Zeljka Zorz

New PowerPoint malware delivery technique tested by spammers
A spam run detected by several security companies has attempted to deliver malware through an innovative technique: a link in a PowerPoint slideshow. The attack unfolds like …

Al-Jazeera reportedly hit by systematic hacking attempts
Al-Jazeera, the Doha-based broadcaster owned by the ruling family of Qatar, says the websites and digital platforms of Al Jazeera Media Network, its parent company, “are …

Email-borne threats: Watch your inbox closely on Thursdays
Malicious email attachment message volume spikes more than 38% on Thursdays over the average weekday volume. Ransomware attackers in particular favor sending malicious …

Foscam IP cameras riddled with gaping security holes
F-Secure researchers have discovered a bucketload of serious security vulnerabilities affecting IP cameras made by Chinese manufacturer Foscam. Even though notified months …

Malicious ads trigger drive-by download of persistent Android adware
UK and US Android users have been saddled with unwanted apps via malicious ads that executed a drive-by download attack. According to Zscaler researchers, the malicious ads …

GnuPG developers start new fundraising effort
Werner Koch and his team of GnuPG developers are asking for funding for the continued development of the popular free email and data encryption software. What is GnuPG, and …

Unprotected database exposes VINs, owner info of 10 million cars
A database containing information on 10 million cars sold in the US and personal information about their owners has been found exposed online. The unprotected database was …

Backdoored Firefox extension checks Instagram for C&C info
Turla, an APT cyberespionage group that has been targeting corporations, intelligence and other government agencies for years, is using a malicious Firefox extension to …

Google CTF 2017 announced: Test your skills!
Google has announced the 2017 edition of its Capture The Flag (CTF) competition. As before, the event is divided into two rounds: The qualification round, to be held online on …

Introducing security into software through APIs
Application programming interfaces (APIs) can make life easier for software developers, allowing them to concentrate on what they do best and preventing them from being forced …

What’s really stopping users from adopting secure communication tools?
“Users’ goal to communicate with others overrides everything else, including security,” a group of researchers has concluded after interviewing sixty individuals …

US visa applicants will have to provide social media handles
US consular officials have been provided with a new questionnaire that they can give selected visa applicants to complete. Among other things, Form DS-5535 requires applicants …
Featured news
Resources
Don't miss
- Avoiding vendor lock-in when using managed cloud security services
- The CISO’s dilemma of protecting the enterprise while driving innovation
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence