Zeljka Zorz
![backdoor](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194522/backdoor-400x200.jpg)
Year-old crypto flaw in Socat created a potentially intentional backdoor
A backdoor has been discovered in Socat, a popular open-source network administration tool similar to Netcat, and its unclear how it hasn’t been spotted earlier or at …
![Comodo Dragon](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194530/comodo-dragon-400x200.png)
Comodo Internet Security installs insecure Chrome-based browser
Google researcher Tavis Ormandy has found more vulnerabilities in yet another security solution. This time it’s Comodo Internet Security and, according to this issue …
![Fisher-Price Smart Toy](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194531/smart-toy-400x200.png)
Security flaws discovered in smart toys and kids’ watches
Rapid7 researchers have unearthed serious flaws in two Internet of Things devices: The Fisher-Price Smart Toy, a “stuffed animal” type of toy that can interact …
![Malwarebytes](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194534/malwarebytes-400x200.png)
Revelation of security bugs jumpstarts launch of Malwarebytes’ bug bounty program
Malwarebytes CEO Marcin Kleczynski has announced that the company has launched a bug bounty program in an effort to make its software more secure. “The Coordinated …
![Android](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194536/android-400x200.jpg)
Google plugs five critical Android vulnerabilities
Google has plugged nine Android security holes with its February Nexus security update. Of these, five are critical, four of high and one of moderate severity. Here’s …
![eye](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195244/eye-400x200.jpg)
Banning encryption is useless when IoT devices can spy on users
For a while now the US intelligence and law enforcement community has been complaining about the rise of end-to-end encryption, and how it will prevent them from tracking …
![NASA](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194545/nasa-400x200.png)
Hackers claim to have hacked NASA, hijacked one of its drones
AnonSec hackers claim that they have breached a number of NASA’s systems, and they have published a data trove containing video recordings made by the agency’s …
![Drone](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194549/done-phantom-400x200.jpg)
Eagles vs drones: A low-tech solution for a high-tech problem?
The Dutch National Police is aware that the use of drones – and the number of drones incidents – is only going to increase as time goes by. So, they are trying to …
![Binary](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195635/binary-sun-400x200.jpg)
UK activists dumps 2.5 GB of data stolen from US police union
Last Thursday, UK-based researcher and activist Thomas White has made available for download 2.5 GB of data stolen in a recent hack of the computer systems of the Fraternal …
![HP](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194736/hp-400x200.jpg)
Is your HP enterprise printer hosting malware for hackers?
“If you’re concerned about security, put your printers are behind a firewall and, if it’s a Hewlett-Packard, make sure port 9100 isn’t open,” says security …
![Android](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195534/android-large-400x200.png)
60+ Trojanized Android games lurking on Google Play
Dr. Web researchers have discovered over 60 Trojanized game apps being offered on Google Play through more than 30 different game developer accounts. The games are made to …
![Bug](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195248/bug-400x200.jpg)
OpenSSL bug that could allow traffic decryption has been fixed
The OpenSSL Project has pushed out new versions of the widely used OpenSSL cryptographic library, which incorporate patches for two distinct security bugs, and an update of …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality