Zeljka Zorz
![Stingray](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110640/stingray-400x200.jpg)
Stingray use lacks transparency and meaningful oversight
Cell-site simulators – aka Stingrays, aka IMSI catchers – are widely used by US law enforcement, usually without a warrant that such type of surveillance should …
![Gold](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112944/gold-400x200.jpg)
Man hacked, blackmailed gold bullion trading firm
25-year-old Adam Penny hacked the systems of an unnamed gold bullion trading firm, and used the stolen information about gold deliveries to intercept them before they are …
![emergency](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110645/emergency-400x200.jpg)
US 911 emergency system can be crippled by a mobile botnet
What would it take for attackers to significantly disrupt the 911 emergency system across the US? According to researchers from Ben-Gurion Univerisity of the Negev’s …
![MySQL](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110647/mysql-400x200.jpg)
MySQL 0-day could lead to total system compromise
Researcher Dawid Golunski has discovered multiple severe vulnerabilities affecting the popular open source database MySQL and its forks (e.g. MariaDB, Percona). One of these …
![Danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110650/danger-400x200.jpg)
Macro-based malware evolves to bypass traditional defenses
Macro-based malware is growing into full-featured malware capable of detecting and bypassing traditional security tools, Barkly researchers have discovered. Macro-based …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194215/healthcare-400x200.jpg)
Compromised electronic health records may haunt you forever
A recent report on the Deep Web black market for electronic health records (EHRs) by researchers affiliated with the Institute for Critical Infrastructure Technology has …
![Seagate Central](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110658/seagate-central-400x200.jpg)
Your Seagate Central NAS could be hosting mining malware
If you have discovered cryptocurrency mining malware on your system, have removed it, and got compromised again without an idea about how it happened, it could be that the …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110701/car-phone-connected-400x200.jpg)
The dangers of connecting phones to connected cars
As smart, connected cars get more ubiquitous, they are often the only option you get when renting a car from a rental agency. With all the reports about car hacking, you might …
![Google Chrome](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112836/google-chrome-400x200.jpg)
Chrome will start labeling some HTTP sites as non-secure
Slowly but relentlessly, Google is pushing website owners to deploy HTTPS – or get left behind. The latest announced push is scheduled for January 2017, when Chrome 56 …
![keys](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110707/keys-400x200.jpg)
Stealing login credentials from locked computers in 30 seconds or less
Security researcher Rob Fuller has demonstrated a simple way for stealing login credentials from locked computers running Windows and Mac OS X. For the attack to work, …
![Apple](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113648/apple-400x200.jpg)
Sophisticated Mokes backdoor targets Mac users
A new malware targeting Macs has been discovered: the Mokes backdoor. Capable of making screenshots, recording keystrokes, capturing audio, and rifling through Office …
![network](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110946/network-400x200.jpg)
Flaws in Network Management Systems open enterprise networks to attacks
For quite a while now, Rapid7 researchers Tod Beardsley and Deral Heiland have been looking for vulnerabilities in various Network Management Systems (NMSs). With the help of …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality