Zeljka Zorz
NSA spied on world leaders, UN, EU officials
A set of highly classified documents recently published by WikiLeaks show how the NSA spied on a number of high ranking officials of the UN, UNHCR, WTO, NATO, the EU and …
Sensitive child profiles, private messages exposed online
Security researcher Chris Vickery has discovered another database containing sensitive user data exposed online (i.e. accessible via Internet). Leveraging Shodan, he unearthed …
German police allowed to use its own “federal Trojan”
The German Interior Ministry has approved for investigative use a spying Trojan developed by the German Federal Criminal Police (a so-called “federal Trojan”). In …
Source code of “game changer” Android banking malware leaked online
If you ask users and malware analysts, the Android threat landscape is wide enough, but unfortunately it’s likely to get even wider as source code for the GM Bot banking …
Apple to US govt: Withdraw demand for iPhone unlocking, we all need to talk first
The battle between Apple and the US Justice Department continues, as the company still refuses to help the feds access the contents of a PIN-locked iPhone used by gunman Syed …
Pirated App Store client for iOS found on Apple’s App Store
An app called 开心日常英语 (“Happy Daily English”), which has been offered for download via Apple’s official App Store, has been revealed to be a fully functional …
Linux Mint hack: Backdoored ISOs, stolen forums database
The web properties of the project developing Linux Mint have been compromised, and the attacker managed to put up a backdoored version of the distro for download for a little …
IRS warns of 400 percent surge in tax-related phishing emails
The number of tax related phishing and malware incidents has exploded this US tax season, the US Internal Revenue Service (IRS) has warned on Thursday. All in all, there has …
DHS releases guidelines for CISA-sanctioned cybersecurity information sharing
The US Department of Homeland Security has published guidelines on how the private sector and federal entities can share cyber threat indicators (CTIs) with the US federal …
3-in-1 Android malware acts as ransomware, banking Trojan and infostealer
Why stop at asking ransom for encrypted files when you can also steal personal info, passwords, online banking credentials and credit card details, and then sell it or use it …
Ransomware offers customer support via chat
PadCrypt, a newly discovered piece of ransomware, offers the victims the possibility to chat with the criminals behind the scheme. This ransomware, as many before it, presents …
E-commerce web apps vulnerable to hijacking, database compromise
High-Tech Bridge researchers have published details and PoC exploit code for several serious vulnerabilities in Osclass, osCmax, and osCommerce, three popular open source …
Featured news
Sponsored
Don't miss
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA