Zeljka Zorz
![Android](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105803/android-1-400x200.jpg)
Dangerous Android threat points to Italian spyware maker
A piece of Android spyware recently analyzed by researchers with the RedNaga Security team seemed to be yet another Hacking Team spying tool but, according to more recent …
![Firefox](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105943/firefox-independent-1200.5bd827ccf1ed-400x200.jpg)
With Firefox 50, Mozilla plugs many security holes
Firefox 50 is out, and it includes security fixes for 3 critical, 12 high, 10 moderate, and 2 low severity issues, as well as many usability improvements. Two of the critical …
![Linux](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110133/linux-400x200.jpg)
Critical Linux bug opens systems to compromise
Researchers from the Polytechnic University of Valencia have discovered a critical flaw that can allow attackers – both local and remote – to obtain root shell on …
![Facebook](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105813/facebook-400x200.jpg)
Facebook, Google ban fake news sources from their ad networks
Despite Mark Zuckerberg’s dismissive attitude regarding the claim that Facebook had an inappropriate impact on the US elections, the company has moved to bar sources of …
![USA flag](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112438/usa-flag-400x200.jpg)
UK Home Secretary signs extradition order for British hacker Lauri Love
The extradition order for British hacker Lauri Love has been signed on Monday by the UK Home Secretary Amber Rudd, and Love has 14 days to appeal the decision. The 31-year-old …
![ProtonMail](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112255/protonmail-400x200.jpg)
New users flock to ProtonMail in wake of Trump’s victory
Following Donald Trump’s victory in the latest US presidential election, many people begun to worry about the surveillance capabilities that will now effectively be left …
![windtalker](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105821/windtalker-400x200.jpg)
Researchers reveal WiFi-based mobile password discovery attack
A group of researchers has come up with WindTalker, a new attack method for discovering users’ passwords and PINs as they enter them into their smartphones. WindTalker …
![AdultFriendFinder](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105829/adultfriendfinder-400x200.jpg)
Compromised: 339 million AdultFriendFinder users
Friend Finder Networks, the company that operates sites like Adultfriendfinder.com (“World’s largest sex & swinger community”), and Cams.com …
![facepalm](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113615/facepalm-400x200.png)
Millions of job seekers’ info exposed via easily accessible database backups
A data leak has exposed sensitive information about millions of job seekers that used global recruitment firm Michael Page. The leak has once again been revealed to the …
![CPU](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105849/cpu-400x200.jpg)
Researchers set to work on malware-detecting CPUs
Adding hardware protections to software ones to block the ever-increasing onslaught of computer malware seems like a solid idea, and a group of researchers have just been …
![checklist](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105851/checklist-400x200.jpg)
A checklist for people who understand cyber security
By now, it’s pretty much an accepted reality that it’s only a matter of time until an organization – any organization – gets breached by cyber …
![Telegram](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105855/telegram-danger-400x200.jpg)
Telecrypt ransomware uses Telegram for command and control
Telecrypt, a newly spotted piece of crypto ransomware that uses Telegram’s communication protocol to deliver the decryption key to the crooks, is targeting Russian-speaking …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality