Zeljka Zorz
![Money](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195100/money-400x200.jpg)
Russian hackers used malware to manipulate the Dollar/Ruble exchange rate
Russian-language hackers have managed to break into Russian regional bank Energobank, infect its systems, and gain unsanctioned access to its trading system terminals, which …
![Java](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194448/java-400x200.png)
Oracle pushes out emergency fix for Java SE
Oracle has patched a vulnerability (CVE-2016-0603) in Java SE (Standard Edition) 6, 7 or 8 on the Windows platform, which could be exploited by attackers looking for ways to …
![Department of Justice](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194450/doj-400x200.png)
Info on 20,000 FBI and 9,000 DHS employees leaked following alleged DoJ hack
On Sunday, Motherboard reported that a hacker contacted them and claimed to have hacked into a US Department of Justice (DoJ) computer, exfiltrated 200GB of files, as well as …
![malware](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194453/malware-400x200.jpg)
Dyre gang taken down by Russian authorities
Dyre (aka Dyreza), one of the most widespread and effective financial Trojans to crop up in the last few years, is currently not an active threat. In fact, spam campaigns …
![Bitcoin](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194501/Bitcoin-400x200.png)
Loanbase hacked via WordPress hole, funds stolen
Popular international Bitcoin crowd-lending platform Loanbase has suffered a security breach, and is currently offline. The breach was discovered on Saturday and made public …
![Skype](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194503/skype-400x200.png)
T9000 backdoor steals documents, records Skype conversations, victims’ actions
A new backdoor Trojan with spyware capabilities is being used in targeted attacks against organizations based in the United States. It has been dubbed T9000, since it’s …
![Twitter](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194505/twitter-logo-400x200.jpg)
Twitter suspended 125,000 terrorism-related accounts
Since mid-2015, Twitter has suspended over 125,000 accounts “for threatening or promoting terrorist acts.” Most of these were related to ISIS. “We condemn …
![Business ideas](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195343/compliance-400x200.jpg)
Someone hijacked the Dridex botnet to deliver Avira AV’s installer
After last September’s arrest of an alleged member of the gang that has been developing and spreading the Dridex banking malware, and last October’s temporary …
![Apple](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194510/apple-400x200.jpg)
Mac users beware! Scareware hides behind fake Flash Player update
Mac users are being targeted by scareware peddlers, warns SANS ISC CTO Johannes Ullrich. The malware is delivered in the form of a Flash Player update. The attack starts on …
![Amazon](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194512/amazon-400x200.png)
Fake Amazon survey-for-money offer leads to account compromise
Amazon users are being targeted with a clever phishing email impersonating the retail giant. “As a valued customer we would like to present you with an opportunity to …
![Google](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195049/google-400x200.jpg)
Google declares war against deceptive download buttons
There’s likely no Internet user that hasn’t, at some point, been tricked into clicking on a deceptive “download,” “install,” or …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194518/brain-400x200.jpg)
Harnessing artificial intelligence to build an army of virtual analysts
Enterprises of all types and sizes are continually probed and targeted by cyber attackers. It doesn’t matter whether they are after the company’s or their …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality