Zeljka Zorz
![Facebook](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111728/facebook-1-400x200.jpg)
Privacy pitfalls of Facebook using your location to suggest friends
If you are a Facebook user and you haven’t guessed by now that it will sometimes suggest “friends” based on the fact that you happened to be at the same …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112750/bomb-400x200.jpg)
25,000-strong CCTV botnet used for crippling DDoS attacks
A DDoS attack against a jewelry shop website has lead researchers to the discovery of a CCTV botnet comprised of some 25,000 cameras from around the globe. The website had …
Android-rooting malware lurking on Google Play
For a while now Android-rooting malware has been creeping in Google’s Play store. The latest instance, discovered by Lookout researchers, masquerades as LevelDropper, an …
![UK map](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195536/map-1019896_1280-400x200.jpg)
UK banking customers targeted with Retefe Trojan with MitM capabilities
UK users are the latest targets of cyber crooks leveraging the Retefe banking Trojan and a rogue root certificate. The malware is out to steal online banking credentials of …
![uber bugs](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111743/uber-bugs-400x200.jpg)
14 bugs in Uber’s assets revealed sensitive info about drivers, riders
Researchers from consulting and technological audit outfit Integrity have discovered 14 bugs in a variety of Uber’s websites and mobile apps, most of which could reveal …
![DHS](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111746/dhs-400x200.jpg)
US Customs wants to know travelers’ social media account names
The US Customs and Border Protection agency has submitted a request to the Office of Management and Budget, asking for permission to collect travelers social media account …
![NASCAR](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111750/nascar-400x200.jpg)
NASCAR team falls victim to ransomware, pays ransom
Most US businesses would perhaps not pay in the event of a ransomware attack, but Circle-Sport Leavine Family Racing (CSLFR), a professional NASCAR car racing team, is not one …
![USA flag](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112438/usa-flag-400x200.jpg)
FBI doesn’t need a warrant to hack a suspect’s computer, US judge rules
A senior US district judge has decided that the warrant authorizing the search of a suspect’s home computer by the FBI was issued based of probable cause, but even if it …
![rings](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113023/rings-400x200.jpg)
Exfiltrating data from air-gapped computers by modulating fan speed
For the last few years, researchers from Ben-Gurion University of the Negev have been testing up new ways to exfiltrate data from air-gapped computers: via mobile phones, …
![Nexus](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113041/nexus-400x200.jpg)
Your nearest and dearest are snooping on your phone
If you needed one more reason for protecting your phone with a passcode or fingerprint, here it is: there’s a good chance that one or more of the people close to you …
![USA flag](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112438/usa-flag-400x200.jpg)
154 million US voter records exposed following hack
MacKeeper security researcher Chris Vickery has discovered yet another database containing voter profiles of US citizens, accessible to anyone who stumbled upon it or knew …
![tools](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112051/tools-400x200.jpg)
Severe flaws patched in libarchive, dependent projects urged to follow
Three severe bugs that could be easily exploited to perform arbitrary code execution have been patched with version 3.2.1 of the libarchive open source multi-format archive …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality