Zeljka Zorz

OAuth2.0 implementation flaw allows attackers to pop Android users’ accounts
Incorrect OAuth2.0 implementation by third party mobile app developers has opened users of those apps to account compromise, three researchers from the Chinese University of …

Bug in Chrome for mobile exploited for drive-by Android malware downloads
Users of the mobile version of Google Chrome should be extra careful when faced with unsolicited offers to install a popular app, Kaspersky Lab researchers warn. Cyber crooks …

Dutch police takes over darknet market, posts warning
As law enforcement agencies around the world continue taking down online markets on the Dark Web, the Dutch National Police and the nation’s Public Prosecution Service …

Review: The Basics of Cyber Safety
About the authors John Sammons is an Associate Professor and Director of the undergraduate program in Digital Forensics and Information Assurance at Marshall University in …

Tech support scammers use old bug to freeze browsers
Tech support scammers are exploiting a bug that maxes out users’ CPU and memory capability and effectively freezes the browser and possibly the computer, in an attempt …

20,000 affected by Tesco Bank security breach
It’s been a rough weekend for 20,000 customers of British retail Tesco Bank: they’ve witnessed their bank accounts being plundered and have been phoning the bank …

14 arrested for laundering millions stolen with malware
The UK National Crime Agency (NCA) has arrested fourteen individuals suspected of laundering more than £11 million stolen through the use of malware. The money was stolen …

Nigerian scammers: Then and now
The image that the expression “Nigerian scammer” conjures up in most people’s heads is still that of the confidence man behind the keyboard, convincing …

Microsoft extends support for EMET, but its days are numbered
The days of EMET, Microsoft’s Enhanced Mitigation Experience Toolkit for Windows, are numbered. Although, the company has listened to the customers’ pleas, and is …

GitLab plugs critical flaw in its code repository manager software
GitLab (the company) has pushed out security updates for both the Community Edition (CE) and Enterprise Edition (EE) of the GitLab software, fixing a critical security flaw in …

Firefox to prevent sites from tracking users by checking their battery status
Version 52 of the popular Firefox browser will no longer allow websites to access the Battery Status API and the information it can provide about the visitor’s device. …

Android spyware targets business executives
Overreliance on smartphones, both in out personal and professional lives, is a reality for many of us. These devices hold a lot of sensitive information – information …
Featured news
Resources
Don't miss
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence
- Misconfig Mapper: Open-source tool to uncover security misconfigurations
- Why AI deployment requires a new level of governance