Zeljka Zorz
![password](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194933/password-1-400x200.jpg)
Microsoft bans common passwords
If you’re using the Microsoft Account service to sign into the various services offered by the company, and you tried to set up a too commonly used password, you have …
![European flag](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112250/euflag-400x200.jpg)
Europe’s digital competitiveness depends on free data flow
The European Commission today tabled a package of measures to allow consumers and companies to buy and sell products and services online more easily and confidently across the …
![WhatsApp](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112253/logo-promo-400x200.jpg)
WhatsApp Gold doesn’t exist, it’s a scam that spreads malware
WhatsApp users are once again targeted by malware peddlers, via messages that offer WhatsApp Gold, supposedly an enhanced version of the popular messaging app previously used …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112956/eye-400x200.jpg)
Who’s tracking you online, and how?
Armed with a tool that mimics a consumer browser but is actually bent on discovering all the ways websites are tracking visitors, Princeton University researchers have …
![KeySweeper](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112314/keysweeper-1-400x200.jpg)
FBI warns about keyloggers disguised as USB device chargers
A private industry notification issued by the FBI in late April may indicate that keyloggers disguised as USB device chargers have been fund being used in the wild. The …
![DMA Locker 4.0](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112319/DMALocker4-400x200.jpg)
DMA Locker ransomware ready for mass distribution
According to Malwarebytes’ researcher Hasherezade, we’re in for a lot of pain once the new and improved DMA Locker ransomware starts doing the rounds. Its first …
![Bug](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195653/software-762486_1280-400x200.jpg)
WPAD name collision bug opens door for MitM attackers
A vulnerability in Web Proxy Auto-Discovery (WPAD), a protocol used to ensure all systems in an organization utilize the same web proxy configuration, can be exploited to …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113822/meeting-400x200.jpg)
Tips for evolving your office’s security culture
Changing a corporate security culture, or even just that of your own office or department, can sometimes seem impossible. In general, people don’t like change: they just …
![Hands](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194424/hands-keyboard-400x200.jpg)
OWASP set to address API security risks
OWASP has started a new project and is set to publish a new guide on security risks. The issue they aim to tackle this time is API security. The new OWASP API Security Project …
![ATM](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112424/atm-400x200.jpg)
Criminals stole $12.7 million from ATMs in Japan
In the early morning hours of May 15, 2016, a group of over 100 people executed coordinated, fraudulent ATM withdrawals that netted them about 1.44 billion yen. In a period of …
![signal](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112805/signal-400x200.jpg)
Ubiquiti routers hit by backdoor-generating worm
A worm targeting wireless network equipment developed by US-based Ubiquiti Networks has already managed to compromise thousands of routers across the world. To spread it, …
![Report: The changing face of hacking](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195811/face_of_hacking-400x200.png)
Phineas Fisher records, publishes latest attack
Phineas Fisher, the hacker behing the Gamma International and Hacking Team breaches and data leaks, is at it again. This time his target was Sindicat de Mossos …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality