Zeljka Zorz
![WhatsApp](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112253/logo-promo-400x200.jpg)
WhatsApp will share your phone number with Facebook
For the first time in four years, WhatsApp is updating its Terms of Service and Privacy Policy, and the big news is that the messaging service will share users’ phone …
![rings](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113023/rings-400x200.jpg)
Mail.ru, Funcom gaming forums hacked, user databases stolen
Vulnerabilities in older versions of the popular vBulletin Internet forum software are being exploited left and right, and data of millions of forum users is being pilfered …
![Twitter malware](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110857/twitter-malware-400x200.jpg)
Twitter-controlled Android backdoor delivers banking malware
A backdoor Trojan named Twitoor is the first instance of Android malware that receives its commands from a Twitter account. Keeping their botnet out of law enforcement’s …
![skull](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112756/money-skull-400x200.jpg)
UK universities hit repeatedly with ransomware, one over 21 times!
63 percent of UK universities have been hit by ransomware – most of them multiple times, and Bournemouth University a total of 21 times in the last year, SentinelOne has …
![radio mast](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110901/radio-mast-400x200.jpg)
Hackers can easily take over cellphone towers, researchers found
Zimperium researchers have unearthed three critical vulnerabilities in widely used software running on base transceiver stations (BTS), i.e. the equipment that makes cellphone …
![fire](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194739/fire-400x200.jpg)
Leaked EXTRABACON exploit can work on newer Cisco ASA firewalls
EXTRABACON, one of the Equation Group exploits leaked by the Shadow Brokers, can be made to work on a wider range of Cisco Adaptive Security Appliance (ASA) firewalls than …
![Juniper Networks](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195617/juniper-400x200.jpg)
Implant leaked by Shadow Brokers targets Juniper’s NetScreen firewalls
Juniper Networks has become the latest company to acknowledge that one of the implants leaked by the Shadow Brokers targets some of their products. Cisco and Fortinet did the …
![Epic Games](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110920/epic_games-400x200.jpg)
Epic Games forums hacked again, over 800,000 users affected
Some of the online forums maintained by Epic Games, the video game development company behing the Unreal Engine technology and games based on it, have been hacked and their …
![Android 7.0 Nougat](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110923/android-nougat-400x200.jpg)
Android 7.0 Nougat is out, with new security features
Google has released Android 7.0 Nougat, and the newest version of the popular mobile OS is already being rolled out to Google’s existing Nexus devices. “Today, and …
![TeamViewer](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110930/teamviewer-biohazard-400x200.jpg)
Backdoor uses TeamViewer to spy on victims
A backdoor Trojan with spying capabilities that has been previously directed against European and Russian users is now being lobbed at US users, Dr. Web researchers have …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111125/data-400x200.jpeg)
Snowden documents definitely link Shadow Brokers’ leak to the NSA
Last week, Cisco and Fortinet confirmed that the exploits leaked by the Shadow Brokers and aimed at compromising their networking devices work as intended, but the origin of …
![threat hunting](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113059/threat-hunting-400x200.jpg)
Open sourced: Cyber reasoning system that won third place in DARPA’s Cyber Grand Challenge
Earlier this month, the DARPA-backed Cyber Grand Challenge (CGC) has shown that a future in which computer systems will (wholly or partially) replace bug hunters and patchers …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality