" value="31183">Have I been pwned? latest breaches&nbsp;&nbsp;(233)</option>
	<option class="level-0" value="77">Have I been pwned? latest breaches infosec&nbsp;&nbsp;(13)</option>
	<option class="level-0" value="31097">HEAT Security Blog&nbsp;&nbsp;(19)</option>
	<option class="level-0" value="78">HEAT Security Blog infosec&nbsp;&nbsp;(5)</option>
	<option class="level-0" value="31002">Heimdal Security Blog&nbsp;&nbsp;(409)</option>
	<option class="level-0" value="79">Heimdal Security Blog infosec&nbsp;&nbsp;(18)</option>
	<option class="level-0" value="30969">Help Net Security&nbsp;&nbsp;(3,836)</option>
	<option class="level-0" value="81">Help Net Security infosec&nbsp;&nbsp;(350)</option>
	<option class="level-0" value="31045">HITBSecNews &#8211; Keeping Knowledge Free for Over a Decade&nbsp;&nbsp;(1,698)</option>
	<option class="level-0" value="83">HITBSecNews &#8211; Keeping Knowledge Free for Over a Decade infosec&nbsp;&nbsp;(311)</option>
	<option class="level-0" value="31136">HolisticInfoSec&nbsp;&nbsp;(28)</option>
	<option class="level-0" value="84">HolisticInfoSec infosec&nbsp;&nbsp;(2)</option>
	<option class="level-0" value="31527">HolisticInfoSec™&nbsp;&nbsp;(56)</option>
	<option class="level-0" value="86">HOTforSecurity » Industry News infosec&nbsp;&nbsp;(23)</option>
	<option class="level-0" value="31510">http://blog.idwatchdog.com/index.php/feed/&nbsp;&nbsp;(47)</option>
	<option class="level-0" value="31509">http://blogs.cisco.com/rss/security/&nbsp;&nbsp;(213)</option>
	<option class="level-0" value="31515">http://blogs.rsa.com/feed/&nbsp;&nbsp;(106)</option>
	<option class="level-0" value="31511">http://facecrooks.com/feed/&nbsp;&nbsp;(300)</option>
	<option class="level-0" value="31505">http://feeds.arstechnica.com/arstechnica/security&nbsp;&nbsp;(300)</option>
	<option class="level-0" value="31507">http://feeds.feedburner.com/darknethackers&nbsp;&nbsp;(116)</option>
	<option class="level-0" value="31508">http://feeds.feedburner.com/Imperviews&nbsp;&nbsp;(55)</option>
	<option class="level-0" value="31963">http://feeds.feedburner.com/TalkTechToMe-All&nbsp;&nbsp;(8)</option>
	<option class="level-0" value="31956">http://feeds.trendmicro.com/Anti-MalwareBlog/&nbsp;&nbsp;(12)</option>
	<option class="level-0" value="31523">http://holisticinfosec.blogspot.com/feeds/posts/default&nbsp;&nbsp;(36)</option>
	<option class="level-0" value="31970">http://news.netcraft.com/feed&nbsp;&nbsp;(6)</option>
	<option class="level-0" value="31513">http://news.softpedia.com/newsRSS/Security-5.xml&nbsp;&nbsp;(883)</option>
	<option class="level-0" value="31499">http://packetstormsecurity.org/headlines.xml&nbsp;&nbsp;(600)</option>
	<option class="level-0" value="31973">http://rss.juniper.net/f/100001s481stb5hvl0q.rss&nbsp;&nbsp;(4)</option>
	<option class="level-0" value="31503">http://venturebeat.com/category/security/feed/&nbsp;&nbsp;(15)</option>
	<option class="level-0" value="31512">http://welivesecurity.com/feed/rss&nbsp;&nbsp;(22)</option>
	<option class="level-0" value="31960">http://www.ciphercloud.com/feed/&nbsp;&nbsp;(1)</option>
	<option class="level-0" value="31958">http://www.eff.org/rss/updates.xml&nbsp;&nbsp;(51)</option>
	<option class="level-0" value="31967">http://www.europol.europa.eu/rss_news_feed&nbsp;&nbsp;(12)</option>
	<option class="level-0" value="31501">http://www.hotforsecurity.com/blog/category/industry-news/feed&nbsp;&nbsp;(348)</option>
	<option class="level-0" value="31309">http://www.infosecurity-magazine.com/rss/news/76/application-security/&nbsp;&nbsp;(1,364)</option>
	<option class="level-0" value="31981">http://www.intezer.com/feed/&nbsp;&nbsp;(3)</option>
	<option class="level-0" value="31954">http://www.lawfareblog.com/rss.xml&nbsp;&nbsp;(102)</option>
	<option class="level-0" value="31517">http://www.secmaniac.com/feed/&nbsp;&nbsp;(16)</option>
	<option class="level-0" value="31506">http://www.techweekeurope.co.uk/category/security/feed&nbsp;&nbsp;(27)</option>
	<option class="level-0" value="31497">https://americansecuritytoday.com/category/itsecurity/cybersecurity/feed&nbsp;&nbsp;(15)</option>
	<option class="level-0" value="31989">https://blog.css-security.com/blog/rss.xml&nbsp;&nbsp;(3)</option>
	<option class="level-0" value="31965">https://www.crowdstrike.com/blog/feed&nbsp;&nbsp;(10)</option>
	<option class="level-0" value="31516">https://www.ipswitch.com/blog/security/feed/&nbsp;&nbsp;(6)</option>
	<option class="level-0" value="31547">IEEE Cybersecurity&nbsp;&nbsp;(12)</option>
	<option class="level-0" value="31049">Imperva Cyber Security Blog&nbsp;&nbsp;(1)</option>
	<option class="level-0" value="88">Imperva Cyber Security Blog infosec&nbsp;&nbsp;(18)</option>
	<option class="level-0" value="31168">Industry News – HOTforSecurity&nbsp;&nbsp;(798)</option>
	<option class="level-0" value="90">Industry News – HOTforSecurity infosec&nbsp;&nbsp;(26)</option>
	<option class="level-0" value="31132">Info Security News&nbsp;&nbsp;(6)</option>
	<option class="level-0" value="91">Info Security News infosec&nbsp;&nbsp;(26)</option>
	<option class="level-0" value="92">InfoCON: green infosec&nbsp;&nbsp;(64)</option>
	<option class="level-0" value="31350">InfoRiskToday.com RSS Syndication&nbsp;&nbsp;(229)</option>
	<option class="level-0" value="30990">Information Security Buzz&nbsp;&nbsp;(3,650)</option>
	<option class="level-0" value="94">Information Security Buzz infosec&nbsp;&nbsp;(247)</option>
	<option class="level-0" value="30954">Information Security infosec&nbsp;&nbsp;(1)</option>
	<option class="level-0" value="96">infosec&nbsp;&nbsp;(314)</option>
	<option class="level-0" value="97">InfoSec Institute infosec&nbsp;&nbsp;(16)</option>
	<option class="level-0" value="30963">Infosec Island Latest Articles&nbsp;&nbsp;(605)</option>
	<option class="level-0" value="98">Infosec Island Latest Articles infosec&nbsp;&nbsp;(21)</option>
	<option class="level-0" value="30977">InfoSec Resources&nbsp;&nbsp;(1,704)</option>
	<option class="level-0" value="99">InfoSec Resources infosec&nbsp;&nbsp;(35)</option>
	<option class="level-0" value="31297">InfoWorld Security&nbsp;&nbsp;(918)</option>
	<option class="level-0" value="31903">Intezer&nbsp;&nbsp;(6)</option>
	<option class="level-0" value="31686">Invincea Endpoint Security Blog – Invincea&nbsp;&nbsp;(7)</option>
	<option class="level-0" value="31192">Irongeek&#8217;s Security Site&nbsp;&nbsp;(53)</option>
	<option class="level-0" value="103">Irongeek&#8217;s Security Site infosec&nbsp;&nbsp;(5)</option>
	<option class="level-0" value="30931">ISACA Now: Posts infosec&nbsp;&nbsp;(4)</option>
	<option class="level-0" value="31113">iSIGHT Partners&nbsp;&nbsp;(247)</option>
	<option class="level-0" value="104">iSIGHT Partners infosec&nbsp;&nbsp;(6)</option>
	<option class="level-0" value="31535">IT Security &#8211; The IT Security Industry&#8217;s Web Resource&nbsp;&nbsp;(141)</option>
	<option class="level-0" value="31124">IT Security Expert Blog&nbsp;&nbsp;(114)</option>
	<option class="level-0" value="30967">IT SECURITY GURU&nbsp;&nbsp;(3,231)</option>
	<option class="level-0" value="107">IT Security Guru infosec&nbsp;&nbsp;(294)</option>
	<option class="level-0" value="31118">ITsecurity&nbsp;&nbsp;(195)</option>
	<option class="level-0" value="109">ITsecurity infosec&nbsp;&nbsp;(44)</option>
	<option class="level-0" value="31064">ITSecurityPortal.com&nbsp;&nbsp;(1,830)</option>
	<option class="level-0" value="31532">Kevin Townsend&nbsp;&nbsp;(212)</option>
	<option class="level-0" value="31140">Krebs on Security&nbsp;&nbsp;(591)</option>
	<option class="level-0" value="112">Krebs on Security infosec&nbsp;&nbsp;(31)</option>
	<option class="level-0" value="31120">Latest articles from SC Magazine News&nbsp;&nbsp;(12)</option>
	<option class="level-0" value="114">Latest articles from SC Magazine News infosec&nbsp;&nbsp;(121)</option>
	<option class="level-0" value="31109">Latest Blogs Posts from ComputerworldUK&nbsp;&nbsp;(11)</option>
	<option class="level-0" value="31235">Latest news and stories from BleepingComputer.com&nbsp;&nbsp;(2,498)</option>
	<option class="level-0" value="31062">Latest Secunia Blog Entries&nbsp;&nbsp;(1,916)</option>
	<option class="level-0" value="31179">Latest Security Advisories&nbsp;&nbsp;(21)</option>
	<option class="level-0" value="31126">Latest topics for ZDNet in Security&nbsp;&nbsp;(4,146)</option>
	<option class="level-0" value="118">Latest topics for ZDNet in Security infosec&nbsp;&nbsp;(336)</option>
	<option class="level-0" value="31011">Lawfare&nbsp;&nbsp;(2,546)</option>
	<option class="level-0" value="119">Lawfare infosec&nbsp;&nbsp;(255)</option>
	<option class="level-0" value="30959">Lifehacker&nbsp;&nbsp;(528)</option>
	<option class="level-0" value="31031">Liquidmatrix Security Digest&nbsp;&nbsp;(117)</option>
	<option class="level-0" value="120">Liquidmatrix Security Digest infosec&nbsp;&nbsp;(7)</option>
	<option class="level-0" value="31020">MacRumors: Mac News and Rumors &#8211; Front Page&nbsp;&nbsp;(3,830)</option>
	<option class="level-0" value="31170">Malcovery Security Blog&nbsp;&nbsp;(234)</option>
	<option class="level-0" value="31162">Malware don&#8217;t need Coffee&nbsp;&nbsp;(64)</option>
	<option class="level-0" value="122">Malware don&#8217;t need Coffee infosec&nbsp;&nbsp;(1)</option>
	<option class="level-0" value="31938">Malware-Traffic-Analysis.net &#8211; Blog Entries&nbsp;&nbsp;(34)</option>
	<option class="level-0" value="31035">Malwarebytes Labs&nbsp;&nbsp;(1,099)</option>
	<option class="level-0" value="30936">Malwarebytes Labs infosec&nbsp;&nbsp;(22)</option>
	<option class="level-0" value="31196">MalwareTech&nbsp;&nbsp;(216)</option>
	<option class="level-0" value="123">MalwareTech infosec&nbsp;&nbsp;(2)</option>
	<option class="level-0" value="30996">Mashable&nbsp;&nbsp;(27)</option>
	<option class="level-0" value="31656">McAfee Blogs&nbsp;&nbsp;(403)</option>
	<option class="level-0" value="31918">McAfee Labs – McAfee Blogs&nbsp;&nbsp;(13)</option>
	<option class="level-0" value="31038">Metasploit&nbsp;&nbsp;(167)</option>
	<option class="level-0" value="124">Metasploit infosec&nbsp;&nbsp;(28)</option>
	<option class="level-0" value="31567">Microsoft Malware Protection Center Blog&nbsp;&nbsp;(14)</option>
	<option class="level-0" value="125">Microsoft Malware Protection Center infosec&nbsp;&nbsp;(7)</option>
	<option class="level-0" value="31950">Microsoft Secure&nbsp;&nbsp;(9)</option>
	<option class="level-0" value="31155">Microsoft Security Bulletins&nbsp;&nbsp;(133)</option>
	<option class="level-0" value="127">Microsoft Security Bulletins infosec&nbsp;&nbsp;(30)</option>
	<option class="level-0" value="31157">Microsoft Security Content: Comprehensive Edition&nbsp;&nbsp;(182)</option>
	<option class="level-0" value="128">Microsoft Security Content: Comprehensive Edition infosec&nbsp;&nbsp;(16)</option>
	<option class="level-0" value="129">Microsoft Security Response Center infosec&nbsp;&nbsp;(8)</option>
	<option class="level-0" value="31416">Minded Security Blog&nbsp;&nbsp;(37)</option>
	<option class="level-0" value="130">Minded Security Blog infosec&nbsp;&nbsp;(1)</option>
	<option class="level-0" value="131">Mocana ON Blog infosec&nbsp;&nbsp;(5)</option>
	<option class="level-0" value="31524">monthly summary&nbsp;&nbsp;(4)</option>
	<option class="level-0" value="31178">MSRC&nbsp;&nbsp;(6)</option>
	<option class="level-0" value="132">MSRC infosec&nbsp;&nbsp;(2)</option>
	<option class="level-0" value="31146">Naked Security &#8211; Sophos&nbsp;&nbsp;(2,826)</option>
	<option class="level-0" value="133">Naked Security &#8211; Sophos infosec&nbsp;&nbsp;(186)</option>
	<option class="level-0" value="31677">Netcraft&nbsp;&nbsp;(38)</option>
	<option class="level-0" value="31531">Network Security Blog&nbsp;&nbsp;(178)</option>
	<option class="level-0" value="135">Network Security Blog infosec&nbsp;&nbsp;(3)</option>
	<option class="level-0" value="31108">News&nbsp;&nbsp;(7)</option>
	<option class="level-0" value="30985">News from the Lab&nbsp;&nbsp;(240)</option>
	<option class="level-0" value="136">News infosec&nbsp;&nbsp;(12)</option>
	<option class="level-0" value="31141">News Items&nbsp;&nbsp;(274)</option>
	<option class="level-0" value="137">News Items infosec&nbsp;&nbsp;(6)</option>
	<option class="level-0" value="31099">News ≈ Packet Storm&nbsp;&nbsp;(2,019)</option>
	<option class="level-0" value="138">News ≈ Packet Storm infosec&nbsp;&nbsp;(199)</option>
	<option class="level-0" value="31514">Newsroom&nbsp;&nbsp;(435)</option>
	<option class="level-0" value="31314">OEM Hub | Insights into Antivirus Technology Licensing&nbsp;&nbsp;(1,476)</option>
	<option class="level-0" value="31223">Offensive Security&nbsp;&nbsp;(122)</option>
	<option class="level-0" value="140">Offensive Security &#8211; Offensive Security infosec&nbsp;&nbsp;(1)</option>
	<option class="level-0" value="141">Offensive Security infosec&nbsp;&nbsp;(2)</option>
	<option class="level-0" value="30992">Official Google Blog&nbsp;&nbsp;(32)</option>
	<option class="level-0" value="30939">OpenDNS Blog infosec&nbsp;&nbsp;(5)</option>
	<option class="level-0" value="30943">OpenDNS Security Labs infosec&nbsp;&nbsp;(3)</option>
	<option class="level-0" value="31673">OpenDNS Umbrella Blog&nbsp;&nbsp;(23)</option>
	<option class="level-0" value="142">Optimal Security infosec&nbsp;&nbsp;(13)</option>
	<option class="level-0" value="31043">Palo Alto Networks Blog&nbsp;&nbsp;(1,352)</option>
	<option class="level-0" value="143">Palo Alto Networks Blog infosec&nbsp;&nbsp;(55)</option>
	<option class="level-0" value="31819">Perception Point&nbsp;&nbsp;(5)</option>
	<option class="level-0" value="31466">PKI Blog&nbsp;&nbsp;(36)</option>
	<option class="level-0" value="31130">Power More&nbsp;&nbsp;(6)</option>
	<option class="level-0" value="31589">Project Zero&nbsp;&nbsp;(11)</option>
	<option class="level-0" value="31534">rdist&nbsp;&nbsp;(111)</option>
	<option class="level-0" value="31055">Recorded Future&nbsp;&nbsp;(404)</option>
	<option class="level-0" value="145">Recorded Future infosec&nbsp;&nbsp;(16)</option>
	<option class="level-0" value="31302">Red Hat Security Blog Blog Posts&nbsp;&nbsp;(127)</option>
	<option class="level-0" value="146">Red Hat Security infosec&nbsp;&nbsp;(2)</option>
	<option class="level-0" value="31009">Risk Assessment – Ars Technica&nbsp;&nbsp;(754)</option>
	<option class="level-0" value="147">Risk Assessment – Ars Technica infosec&nbsp;&nbsp;(52)</option>
	<option class="level-0" value="31095">SANS Information Security Reading Room&nbsp;&nbsp;(484)</option>
	<option class="level-0" value="149">SANS Information Security Reading Room infosec&nbsp;&nbsp;(46)</option>
	<option class="level-0" value="150">SANS Internet Storm Center&nbsp;&nbsp;(64)</option>
	<option class="level-0" value="31018">SANS Internet Storm Center, InfoCON: green&nbsp;&nbsp;(2,433)</option>
	<option class="level-0" value="31650">SANS Internet Storm Center, InfoCON: yellow&nbsp;&nbsp;(7)</option>
	<option class="level-0" value="31166">SANS ISC InfoSec News Feed&nbsp;&nbsp;(1,819)</option>
	<option class="level-0" value="31060">SANS NewsBites&nbsp;&nbsp;(429)</option>
	<option class="level-0" value="151">SANS NewsBites infosec&nbsp;&nbsp;(191)</option>
	<option class="level-0" value="31074">SANS Penetration Testing&nbsp;&nbsp;(170)</option>
	<option class="level-0" value="152">SANS Penetration Testing infosec&nbsp;&nbsp;(1)</option>
	<option class="level-0" value="31025">Schneier on Security&nbsp;&nbsp;(1,078)</option>
	<option class="level-0" value="153">Schneier on Security infosec&nbsp;&nbsp;(53)</option>
	<option class="level-0" value="31899">Scott Helme&nbsp;&nbsp;(26)</option>
	<option class="level-0" value="154">SearchSecurity&nbsp;&nbsp;(37)</option>
	<option class="level-0" value="31368">SearchSecurity: RSS Feed&nbsp;&nbsp;(495)</option>
	<option class="level-0" value="31159">SearchSecurity: Security Wire Daily News&nbsp;&nbsp;(887)</option>
	<option class="level-0" value="155">SearchSecurity: Security Wire Daily News infosec&nbsp;&nbsp;(37)</option>
	<option class="level-0" value="31635">Secunia Research: Research, opinions and views from our Vulnerability Research experts&nbsp;&nbsp;(3)</option>
	<option class="level-0" value="31086">Securelist &#8211; Information about Viruses, Hackers and Spam&nbsp;&nbsp;(541)</option>
	<option class="level-0" value="30940">Security&nbsp;&nbsp;(9)</option>
	<option class="level-0" value="31022">Security Affairs&nbsp;&nbsp;(3,319)</option>
	<option class="level-0" value="160">Security Affairs infosec&nbsp;&nbsp;(235)</option>
	<option class="level-0" value="31138">Security Blog G Data Software AG&nbsp;&nbsp;(112)</option>
	<option class="level-0" value="161">Security Blog G Data Software AG infosec&nbsp;&nbsp;(1)</option>
	<option class="level-0" value="30981">Security Bloggers Network&nbsp;&nbsp;(2,263)</option>
	<option class="level-0" value="162">Security Bloggers Network infosec&nbsp;&nbsp;(697)</option>
	<option class="level-0" value="31840">Security Boulevard&nbsp;&nbsp;(1,330)</option>
	<option class="level-0" value="31642">Security Intelligence&nbsp;&nbsp;(524)</option>
	<option class="level-0" value="31117">Security on TechRepublic&nbsp;&nbsp;(2,249)</option>
	<option class="level-0" value="164">Security on TechRepublic infosec&nbsp;&nbsp;(43)</option>
	<option class="level-0" value="31122">Security Research &amp; Defense&nbsp;&nbsp;(15)</option>
	<option class="level-0" value="31066">Security Watch&nbsp;&nbsp;(2,137)</option>
	<option class="level-0" value="166">Security Watch infosec&nbsp;&nbsp;(9)</option>
	<option class="level-0" value="30991">Security Zap&nbsp;&nbsp;(228)</option>
	<option class="level-0" value="167">Security Zap infosec&nbsp;&nbsp;(31)</option>
	<option class="level-0" value="31751">security – Ars Technica&nbsp;&nbsp;(47)</option>
	<option class="level-0" value="31056">Security – Cisco Blog&nbsp;&nbsp;(780)</option>
	<option class="level-0" value="168">Security – Cisco Blog infosec&nbsp;&nbsp;(20)</option>
	<option class="level-0" value="31224">Security – Ipswitch Blog&nbsp;&nbsp;(117)</option>
	<option class="level-0" value="31012">Security – Re/code&nbsp;&nbsp;(46)</option>
	<option class="level-0" value="169">Security – Re/code infosec&nbsp;&nbsp;(68)</option>
	<option class="level-0" value="31944">Security – Silicon UK&nbsp;&nbsp;(56)</option>
	<option class="level-0" value="31240">Security – VentureBeat&nbsp;&nbsp;(915)</option>
	<option class="level-0" value="31324">SecurityFocus Vulnerabilities&nbsp;&nbsp;(9,130)</option>
	<option class="level-0" value="170">SecurityFocus Vulnerabilities infosec&nbsp;&nbsp;(316)</option>
	<option class="level-0" value="31637">SecurityRecruiter.com&#8217;s Security Recruiter Blog&nbsp;&nbsp;(19)</option>
	<option class="level-0" value="31133">SecurityWeek RSS Feed&nbsp;&nbsp;(4,908)</option>
	<option class="level-0" value="172">SecurityWeek RSS Feed infosec&nbsp;&nbsp;(329)</option>
	<option class="level-0" value="31644">SentinelOne&nbsp;&nbsp;(102)</option>
	<option class="level-0" value="31051">Shell is Only the Beginning&nbsp;&nbsp;(59)</option>
	<option class="level-0" value="173">Shell is Only the Beginning infosec&nbsp;&nbsp;(2)</option>
	<option class="level-0" value="31526">Silicon UK » Security&nbsp;&nbsp;(1,033)</option>
	<option class="level-0" value="31004">Slashdot&nbsp;&nbsp;(25)</option>
	<option class="level-0" value="31144">Softpedia News / Security&nbsp;&nbsp;(1,475)</option>
	<option class="level-0" value="555">Softpedia News / Security infosec&nbsp;&nbsp;(249)</option>
	<option class="level-0" value="557">Sorin Mustaca on Cyber Security infosec&nbsp;&nbsp;(18)</option>
	<option class="level-0" value="30974">Sorin Mustaca on Cybersecurity&nbsp;&nbsp;(152)</option>
	<option class="level-0" value="558">Sorin Mustaca on Security infosec&nbsp;&nbsp;(3)</option>
	<option class="level-0" value="560">Speaking of Security &#8211; The RSA Blog and Podcast infosec&nbsp;&nbsp;(18)</option>
	<option class="level-0" value="31435">Speaking of Security – The RSA Blog&nbsp;&nbsp;(202)</option>
	<option class="level-0" value="31006">Speaking of Security – The RSA Blog and Podcast&nbsp;&nbsp;(142)</option>
