Zeljka Zorz
![Netgear D6000](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111939/Netgear-D6000-400x200.jpg)
Netgear removes crypto keys hard-coded in routers
Qualys security researcher Mandar Jadhav has discovered two serious vulnerabilities in Netgear D6000 and D3600 modem routers, which can be exploited to gain access to the …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111951/smart-tv-android-ransomware-400x200.jpg)
Ransomware targets Android smart TVs
If you own a Sharp and Philips smart TV running the Android TV OS, you should know that it could be hit by FLocker, a device-locking ransomware that targets both …
![SourceForge](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112004/sourceforge-400x200.jpg)
Can SourceForge win developers’ trust back?
SourceForge is under new ownership and management (again!), and their plan is to return the service to its former glory. The past Once the preferred source code repository and …
![users](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112303/users-1-400x200.jpg)
Let’s Encrypt CA inadvertently leaks users’ email addresses
Let’s Encrypt, the non-profit Certificate Authority (CA) that helps website administrators switch from HTTP to HTTPS quickly and effortlessly, has accidentally leaked …
![biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112007/biohazard-2-400x200.jpg)
Crysis ransomware fills vacuum left by TeslaCrypt
TeslaCrypt has reached the end of the road, and other ransomware is ready to fill the vacuum left behind it. A relative newcomer to the market, Crysis ransomware is already …
![Mozilla](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112512/mozilla-400x200.jpg)
Mozilla will fund code audits for open source software
The Mozilla Foundation has set up the Secure Open Source (SOS) Fund, whose aim is to help open source software projects get rid their code of vulnerabilities. “The Fund …
![professional](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113147/job_hunt-400x200.jpg)
BEC scams: What you need to know
Ransomware attacks hitting businesses and institutions might be the latest trend, but they are just one of the threats these organizations have to protect themselves against. …
![Google Chrome](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112836/google-chrome-400x200.jpg)
Bug in Chrome’s PDF reader allows arbitrary code execution
Vulnerabilities in software often arise from faulty implementations of elements developed by other code writers. Take for example CVE-2016-1681, the heap-based buffer overflow …
![password](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194933/password-1-400x200.jpg)
32m Twitter login credentials stolen from users
Leaked Source has added 32,888,300 records of Twitter users to its repository of leaked data. The source of the batch is a user who goes by the alias …
![Money](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112829/money-laptop-400x200.jpg)
University pays $20,000 in ransomware attack
The ransomware plague has hit the University of Calgary, and the academic institution did what many victims do: they paid the ransom to get the encrypted files back. The …
![biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112030/biohazard-1-400x200.jpg)
Fake gaming torrents download unwanted apps instead of popular games
If you’re looking for torrents to download pirated copies of popular games, be extra careful not to be tricked into downloading malicious and unwanted software instead. …
![usa passport](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113315/usa-passport-400x200.jpg)
US-bound travelers looking for a visa might get a RAT instead
F-Secure researchers have discovered that travelers who applied for a US Visa in Switzerland have recently been targeted by cyber-criminals wielding the latest version of the …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality