Zeljka Zorz
![cybercrime](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105649/cybercrime-400x200.jpg)
Online fraudsters’ preferred tools and techniques revealed
A new report by DataVisor Threat Labs has provided unprecedented insight into the behaviors and attack techniques of some of the world’s largest online crime rings, and …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111830/ransomware-400x200.jpg)
Organizations hit with Petya ransomware with a twist
Various organizations are being targeted by cyber crooks leveraging the infamous Petya ransomware. A modified Petya version inside a Trojan But victims will have a difficult …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104811/data-400x200.jpg)
Sensitive US Air Force data found exposed online
A misconfigured, unsecured backup drive containing a huge amount of sensitive (but not classified) data on US Air Force officers has been sitting online, accessible to anyone, …
![Double Robotics Telepresence Robot](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104817/double-robotics-telepresence-robot-400x200.jpg)
Double Robotics Telepresence Robot can be hacked
Rapid7 researchers have discovered a number of vulnerabilities in the Double Robotics Telepresence Robot, the company’s iPad-based telepresence device that looks a bit …
![signature](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104820/signature-400x200.jpg)
A new age of digital signatures is upon us
The increased adoption of digital signatures should not come as a surprise: many businesses are trying to digitalise their everyday processes, and digital signatures are both …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105737/danger-400x200.jpg)
Intel’s CHIPSEC can detect CIA’s OS X rootkit
As details about CIA’s hacking capabilities and tools are, bit by bit, popping to the surface, companies are trying to offer users some piece of mind. In the wake of …
![Android malware](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105304/android-malware-400x200.jpg)
Android devices delivered to employees with pre-installed malware
A test of Android devices used in two unnamed companies revealed that 38 of them were infected with malware before being delivered to the employees. These were smartphones by …
![magnify](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105905/magnify-400x200.jpg)
The West African cybercriminal ecosystem is unlike any other
While there is still not an actual underground marketplace, cybercrime is pervasive in the West African region. Specifically, scamming operations. The peculiarities of the …
![camera](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104835/camera-400x200.jpg)
185,000+ vulnerable Wi-Fi cameras just waiting to be hijacked
A generic wireless camera manufactured by a Chinese company and sold around the world under different names and brands can be easily hijacked and/or roped into a botnet. The …
![Apache Struts](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104837/apache-struts-400x200.jpg)
Apache servers under attack through easily exploitable Struts 2 flaw
A critical vulnerability in Apache Struts 2 is being actively and heavily exploited, even though the patch for it has been released on Monday. System administrators are …
![Confide](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104839/confideapp-400x200.jpg)
Encrypted messaging app Confide suffers from many security issues
Confide, the encrypted instant messaging application with a self-destructing messaging system that has become popular with White House staffers, is not so secure after all. …
![fish phishing](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114006/fish-400x200.jpg)
Clever spear-phishing emails hit employees involved in SEC filings
FireEye has flagged a sophisticated spear-phishing campaign hitting US-based businesses with emails purportedly coming from the US Securities and Exchange Commission (SEC). …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality