Mirko Zorz
![Eyes](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112400/laptop-eyes-technology-computer-400x200.jpg)
The life of a social engineer: Hacking the human
A clean-cut guy with rimmed glasses and a warm smile, Jayson E. Street looks nothing like the stereotypical hacker regularly portrayed in movies (i.e. pale, grim and …
![Gboard](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112459/gboard-400x200.jpg)
Gboard enhances your keyboard, but what about your privacy?
Gboard is a Google app for your iPhone that lets you search and send information, GIFs, emojis and more, right from your keyboard. You can search and send anything from …
![mobile devices](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112718/mobile_devices-400x200.jpg)
The fragile security of the mobile ecosystem
Mobile devices such as smartphones and tablets have become indispensable in our daily lives. In fact, in Q4 2015, smartphones accounted for around 75 percent of all mobile …
![Internet of Fail](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112753/internet_of_fail-400x200.jpg)
Internet of Fail: How modern devices expose our lives
Should you sync your family’s calendar to your refrigerator or have it display photos? Samsung believes you should. They also think you need cameras that display the …
![world biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112821/world-biohazard-400x200.jpg)
Geopolitical events fuel uptick in region-specific DDoS attacks
An attack research group was the No.1 target of DDoS attacks, and the Middle East region also saw a sharp increase in attacks last quarter, according to Nexusguard. …
![Businessman](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113640/businessman-400x200.jpg)
What a Security Evangelist does, and why you need one
Here is a simple truth: You can create the most revolutionary product ever, but if you can’t get word about it out, you’ll fail. Information security vendors …
![Businessman](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114011/businessman-400x200.jpg)
Do you have what it takes to be an independent security consultant?
It doesn’t matter if you’re part of a big enterprise or a small company, you’ve probably wondered at least once what it would be like to work for yourself. Dreams …
![fingerprint](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112928/fingerprint-400x200.jpg)
How the biometrics market is entering the evolving IoT ecosystem
By 2021, the biometrics market will reach $30 billion and shift its revenue focus, moving away from the governmental sector to emphasize opportunities in the consumer and …
![coin](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112941/coin-400x200.jpg)
Worldwide IoT security spending on the rise
Worldwide spending on Internet of Things security will reach $348 million in 2016, a 23.7 percent increase from 2015 spending of $281.5 million, according to Gartner. …
![broken glass](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112951/broken3-400x200.jpg)
Top 10 web hacking techniques of 2015
Now in its tenth year, the Top 10 List of Web Hacking Techniques takes a step back from the implications of an attack to understand how they happen. The list is chosen by the …
![Opera hand](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113003/opera-hand-400x200.jpg)
Opera browser’s VPN is just a proxy, here’s how it works
Yesterday, Opera announced they’ve added a free VPN client with unlimited data usage in the latest developer version of their browser. Sounds great, doesn’t it? …
![industry](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113008/industry-400x200.jpg)
The future of ICS security depends on OT-centric security solutions
New cybersecurity operational technologies are emerging to protect industrial control systems (ICS) against impending IT threats and attacks. ABI Research indicates that …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege