Zeljka Zorz
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112750/bomb-400x200.jpg)
Pawn Storm raced to pop many targets before Windows zero-day patch release
As promised, Microsoft provided this Tuesday a patch for the Windows zero-day (CVE-2016-7855) actively exploited by the Strontium (aka Pawn Storm) cyber espionage hacking …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112812/danger-400x200.jpg)
Google Safe Browsing goes after repeat offenders
Google has had enough of sites that repeatedly endanger end users, either through malware, unwanted software, phishing or other social engineering and deceptive tactics. …
![magnify](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105905/magnify-400x200.jpg)
Signal Protocol’s crypto core has no major flaws, researchers find
A group of computer science and cryptography professors and doctoral students has effected a security analysis of the secure messaging Signal Protocol – specifically, of …
![trojan](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110844/trojan-1-400x200.jpg)
TrickBot banking Trojan is the next big threat
After months of testing, a new banking Trojan called TrickBot is being aggressively slung at owners of personal and business bank accounts in UK and Australia. …
![Broken glass](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195722/glass-262105_1920-400x200.jpg)
OAuth2.0 implementation flaw allows attackers to pop Android users’ accounts
Incorrect OAuth2.0 implementation by third party mobile app developers has opened users of those apps to account compromise, three researchers from the Chinese University of …
![Chrome mobile](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105908/chrome_mobile-400x200.jpg)
Bug in Chrome for mobile exploited for drive-by Android malware downloads
Users of the mobile version of Google Chrome should be extra careful when faced with unsolicited offers to install a popular app, Kaspersky Lab researchers warn. Cyber crooks …
![Abstract](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194417/abstract-dark-400x200.png)
Dutch police takes over darknet market, posts warning
As law enforcement agencies around the world continue taking down online markets on the Dark Web, the Dutch National Police and the nation’s Public Prosecution Service …
![The Basics of Cyber Safety](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105914/basics_cyber_safety-400x200.jpg)
Review: The Basics of Cyber Safety
About the authors John Sammons is an Associate Professor and Director of the undergraduate program in Digital Forensics and Information Assurance at Marshall University in …
![Tech support scam](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105921/ms-tech-support-scam-400x200.jpg)
Tech support scammers use old bug to freeze browsers
Tech support scammers are exploiting a bug that maxes out users’ CPU and memory capability and effectively freezes the browser and possibly the computer, in an attempt …
![Tesco Bank card](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105924/tesco-bank-card-400x200.jpg)
20,000 affected by Tesco Bank security breach
It’s been a rough weekend for 20,000 customers of British retail Tesco Bank: they’ve witnessed their bank accounts being plundered and have been phoning the bank …
![UK map](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195536/map-1019896_1280-400x200.jpg)
14 arrested for laundering millions stolen with malware
The UK National Crime Agency (NCA) has arrested fourteen individuals suspected of laundering more than £11 million stolen through the use of malware. The money was stolen …
![Nigeria](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105938/nigeria-400x200.jpg)
Nigerian scammers: Then and now
The image that the expression “Nigerian scammer” conjures up in most people’s heads is still that of the confidence man behind the keyboard, convincing …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality