Zeljka Zorz
Samsung Galaxy S8 iris scanner can be fooled with a printed photo
After demonstrating how easily Apple’s Touch ID can be fooled with a user fingerprint photographed from a glass surface, Chaos Computer Club (CCC) hacker …
1Password Travel Mode protects passwords from border agents
1Password has created Travel Mode, a new feature that will allow users to protect their 1Password data from unwarranted searches when they travel. The need for such a feature …
More links between WannaCry and Lazarus group revealed
Symantec researchers have found more links between WannaCry ransomworm and Lazarus, the hacking group believed to be behind the 2014 attack on Sony Pictures and the 2016 …
SCADA systems plagued by insecure development and slow patching
“Behind most modern conveniences, there exists a SCADA system somewhere that controls them,” Trend Micro researchers pointed out in a new report that delves in the …
Highest European CISO salaries set to reach €1 million
Chief Information Security Officers supervise information systems for their organization, and are in charge of coming up with, proposing, and implementing workable solution …
The privacy threat of IoT device traffic rate metadata
Even though many IoT devices for smart homes encrypt their traffic, a passive network observer – e.g. an ISP, or a neighborhood WiFi eavesdropper – can infer …
Software security assurance: Everybody’s invited
As more and more things in this world of ours run on software, software security assurance – i.e. confidence that software is free from vulnerabilities (either …
There’s now a WannaCry decryptor tool for most Windows versions
As the criminals behind the WannaCry ransomware are trying to make it work again, security researchers have created tools for decrypting files encrypted by it. DDoS attacks …
A Windows XP bug makes it possible to recover files encrypted by WannaCry
In an unusual turn of events, a Windows bug has been found to work in favor of victims instead of attackers, allowing WannaCry victims that run Windows XP to decrypt the files …
Number of HTTPS phishing sites triples
When, in January 2017, Mozilla and Google made Firefox and Chrome flag HTTP login pages as insecure, the intent was to make phishing pages easier to recognize, as well as push …
Who’s responsible for fixing SS7 security issues?
The WannaCry ransomware onslaught has overshadowed some of the other notable happenings this month, including the spectacular Google-themed phishing/spamming attack, and the …
17 million Zomato accounts for sale following breach
Popular restaurant search and discovery service Zomato has suffered a breach, and the attackers made off with 17 million user records. What data was compromised? These records …