Zeljka Zorz
Fake iPhone order dispatch confirmations hitting inboxes
Fake dispatch confirmation emails for a bogus order of an iPhone from Apple’s App Store are hitting inboxes, warns Hoax-Slayer. This is just the latest variant of the …
Apple finally announces bug bounty program
Apple is finally going to monetarily reward security researchers for spotting and responsibly disclosing bugs in the company’s products. The announcement that a bug …
MineMeld: The “Swiss army knife” of threat intelligence feeds
Palo Alto Networks has made publicly available MineMeld, an open source, community supported framework that can simply your consumption and sharing of threat intelligence. …
Security awareness training or no, users will keep clicking on dodgy links
There is no way to make humans never click on potentially dangerous links they receive, as the right combination of curiosity, context, and emotions will always beat security …
Researchers continue hacking cars, and start on heavy vehicles
When Charlie Miller and Chris Valasek demonstrated a year ago how they can remotely exploit vulnerabilities in Chrysler’s 2014 Jeep Cherokee, and fiddle with its wipers, …
Impatient users saddled with malicious copycats of popular Prisma app
If an iOS app gains extreme popularity but still does not come in a version for Android, it can be practically guaranteed that malware peddlers and scammers will take …
$77 million in Bitcoin stolen from Bitfinex exchange
Popular Hong Kong-based cryptocurrency exchange Bitfinex has suffered a security breach that resulted in the theft of millions’ worth of Bitcoin. 119,756 BTC, to be exact, …
Hackers compromised Telegram accounts, identified 15 million users’ phone numbers
Hackers have managed to compromise over a dozen Telegram accounts belonging to Iranian political activists and identify phone numbers tied to 15 million Iranian Telegram …
To stop ransomware, opt for app graylisting and admin rights removal
CyberArk Labs tested over 23,000 ransomware samples from more than 30 prevalent malware families, including Cryptolocker, Petya and Locky, in order to better understand common …
Kaspersky Lab launches public bug bounty program
Kaspersky Lab is asking researchers to look under the hood of two of its flagship security solutions and to report any bugs they might find. Kaspersky’s bug bounty …
Android users to be warned of suspect Google account activity in real-time
Android users will soon enjoy an additional security layer that will allow them to quickly discover that their Google account might have been compromised. The feature will be …
How US, UK SMBs keep company passwords safe
AVG’s Business division has asked 381 of their small-to-medium business customers in the US and UK sixteen questions about their password-protection policies and …
Featured news
Sponsored
Don't miss
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA
- Choosing the right secure messaging app for your organization
- Zero-day data security