	<option class="level-0" value="561">Speaking of Security – The RSA Blog and Podcast infosec&nbsp;&nbsp;(34)</option>
	<option class="level-0" value="31342">sponsored&nbsp;&nbsp;(1)</option>
	<option class="level-0" value="31533">StopBadware blogs&nbsp;&nbsp;(186)</option>
	<option class="level-0" value="562">StopBadware blogs infosec&nbsp;&nbsp;(1)</option>
	<option class="level-0" value="31529">Sucuri Blog&nbsp;&nbsp;(201)</option>
	<option class="level-0" value="31106">TaoSecurity&nbsp;&nbsp;(93)</option>
	<option class="level-0" value="565">TaoSecurity infosec&nbsp;&nbsp;(2)</option>
	<option class="level-0" value="566">Tech&nbsp;&nbsp;(358)</option>
	<option class="level-0" value="30970">TechCrunch&nbsp;&nbsp;(740)</option>
	<option class="level-0" value="31293">Technical Blog&nbsp;&nbsp;(18)</option>
	<option class="level-0" value="30932">TechSpective infosec&nbsp;&nbsp;(24)</option>
	<option class="level-0" value="31023">TechWeekEurope UK&nbsp;&nbsp;(983)</option>
	<option class="level-0" value="570">TechWeekEurope UK infosec&nbsp;&nbsp;(358)</option>
	<option class="level-0" value="31370">TechWeekEurope UK » Security&nbsp;&nbsp;(235)</option>
	<option class="level-0" value="31153">The Art of Data Protection&nbsp;&nbsp;(8)</option>
	<option class="level-0" value="571">The Art of Data Protection infosec&nbsp;&nbsp;(14)</option>
	<option class="level-0" value="31658">The AVIEN Blog&nbsp;&nbsp;(76)</option>
	<option class="level-0" value="31691">The Duo Blog&nbsp;&nbsp;(111)</option>
	<option class="level-0" value="31014">The Hacker News&nbsp;&nbsp;(1,756)</option>
	<option class="level-0" value="572">The Hacker News infosec&nbsp;&nbsp;(141)</option>
	<option class="level-0" value="31530">The Invisible Things Lab&#8217;s blog&nbsp;&nbsp;(199)</option>
	<option class="level-0" value="30930">The Official Blog from Kaspersky Lab infosec&nbsp;&nbsp;(28)</option>
	<option class="level-0" value="31281">The Official Google Blog&nbsp;&nbsp;(1,127)</option>
	<option class="level-0" value="31072">The PhishLabs Blog&nbsp;&nbsp;(155)</option>
	<option class="level-0" value="574">The PhishLabs Blog infosec&nbsp;&nbsp;(5)</option>
	<option class="level-0" value="575">the register&nbsp;&nbsp;(14,750)</option>
	<option class="level-0" value="31103">The Register &#8211; Security&nbsp;&nbsp;(3,403)</option>
	<option class="level-0" value="576">The Register &#8211; Security infosec&nbsp;&nbsp;(450)</option>
	<option class="level-0" value="577">The Register infosec&nbsp;&nbsp;(1,803)</option>
	<option class="level-0" value="31528">The Social Media Security Podcast&nbsp;&nbsp;(187)</option>
	<option class="level-0" value="31426">The Spamhaus Project News&nbsp;&nbsp;(206)</option>
	<option class="level-0" value="31105">The State of Security&nbsp;&nbsp;(1,910)</option>
	<option class="level-0" value="579">The State of Security infosec&nbsp;&nbsp;(159)</option>
	<option class="level-0" value="31091">The Watchblog — ID Watchdog&nbsp;&nbsp;(150)</option>
	<option class="level-0" value="580">The Watchblog — ID Watchdog infosec&nbsp;&nbsp;(10)</option>
	<option class="level-0" value="30961">ThinkGeek &#8211; What&#8217;s New&nbsp;&nbsp;(1,659)</option>
	<option class="level-0" value="31537">Threat Intelligence Times&nbsp;&nbsp;(111)</option>
	<option class="level-0" value="582">Threat Intelligence Times infosec&nbsp;&nbsp;(4)</option>
	<option class="level-0" value="31160">Threat Research Blog&nbsp;&nbsp;(245)</option>
	<option class="level-0" value="30942">Threat Research Blog infosec&nbsp;&nbsp;(5)</option>
	<option class="level-0" value="583">Threat Research infosec&nbsp;&nbsp;(11)</option>
	<option class="level-0" value="31111">Threatpost | The first stop for security news&nbsp;&nbsp;(2,110)</option>
	<option class="level-0" value="586">Threatpost | The first stop for security news infosec&nbsp;&nbsp;(169)</option>
	<option class="level-0" value="31613">Threatpost – English – Global – threatpost.com&nbsp;&nbsp;(2)</option>
	<option class="level-0" value="31128">ThreatTrack Security Labs Blog&nbsp;&nbsp;(215)</option>
	<option class="level-0" value="587">ThreatTrack Security Labs Blog infosec&nbsp;&nbsp;(1)</option>
	<option class="level-0" value="31088">TrendLabs Security Intelligence Blog&nbsp;&nbsp;(512)</option>
	<option class="level-0" value="589">TrendLabs Security Intelligence Blog infosec&nbsp;&nbsp;(35)</option>
	<option class="level-0" value="31469">Troy Hunt&nbsp;&nbsp;(1)</option>
	<option class="level-0" value="31164">Troy Hunt&#8217;s Blog&nbsp;&nbsp;(461)</option>
	<option class="level-0" value="30929">Troy Hunt&#8217;s Blog infosec&nbsp;&nbsp;(9)</option>
	<option class="level-0" value="592">TrustedSec &#8211; Information Security infosec&nbsp;&nbsp;(6)</option>
	<option class="level-0" value="30998">TrustedSec – Information Security&nbsp;&nbsp;(54)</option>
	<option class="level-0" value="593">TrustedSec – Information Security infosec&nbsp;&nbsp;(7)</option>
	<option class="level-0" value="31311">Trustwave Blog&nbsp;&nbsp;(221)</option>
	<option class="level-0" value="1">Uncategorized&nbsp;&nbsp;(96)</option>
	<option class="level-0" value="31041">US-CERT Current Activity&nbsp;&nbsp;(666)</option>
	<option class="level-0" value="595">US-CERT Current Activity infosec&nbsp;&nbsp;(44)</option>
	<option class="level-0" value="31425">US-CERT Tips&nbsp;&nbsp;(66)</option>
	<option class="level-0" value="31083">Venafi Blog&nbsp;&nbsp;(6)</option>
	<option class="level-0" value="597">Venafi Blog infosec&nbsp;&nbsp;(5)</option>
	<option class="level-0" value="598">Virus Bulletin blog infosec&nbsp;&nbsp;(12)</option>
	<option class="level-0" value="31147">Virus Bulletin&#8217;s blog&nbsp;&nbsp;(460)</option>
	<option class="level-0" value="599">Virus Bulletin&#8217;s blog infosec&nbsp;&nbsp;(14)</option>
	<option class="level-0" value="31518">We Live Security&nbsp;&nbsp;(4)</option>
	<option class="level-0" value="31143">We Live Security » Languages » English&nbsp;&nbsp;(119)</option>
	<option class="level-0" value="600">We Live Security » Languages » English infosec&nbsp;&nbsp;(96)</option>
	<option class="level-0" value="31032">Webroot Threat Blog&nbsp;&nbsp;(322)</option>
	<option class="level-0" value="601">Webroot Threat Blog infosec&nbsp;&nbsp;(19)</option>
	<option class="level-0" value="31233">weekly summary&nbsp;&nbsp;(77)</option>
	<option class="level-0" value="602">welivesecurity&nbsp;&nbsp;(855)</option>
	<option class="level-0" value="31068">Windows Incident Response&nbsp;&nbsp;(97)</option>
	<option class="level-0" value="603">Windows Incident Response infosec&nbsp;&nbsp;(4)</option>
	<option class="level-0" value="31639">Windows Security&nbsp;&nbsp;(27)</option>
	<option class="level-0" value="31791">Windows Security blog&nbsp;&nbsp;(38)</option>
	<option class="level-0" value="604">wired&nbsp;&nbsp;(511)</option>
	<option class="level-0" value="30987">WIRED » WIRED&nbsp;&nbsp;(3)</option>
	<option class="level-0" value="30994">WIRED » » Threat Level » WIRED&nbsp;&nbsp;(3)</option>
	<option class="level-0" value="30928">WIRED » » Threat Level » WIRED infosec&nbsp;&nbsp;(37)</option>
	<option class="level-0" value="31076">ZDI: Upcoming Advisories&nbsp;&nbsp;(865)</option>
	<option class="level-0" value="31115">ZenMate Blog | Internet Security and Privacy Reports&nbsp;&nbsp;(8)</option>
	<option class="level-0" value="608">ZenMate Blog | Internet Security and Privacy Reports infosec&nbsp;&nbsp;(12)</option>
	<option class="level-0" value="31462">ZenMate Mind&nbsp;&nbsp;(21)</option>
	<option class="level-0" value="609">Zscaler Blog infosec&nbsp;&nbsp;(7)</option>
</select>
</form>
<script type='text/javascript'>
/* <![CDATA[ */
(function() {
	var dropdown = document.getElementById( "cat" );
	function onCatChange() {
		if ( dropdown.options[ dropdown.selectedIndex ].value > 0 ) {
			dropdown.parentNode.submit();
		}
	}
	dropdown.onchange = onCatChange;
})();
/* ]]> */
</script>

</aside><aside id="pages-2" class="widget widget_pages"><h3 class="widget-title">Pages</h3>		<ul>
			<li class="page_item page-item-245701 page_item_has_children"><a href="https://www.itsecuritynews.info/advertising/">Advertising</a>
<ul class='children'>
	<li class="page_item page-item-312689"><a href="https://www.itsecuritynews.info/advertising/advertise/">Advertise</a></li>
	<li class="page_item page-item-188246 page_item_has_children"><a href="https://www.itsecuritynews.info/advertising/sponsors/">Sponsors</a>
	<ul class='children'>
		<li class="page_item page-item-188259"><a href="https://www.itsecuritynews.info/advertising/sponsors/sorin-mustaca-cybersecurity/">Sorin Mustaca Cybersecurity</a></li>
	</ul>
</li>
</ul>
</li>
<li class="page_item page-item-164770"><a href="https://www.itsecuritynews.info/contact/">Contact</a></li>
<li class="page_item page-item-163138"><a href="https://www.itsecuritynews.info/it-security-consulting/">IT Security Consulting</a></li>
<li class="page_item page-item-246934"><a href="https://www.itsecuritynews.info/app/">Mobile Apps</a></li>
<li class="page_item page-item-163126"><a href="https://www.itsecuritynews.info/privacy-policy/">Privacy Policy</a></li>
<li class="page_item page-item-164761 page_item_has_children"><a href="https://www.itsecuritynews.info/social-media/">Social Media</a>
<ul class='children'>
	<li class="page_item page-item-247109"><a href="https://www.itsecuritynews.info/social-media/connect/">Connect</a></li>
	<li class="page_item page-item-147795"><a href="https://www.itsecuritynews.info/social-media/latest/">Latest IT Security News</a></li>
	<li class="page_item page-item-120607"><a href="https://www.itsecuritynews.info/social-media/subscribe-to-daily-summary/">Subscribe to Daily Summary</a></li>
</ul>
</li>
		</ul>
		</aside><aside id="meta-2" class="widget widget_meta"><h3 class="widget-title">Meta</h3>			<ul>
						<li><a href="https://www.itsecuritynews.info/wp-login.php">Log in</a></li>
			<li><a href="https://www.itsecuritynews.info/feed/">Entries <abbr title="Really Simple Syndication">RSS</abbr></a></li>
			<li><a href="https://www.itsecuritynews.info/comments/feed/">Comments <abbr title="Really Simple Syndication">RSS</abbr></a></li>
			<li><a href="https://wordpress.org/" title="Powered by WordPress, state-of-the-art semantic personal publishing platform.">WordPress.org</a></li>			</ul>
			</aside>	</div><!-- #secondary.widget-area -->

		</div> <!-- #main.row -->
</div> <!-- #page.grid -->

<footer id="footer" role="contentinfo">

	<div id="footer-content" class="grid ">
		<div class="row">

			<p class="copyright c12">
				<span class="fl">Copyright &copy; 2018 <a href="https://www.itsecuritynews.info">IT Security News</a>. All Rights Reserved.</span>
				<span class="fr">The Magazine Basic Theme by <a href="https://themes.bavotasan.com/">bavotasan.com</a>.</span>
			</p><!-- .c12 -->

		</div><!-- .row -->
	</div><!-- #footer-content.grid -->

</footer><!-- #footer -->

	<div style="display:none">
	</div>

	<script type="text/javascript">
		window.WPCOM_sharing_counts = {"https:\/\/www.itsecuritynews.info\/apple-accepting-donations-for-hurricane-harvey-relief-efforts\/":518826};
	</script>
<link rel='stylesheet' id='basecss-css'  href='https://www.itsecuritynews.info/wp-content/plugins/eu-cookie-law/css/style.css?ver=4.9.3' type='text/css' media='all' />
<!--[if lte IE 8]>
<link rel='stylesheet' id='jetpack-carousel-ie8fix-css'  href='https://www.itsecuritynews.info/wp-content/plugins/jetpack/modules/carousel/jetpack-carousel-ie8fix.css?ver=20121024' type='text/css' media='all' />
<![endif]-->
<script type='text/javascript' src='https://www.itsecuritynews.info/wp-content/plugins/jetpack/_inc/build/photon/photon.min.js?ver=20130122'></script>
<script type='text/javascript' src='https://www.itsecuritynews.info/wp-content/plugins/appbanners/lib/smartbanner/jquery.smartbanner.min.js?ver=4.9.3'></script>
<script type='text/javascript'>
/* <![CDATA[ */
var appBannersConfig = {"title":"IT Security News","author":"www.ITSecurityNews.info","price":"Absolutely Free","appStoreLanguage":"US","inAppStore":"On the App Store","inGooglePlay":"In Google Play","inAmazonAppStore":"In the Amazon Appstore","inWindowsStore":"In the Windows Store","GooglePlayParams":null,"icon":"http:\/\/www.itsecuritynews.info\/wp-content\/uploads\/2014\/02\/cropped-itsecuritynews-1.png","iconGloss":"","url":"","button":"Install","scale":"auto","speedIn":"300","speedOut":"400","daysHidden":"0","daysReminder":"0","force":null,"hideOnInstall":"1","layer":"","iOSUniversalApp":"1","appendToSelector":"body","printViewPort":"1","pushSelector":"html"};
/* ]]> */
</script>
<script type='text/javascript' src='https://www.itsecuritynews.info/wp-content/plugins/appbanners/js/config.min.js?ver=4.9.3'></script>
<script type='text/javascript' src='https://s0.wp.com/wp-content/js/devicepx-jetpack.js?ver=201807'></script>
<script type='text/javascript' src='https://secure.gravatar.com/js/gprofiles.js?ver=2018Febaa'></script>
<script type='text/javascript'>
/* <![CDATA[ */
var WPGroHo = {"my_hash":""};
/* ]]> */
</script>
<script type='text/javascript' src='https://www.itsecuritynews.info/wp-content/plugins/jetpack/modules/wpgroho.js?ver=4.9.3'></script>
<script type='text/javascript' src='https://www.itsecuritynews.info/wp-includes/js/comment-reply.min.js?ver=4.9.3'></script>
<script type='text/javascript' src='https://www.itsecuritynews.info/wp-content/themes/magazine-basic/library/js/theme.js?ver=4.9.3'></script>
<script type='text/javascript' src='https://www.itsecuritynews.info/wp-includes/js/wp-embed.min.js?ver=4.9.3'></script>
<script type='text/javascript'>
/* <![CDATA[ */
var eucookielaw_data = {"euCookieSet":null,"autoBlock":"1","expireTimer":"360","scrollConsent":"0","networkShareURL":"","isCookiePage":"","isRefererWebsite":"","deleteCookieUrl":"https:\/\/www.itsecuritynews.info\/apple-accepting-donations-for-hurricane-harvey-relief-efforts\/?nocookie=1"};
/* ]]> */
</script>
<script type='text/javascript' src='https://www.itsecuritynews.info/wp-content/plugins/eu-cookie-law/js/scripts.js?ver=4.9.3'></script>
<script type='text/javascript' src='https://www.itsecuritynews.info/wp-content/plugins/jetpack/_inc/build/spin.min.js?ver=1.3'></script>
<script type='text/javascript' src='https://www.itsecuritynews.info/wp-content/plugins/jetpack/_inc/build/jquery.spin.min.js?ver=1.3'></script>
<script type='text/javascript'>
/* <![CDATA[ */
