Zeljka Zorz

Twitter suspended 125,000 terrorism-related accounts
Since mid-2015, Twitter has suspended over 125,000 accounts “for threatening or promoting terrorist acts.” Most of these were related to ISIS. “We condemn …

Someone hijacked the Dridex botnet to deliver Avira AV’s installer
After last September’s arrest of an alleged member of the gang that has been developing and spreading the Dridex banking malware, and last October’s temporary …

Mac users beware! Scareware hides behind fake Flash Player update
Mac users are being targeted by scareware peddlers, warns SANS ISC CTO Johannes Ullrich. The malware is delivered in the form of a Flash Player update. The attack starts on …

Fake Amazon survey-for-money offer leads to account compromise
Amazon users are being targeted with a clever phishing email impersonating the retail giant. “As a valued customer we would like to present you with an opportunity to …

Google declares war against deceptive download buttons
There’s likely no Internet user that hasn’t, at some point, been tricked into clicking on a deceptive “download,” “install,” or …

Harnessing artificial intelligence to build an army of virtual analysts
Enterprises of all types and sizes are continually probed and targeted by cyber attackers. It doesn’t matter whether they are after the company’s or their …

Year-old crypto flaw in Socat created a potentially intentional backdoor
A backdoor has been discovered in Socat, a popular open-source network administration tool similar to Netcat, and its unclear how it hasn’t been spotted earlier or at …

Comodo Internet Security installs insecure Chrome-based browser
Google researcher Tavis Ormandy has found more vulnerabilities in yet another security solution. This time it’s Comodo Internet Security and, according to this issue …

Security flaws discovered in smart toys and kids’ watches
Rapid7 researchers have unearthed serious flaws in two Internet of Things devices: The Fisher-Price Smart Toy, a “stuffed animal” type of toy that can interact …

Revelation of security bugs jumpstarts launch of Malwarebytes’ bug bounty program
Malwarebytes CEO Marcin Kleczynski has announced that the company has launched a bug bounty program in an effort to make its software more secure. “The Coordinated …

Google plugs five critical Android vulnerabilities
Google has plugged nine Android security holes with its February Nexus security update. Of these, five are critical, four of high and one of moderate severity. Here’s …

Banning encryption is useless when IoT devices can spy on users
For a while now the US intelligence and law enforcement community has been complaining about the rise of end-to-end encryption, and how it will prevent them from tracking …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility