Zeljka Zorz
Mobile forensics firm Cellebrite confirms data breach
Israeli mobile forensics firm Cellebrite has announced that it has suffered a data breach following an unauthorized access to an external web server. “The impacted …
Shadow Brokers say goodbye, leak a batch of Windows hacking tools
The Shadow Brokers, a group (?) of hackers that has made a big splash in August last year by leaking and offering for sale exploits supposedly stolen from the infamous …
FDA urges patients to implement patch to secure their cardiac implants
Patients who have been implanted with pacemakers and defibrillators manufactured by US-based St. Jude Medical are urged to make sure that their Merlin@home Transmitter unit is …
Brother and sister arrested for spying on Italian politicians for years
Two Italian siblings have been arrested on Monday and stand accused of having spied on Italian politicians, state institutions and law enforcement agencies, businesses and …
Amazon scammers hijack seller accounts, lure users with good deals
Amazon buyers are being targeted by clever scammers that either set up independent seller accounts or hijack those of already established, well-reputed sellers, then offer …
Nagios Core 4.2.4 closes serious root privilege escalation bug
If you’re using Nagios Core to monitor your systems, networks and infrastructure, and you have not updated to version 4.2.4, you better hop to it. This latest release …
Malvertising campaign compromises routers instead of computers
The DNSChanger exploit kit is back and more effective than ever, and is being used in a widespread malvertising attack whose goal is to compromise small/home office routers. …
Evernote employees will be able to read notes only if users allow it
Evernote has recently announced that, starting on January 23, 2017, Evernote users’ unencrypted notes will be accessible to some Evernote employees. The change to the …
One billion users affected in newly revealed Yahoo hack
Yahoo has revealed that it’s been the victim of another hack and massive data breach that resulted in the compromise of information of a billion users! What happened? …
Google publishes eight national security letters
Have you ever wondered what a national security letter (NSL) received by Google looks like? Well, wonder no more, as the Internet giant has published eight of them. Along with …
Joomla vulnerability can be exploited to hijack sites, so patch now!
If you’re running a website on Joomla, you should update to the newly released 3.6.5 version as soon as possible – or risk your site being hijacked. The newest …
ENISA says crypto backdoors are a bad idea
“History has shown that technology beats legislation, and criminals are best placed to capitalise on this opportunity,” the European Network and Information …
Featured news
Sponsored
Don't miss
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA
- Choosing the right secure messaging app for your organization
- Zero-day data security