var jetpackCarouselStrings = {"widths":[370,700,1000,1200,1400,2000],"is_logged_in":"","lang":"en","ajaxurl":"https:\/\/www.itsecuritynews.info\/wp-admin\/admin-ajax.php","nonce":"7b1bbf6fb6","display_exif":"1","display_geo":"1","single_image_gallery":"1","single_image_gallery_media_file":"","background_color":"black","comment":"Comment","post_comment":"Post Comment","write_comment":"Write a Comment...","loading_comments":"Loading Comments...","download_original":"View full size <span class=\"photo-size\">{0}<span class=\"photo-size-times\">\u00d7<\/span>{1}<\/span>","no_comment_text":"Please be sure to submit some text with your comment.","no_comment_email":"Please provide an email address to comment.","no_comment_author":"Please provide your name to comment.","comment_post_error":"Sorry, but there was an error posting your comment. Please try again later.","comment_approved":"Your comment was approved.","comment_unapproved":"Your comment is in moderation.","camera":"Camera","aperture":"Aperture","shutter_speed":"Shutter Speed","focal_length":"Focal Length","copyright":"Copyright","comment_registration":"1","require_name_email":"1","login_url":"https:\/\/www.itsecuritynews.info\/wp-login.php?redirect_to=https%3A%2F%2Fwww.itsecuritynews.info%2Fapple-accepting-donations-for-hurricane-harvey-relief-efforts%2F","blog_id":"1","meta_data":["camera","aperture","shutter_speed","focal_length","copyright"],"local_comments_commenting_as":"<p id=\"jp-carousel-commenting-as\">You must be <a href=\"#\" class=\"jp-carousel-comment-login\">logged in<\/a> to post a comment.<\/p>"};
/* ]]> */
</script>
<script type='text/javascript' src='https://www.itsecuritynews.info/wp-content/plugins/jetpack/_inc/build/carousel/jetpack-carousel.min.js?ver=20170209'></script>
<script type='text/javascript' src='https://www.itsecuritynews.info/wp-content/plugins/jetpack/_inc/build/postmessage.min.js?ver=5.7.1'></script>
<script type='text/javascript' src='https://www.itsecuritynews.info/wp-content/plugins/jetpack/_inc/build/jquery.jetpack-resize.min.js?ver=5.7.1'></script>
<script type='text/javascript' src='https://www.itsecuritynews.info/wp-content/plugins/jetpack/_inc/build/likes/queuehandler.min.js?ver=5.7.1'></script>
<script type='text/javascript'>
/* <![CDATA[ */
var sharing_js_options = {"lang":"en","counts":"1"};
/* ]]> */
</script>
<script type='text/javascript' src='https://www.itsecuritynews.info/wp-content/plugins/jetpack/_inc/build/sharedaddy/sharing.min.js?ver=5.7.1'></script>
<script type='text/javascript'>
var windowOpen;
			jQuery( document.body ).on( 'click', 'a.share-twitter', function() {
				// If there's another sharing window open, close it.
				if ( 'undefined' !== typeof windowOpen ) {
					windowOpen.close();
				}
				windowOpen = window.open( jQuery( this ).attr( 'href' ), 'wpcomtwitter', 'menubar=1,resizable=1,width=600,height=350' );
				return false;
			});
var windowOpen;
			jQuery( document.body ).on( 'click', 'a.share-facebook', function() {
				// If there's another sharing window open, close it.
				if ( 'undefined' !== typeof windowOpen ) {
					windowOpen.close();
				}
				windowOpen = window.open( jQuery( this ).attr( 'href' ), 'wpcomfacebook', 'menubar=1,resizable=1,width=600,height=400' );
				return false;
			});
var windowOpen;
			jQuery( document.body ).on( 'click', 'a.share-google-plus-1', function() {
				// If there's another sharing window open, close it.
				if ( 'undefined' !== typeof windowOpen ) {
					windowOpen.close();
				}
				windowOpen = window.open( jQuery( this ).attr( 'href' ), 'wpcomgoogle-plus-1', 'menubar=1,resizable=1,width=480,height=550' );
				return false;
			});
var windowOpen;
			jQuery( document.body ).on( 'click', 'a.share-linkedin', function() {
				// If there's another sharing window open, close it.
				if ( 'undefined' !== typeof windowOpen ) {
					windowOpen.close();
				}
				windowOpen = window.open( jQuery( this ).attr( 'href' ), 'wpcomlinkedin', 'menubar=1,resizable=1,width=580,height=450' );
				return false;
			});
var windowOpen;
			jQuery( document.body ).on( 'click', 'a.share-skype', function() {
				// If there's another sharing window open, close it.
				if ( 'undefined' !== typeof windowOpen ) {
					windowOpen.close();
				}
				windowOpen = window.open( jQuery( this ).attr( 'href' ), 'wpcomskype', 'menubar=1,resizable=1,width=305,height=665' );
				return false;
			});
</script>
	<iframe src='https://widgets.wp.com/likes/master.html?ver=20171126#ver=20171126' scrolling='no' id='likes-master' name='likes-master' style='display:none;'></iframe>
	<div id='likes-other-gravatars'><div class="likes-text"><span>%d</span> bloggers like this:</div><ul class="wpl-avatars sd-like-gravatars"></ul></div>
	<script type='text/javascript' src='https://stats.wp.com/e-201807.js' async defer></script>
<script type='text/javascript'>
	_stq = window._stq || [];
	_stq.push([ 'view', {v:'ext',j:'1:5.7.1',blog:'107528547',post:'518826',tz:'1',srv:'www.itsecuritynews.info'} ]);
	_stq.push([ 'clickTrackerInit', '107528547', '518826' ]);
</script>
<!-- Eu Cookie Law 2.11 --><div class="pea_cook_wrapper pea_cook_bottomcenter" style="color:#FFFFFF;background:rgb(0,0,0);background: rgba(0,0,0,0.85);"><p>By continuing to use the site, you agree to the use of cookies. <a style="color:#FFFFFF;" href="https://www.itsecuritynews.info/privacy-policy/" target="_blank" id="fom">more information</a> <button id="pea_cook_btn" class="pea_cook_btn" href="#">Accept</button></p></div><div class="pea_cook_more_info_popover"><div class="pea_cook_more_info_popover_inner" style="color:#FFFFFF;background-color: rgba(0,0,0,0.9);"><p>The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.</p><p><a style="color:#FFFFFF;" href="#" id="pea_close">Close</a></p></div></div></body>
</html>