Zeljka Zorz
![](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105308/lavabit-400x200.jpg)
Encrypted webmail service Lavabit relaunched
Lavabit, the secure encrypted webmail service used by Edward Snowden, is back online. Lavabit founder and operator Ladar Levison shut it down in 2013 when the US government …
![Meitu](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105318/meitu-400x200.jpg)
Meitu photo retouching app may be invading your privacy
Have you heard about Meitu, the photo retouching mobile app that turns people into more cutesy or beautiful versions of themselves? Chances are that even if you don’t …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111830/ransomware-400x200.jpg)
Satan: A new Ransomware as a Service
If you’ve been hit by ransomware that has scrambled the names of your encrypted files and has appended the .stn extension to them, you’ve been targeted by Satan …
![Abstract 7](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105323/spore-400x200.jpg)
Spora ransomware could become the new Locky
A recent decrease of Locky ransomware infections has been tied with the lack of activity of the Necurs botnet, which is used to deliver the malware directly to potential …
![Oracle](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195004/oracle-cloud-400x200.jpg)
Massive Oracle Critical Patch Update fixes 270 vulnerabilities
Oracle has released the first Critical Patch Update scheduled for 2017, and it’s massive. It fixes 270 vulnerabilities across multiple products, and over 100 of them are …
![Apple](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113415/apple-1-400x200.jpg)
Fruitfly: Unusual Mac backdoor used for tightly targeted attacks?
Researchers have found and analyzed a Mac backdoor that is unusual in many ways. The malware – detected as OSX.Backdoor.Quimitchin by Malwarebytes but dubbed Fruitfly by …
![samsung camera](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105331/samsung-camera-400x200.jpg)
Samsung SmartCam can be easily hijacked
At least one type of Samsung SmartCam cameras can be taken over by remote attackers who just need to know the vulnerable camera’s IP address. The remote code execution …
![WhatsApp](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105336/whatsapp-400x200.png)
UK users bombarded with scammy offers via Facebook, WhatsApp
Since the beginning of the year, survey scammers have mounted a veritable onslaught against Facebook and WhatsApp users from the UK. The lure comes in the form of a fake free …
![fingerprint](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113609/fingerprint-400x200.jpg)
Accurate cross-browser fingerprinting is possible, researchers show
A group of researchers have come up with a browser fingerprinting technique that can allow interested parties to “identify” users across different browsers (on the …
![magnifying glass](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195300/magnifying-glass-400x200.png)
Security audit of Dovecot mailserver reveals good security practices
Dovecot – a popular open source IMAP and POP3 server for Linux/UNIX-like systems – is as secure as its developers claim it is. A security audit performed by German …
![keys](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105506/keys-400x200.jpg)
Key Transparency: A secure directory of public encryption keys
Google has released Key Transparency, an open source public directory meant to simplify the discovery of intended recipients’ public encryption key. The project is still …
![documents](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111709/documents-400x200.jpg)
SWIFT systems of three Indian banks compromised to create fake trade documents
Since last year’s revelation that attackers have compromised SWIFT software of Bangladesh’s central bank and used it to perform fraudulent transfers worth tens of …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality