Zeljka Zorz
![businessman](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110801/businessman-400x200.jpg)
What differentiates a great CIO from simply a good one?
Earlier this month, Sophos announced the appointment of Tony Young as the company’s new global Chief Information Officer (CIO). Young started his career as a software …
![Europe](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110757/europe-1-400x200.jpg)
Definitive EU net neutrality guidelines released
The Body of European Regulators for Electronic Communications (BEREC) has published the final guidelines aimed at helping EU member states’ National Regulatory …
![Chrome](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110806/chrome-400x200.jpg)
Google Chrome impersonator Trojan doing rounds
If you’re a Google Chrome user, and suddenly your browser looks a bit off and shows you pages that you would never visit ordinarily, you’ve probably been hit with …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111112/ransomware-400x200.jpg)
Linux servers hit with FairWare ransomware – or is it just a scam?
Users posting on Bleeping Computer’s forums have alerted the world to a new threat targeting Linux server admins: the FairWare ransomware. Whether the ransomware …
![USB](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110808/usb-400x200.jpg)
USBee makes USB devices transmit data from air-gapped computers
After devising ways of exfiltrating data from air-gapped computers via mobile phones, using radio frequencies, heat, rogue software that transmits electromagnetic signals at …
![doors](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110817/doors-400x200.jpg)
How to choose a perfect data control solution for your enterprise
Not long ago, people used to come to work and work off of a desktop computer, tied to the network. Today, they work on their mobile devices, physically untethered to it. In …
![Google Chrome](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110819/google-chrome-400x200.jpg)
Google Chrome users targeted by tech support scammers
Google Chrome users, beware: tech support scammers are misusing helpful browser features to impersonate Microsoft and to bombard users users with pop-ups. In the first …
![D-Link NAS](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110824/dlink-nas-400x200.jpg)
XSS flaw in D-Link NAS devices allows attackers to mess with your data
Security researcher Benjamin Daniel Mussler has unearthed an XSS flaw affecting seven D-Link NAS devices – a flaw which could allow attackers to access the devices and …
![Cisco](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110832/cisco-400x200.jpg)
Cisco starts publishing fixes for EXTRABACON exploit
Starting last Wednesday, Cisco has begun publishing fixes for the SNMP RCE flaw in the software of its Adaptive Security Appliances (ASA), which can be triggered through the …
![trojan](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110844/trojan-1-400x200.jpg)
Ramnit Trojan rides again, targets customers of six major UK banks
The infamous Ramnit Trojan is on the prowl again, and this time it targets personal banking customers of six unnamed UK banks. The Trojan has not changed much since we last …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110848/brain-hack-400x200.jpg)
Brainjacking: Hacking brain implants
Did you know that Dick Cheney, former US Vice President who held that office from 2001 to 2009, had the wireless telemetry on his implantable cardioverter-defibrillator …
![Apple iOS 9](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113526/apple-ios9-400x200.jpg)
Apple plugs three actively exploited iOS zero-days
Owners of Apple’s mobile devices are advised to upgrade to iOS version 9.3.5 as soon as possible, as it fixes three zero-day vulnerabilities actively exploited in the …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality