Zeljka Zorz
Ubuntu Forums hacked again, 2 million users exposed
Canonical’s Ubuntu Forums have been hacked, and the attacker has managed to access and download part of the Forums database, containing usernames, email addresses and …
Pokémon GO-themed malicious apps lurk on Google Play
Researchers have discovered three malicious apps taking advantage of Pokémon GO’s immense popularity, offered for download on Google Play. Google has already removed …
Android Trojan prevents victims from calling their banks
Some malware prevents victims to visit sites from which they could download antivirus software, or kills AV software found running on the infected machines and devices. Newer …
US DOJ can’t access data stored abroad with just a warrant, court rules
The US Department of Justice cannot force Microsoft to produce the contents of a customer’s email account stored on a server located outside the US with just a warrant, a US …
Riffle: A new anonymity system to rival Tor
A group of researchers from MIT and the Swiss Federal Institute of Technology in Lausanne have come up with a new anonymity system that is both bandwidth and computation …
Tor Project gets whole new board of directors
Tor Project’s entire board of directors has stepped down and announced their successors. Among them are the noted “security guru” Bruce Schneier and Cindy …
“I agree to these terms and conditions” is the biggest lie on the Internet
Two communications professors have proven what we all anecdotally knew to be true: the overwhelming majority of Internet users doesn’t read services’ terms of …
Microsoft splats bug that turns printers into drive-by exploit kits
In this month’s Patch Tuesday, Microsoft has released 11 sets of patches – 6 “critical” and 5 “important.” The good news is that none of …
Shard: Open source tool checks for password re-use
Security researcher Philip O’Keefe has created a tool that allows users to check whether they have reused a password on multiple accounts. The impetus behind the …
Researchers create effective anti-ransomware solution
Are you willing to sacrifice a dozen or so of your files in order to save the rest from the grasping hands of modern crypto-ransomware? I believe that the answer from most …
Pokémon GO gets full access to players’ Google account
Pokémon GO, the mobile augmented reality game that has become hugely popular in record time, brings with it a lot of unexpected dangers. Its popularity has been exploited by …
System monitoring company Datadog suffers breach
The team behind Datadog, a widely used SaaS-based monitoring and analytics platform for IT infrastructure, operations and development teams, has announced on Friday that they …
Featured news
Sponsored
Don't miss
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA