Zeljka Zorz
![Apple](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113648/apple-400x200.jpg)
New Mac OS X backdoor disguised as document converter app
Bitdefender researchers have discovered and analyzed a new, highly dangerous piece of malware targeting Mac systems and users. The malware, dubbed “Eleanor,” opens …
![explode](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113434/explode-400x200.jpg)
Exploit for GNU wget RCE flaw revealed
Technical details about a serious vulnerability affecting all but the latest version of the GNU wget software have been released online, along with PoC exploit scenarios. …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194835/iot-400x200.png)
Netherlands, South Korea get nationwide IoT network
In the space of a week, the Netherlands and South Korea got their own, nationwide IoT network. Late last week, Dutch telecom KPN announced that its LoRa (Long Range) network …
![TPLINK admin](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111643/tplink-admin-400x200.jpg)
TP-LINK loses control of two device configuration domains
Security researcher Amitay Dan warns that tplinklogin.net, a domain through which TP-LINK router owners can configure their devices, is no longer owned by the company, and …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111645/zepto-ransom-note-400x200.jpg)
Locky ransomware variant Zepto hits users via email
A new version of Locky ransomware that has been dubbed “Zepto” due to the .zepto extension added to encrypted files is successfully extorting users around the …
![Android Marshmallow](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194956/android-marshmallow-400x200.jpg)
How online learning algorithms can help improve Android malware detection
A group of researchers from Nanyang Technological University, Singapore, have created a novel solution for large-scale Android malware detection. It’s called DroidOL, …
![LibreOffice](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111701/libreoffice-400x200.jpg)
Easily exploitable LibreOffice flaw is a godsend for hackers
A serious LibreOffice flaw can be easily exploited by attackers to deliver malware on computers running a vulnerable version of the popular free and open source office suite. …
![windows10 anniversary update](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111714/windows10-anniversary-400x200.jpg)
Windows 10 Anniversary Update brings security improvements
Microsoft has scheduled the release of Windows 10 Anniversary Update for August 2. Aside from new and/or improved tools to aid with productivity, gaming, device set-up, and a …
![skull](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112155/skull-400x200.jpg)
Rooting Hummer malware brings $500,000 per day to its creator
Android malware with device rooting capabilities has been hitting Google Play for a while now, but for users third-party app stores the situation is even more dangerous. The …
![facepalm](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113615/facepalm-400x200.png)
New Russian law to force service providers to decrypt encrypted comms
An extremely wide-ranging anti-terrorism law has been passed last week by the lower house of the Russian Federal Assembly (i.e. parliament), and it is widely expected to pass …
![World-Check](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111719/world-check-400x200.jpg)
World-Check crime and terror database exposed online
Security researcher Chris Vickery, who has become well-known for unearthing databases that should not be accessible via the Internet but are, has found another one that …
![Symantec](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112435/symantec-400x200.jpg)
Symantec, Norton AV products are riddled with serious flaws
Google security researcher Tavis Ormandy has unearthed a slew of critical vulnerabilities, including many remote code execution flaws, in Symantec and Norton enterprise and …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality