Zeljka Zorz
![Chrome](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110806/chrome-400x200.jpg)
Google Chrome remote code execution flaw detailed, PoC released
Vulnerability broker Beyond Security has released details about and Proof of Concept code for a remote code execution bug affecting Google Chrome. “The [type confusion] …
![WordPress](https://img.helpnetsecurity.com/wp-content/uploads/2017/04/09104602/wordpress-biohazard-400x200.jpg)
EV ransomware is targeting WordPress sites
WordPress security outfit Wordfence has flagged several attempts by attackers to upload ransomware that provides them with the ability to encrypt a WordPress website’s files. …
![Trump](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103410/president-trump-400x200.jpg)
DOJ wants to know who visited anti-Trump website
The US Department of Justice wants DreamHost to hand over IP addresses of some 1.3 million visitors to disruptj20.org, a website that helped organize political protests during …
![watch](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110131/watch-400x200.jpg)
AI is key to speeding up threat detection and response
Time is the most important factor in detecting network breaches and, consequently, in containing cyber incidents and mitigating the cost of a breach. “Security event …
![hands](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105020/hands-400x200.jpg)
Enterprise security culture: Why you need it, and how to create it
Security awareness is a term that most information security professionals are familiar with – security culture a little less so. “Security awareness training is …
![Gmail](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105107/gmail-fire-400x200.jpg)
Google wants iOS Gmail users to think twice about following suspicious links
Google has announced the rollout of new anti-phishing checks for the iOS Gmail app: in less than two weeks, all users will be confronted with two warnings if they attempt to …
![DNA](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103421/dna-400x200.jpg)
Researchers pull off DNA-based malicious code injection attack
Researchers have demonstrated that it’s possible to create synthetic DNA strands containing malicious computer code that, if sequenced and analyzed, could compromise a …
![close laptop](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112450/apple-692186_1280-400x200.jpg)
Stealthy Mughthesec Mac adware exposed: What it does, how to protect yourself
Mac malware is still a rare occurrence, so it’s no wonder that some of it can lurk, unnoticed for months, on random machines. The latest example falls more in the …
![Law legislation](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113340/law-400x200.jpg)
PACER vulnerability allowed hackers to access legal docs while sticking others with the bill
A CSRF flaw that made it possible for attackers to access court documents on the PACER system while making legitimate users pay for it has finally been plugged. What is PACER? …
![mechanics](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110321/mechanics-400x200.jpg)
The untapped potential of machine learning for detecting fraud
E-commerce fraud protection company Signifyd has recently signed up behavioral analytics expert Long-Ji Lin to fill the position of Chief Scientist. “For advertisers, …
![Power lines](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113651/power-lines-400x200.jpg)
How a port misconfiguration exposed critical infrastructure data
Much has already been said and written about the dangers of potential cyber attacks targeting the electric/power grid. And in Ukraine, they’ve already gone from …
![Tor browser](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112210/tor_browser-400x200.jpg)
FBI unmasks Tor-using suspected sextortionist
A California man that stands accused of sextortion, producing child pornography, and threats of mass violence has been identified by the FBI through the use of a so-called …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality