Zeljka Zorz
A slew of LTE 4G vulnerabilities endanger Android users and mobile carriers
As an ever increasing number of mobile carriers around the world switches to from using GSM/UMTS networks to Long-Term Evolution (LTE 4G) ones, both carriers and users are …
IS hackers are attacking the US energy grid
The US energy grid is under cyber attack from Islamic State hackers but fortunately, these attacks end up in failure because the hackers are simply not skilled enough to do …
Cops are turning to privately held DNA databases for info to help with investigations
For those people who are worried about privacy and know how these things usually work out, the fact that Ancestry.com and 23andMe offered DNA analyzing services for genealogy …
Emergency Flash update plugs zero-day exploited in the wild
Adobe released a Flash Player update to fix the zero-day vulnerability that has been spotted being exploited by Pawn Storm hackers.The latest version of Flash Player for …
Facebook starts warning users of state-sponsored attacks against their accounts
Facebook will begin alerting its users when their account is being targeted or compromised by an attacker suspected of working on behalf of a nation-state.“While we have …
Point-and-shoot weapon stops drones without destroying them
Unmanned aerial vehicles – so-called drones – can be helpful, malicious, or simply disruptive, depending on the intentions of those who use them.But while regular …
Data dump points to a breach at Electronic Arts
Account details of some 600 Electronic Arts (EA) customers have apparently been leaked on Pastebin. The company has yet to confirm whether the leak is genuine. “At this …
Cyber warfare fears spur US Navy to teach celestial navigation again
After Sony was hacked and the stolen emails leaked, some US companies began urging workers to revert to using phone calls and face-to-face meetings for sensitive discussions. …
Attackers can use Siri, Google Now to secretly take over smartphones
A team of researchers from the French Network and Information Security Agency (ANSSI) has devised a way to covertly exploit the Siri and Google Now voice activated personal …
USB Killer 2.0: A harmless-looking USB stick that destroys computers
Plugging in random USB sticks in your computer has never been more dangerous, as a researcher who goes by the name Dark Purple has demonstrated his new device: USB Killer …
Microsoft fixes critical flaws in all versions of Windows and Office
This month’s Microsoft Patch Tuesday brings fixes for 33 vulnerabilities. Nearly half of those are found in Internet Explorer, and most of them are critical as they …
Hackers are exploiting zero-day flaw in fully patched Adobe Flash
Adobe has released on Tuesday security updates that address multiple vulnerabilities in Reader, Acrobat, and Flash Player. Unfortunately, among the holes plugged in Flash …
Featured news
Sponsored
Don't miss
- Shuffle Automation: Open-source security automation platform
- Cyber insurance 2.0: The systemic changes required for future security
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization