Zeljka Zorz
![HTML Source Code Viewer](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111302/html_source_code_viewer-400x200.jpg)
Media-stealing Android app targets developers
Symantec researchers have unearthed another app on Google Play that secretly steals photos and videos from victims’ mobile devices. But the curious thing is that it’s …
![Android](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111304/android-400x200.jpg)
How Google protects the Android kernel, and future plans
On Wednesday, Jeff Vander Stoep of Google’s Android Security team took to the official Android Developers blog and shared some information about the defenses they have …
![USA](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111327/usa-400x200.jpg)
Obama defines how the US government will respond to cyber incidents
US president Barack Obama approved on Tuesday the Presidential Policy Directive on United States Cyber Incident Coordination (PPD-41). What’s the PPD-41 all about? …
![Osram Lightify](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111313/osram_lightify-400x200.jpg)
Osram’s intelligent home lighting system is riddled with flaws
“Intelligent” home lighting system Osram Lightify sports a number of security vulnerabilities, some of which could lead to compromise of the product and the …
![LastPass](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111322/lastpass-400x200.jpg)
LastPass zero-day can lead to account compromise
A zero-day flaw in the popular password manager LastPass can be triggered by users visiting a malicious site, allowing attackers to compromise the users’s account and …
![KeySniffer](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111339/keysniffer-400x200.jpg)
Low-cost wireless keyboards open to keystroke sniffing and injection attacks
Bastille Networks researcher Marc Newlin has discovered a set of security vulnerabilities in low-cost wireless keyboards that could be exploited to collect all passwords, …
![modem router](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111333/modem-router-400x200.jpg)
50+ vulnerabilities found in popular home gateway modems/routers
Researcher Gergely Eberhardt with Hungarian security testing outfit SEARCH Laboratory has unearthed over fifty vulnerabilities in five home gateway modems/routers used by …
![https](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195334/https-400x200.jpg)
Amazon Silk browser removes Google’s default encryption
Google’s good intentions of keeping searches made via its search engine protected through default encryption have been stymied by Amazon. A bug in the Amazon Silk …
![Windows UAC alert](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111344/uac-alert-400x200.jpg)
UAC bypass attack on Windows 10 allows malicious DLL loading
Security researchers Matt Graeber and Matt Nelson have discovered a way to run a malicious DLL on Windows 10 without the User Account Control (UAC) springing into action and …
![tor](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111347/tor-bad-HSDirs-big-400x200.jpg)
Researchers discover 110 snooping Tor nodes
In a period spanning 72 days, two researchers from Northeastern University have discovered at least 110 “misbehaving” and potentially malicious hidden services …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111349/flir-featured-400x200.jpg)
Critical holes in Micro Focus Filr found, plugged
Popular enterprise file management and collaborative file sharing solution Micro Focus Filr sports half a dozen security flaws, most of which can be exploited – either …
![WarFrame](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111354/warframe-400x200.jpg)
Warframe, Clash of Kings players’ info stolen after forum hacks
Two new website hack/ user data theft combos have been revealed last week, and the victims are players of popular mobile real time strategy game Clash of Kings and online …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality