Zeljka Zorz
How can we decide on surveillance and privacy when we can’t see the whole picture?
“The surveillance of communications faces a legitimization crisis,” says James Losey, a fellow with the Open Technology Institute, the technology program of the …
Regin spyware found on German Chancellery staff’s personal laptop
The German Federal Prosecutor’s Office has started an investigation regarding the discovery of the infamous Regin backdoor on the private laptop owned by a staff member …
TalkTalk hack: Teenager arrested in Northern Ireland
A 15-year-old boy has been arrested in Northern Ireland in connection with the investigation into alleged data theft from the TalkTalk website.“On Monday, 26 October, at …
SHA-2 encryption will make many sites inaccessible to users who can’t afford newer tech
A group of security researchers has recently announced that it’s highly likely that effective collision attacks that would break SHA-1 encryption will be revealed by the …
TalkTalk breach: Attackers demand £80,000 for stolen data
UK Telecom TalkTalk revealed on Friday that its website has suffered an attack, that it has been taken down as a precaution, and that names, addresses, dates of birth, email …
CCTV botnets proliferate due to unchanged default factory credentials
Incapsula researchers have uncovered a botnet consisting of some 9,000 CCTV cameras located around the world, which was being used to target, among others, one of the …
Data of 4 million TalkTalk customers likely stolen in wake of website attack
TalkTalk, one of UK’s biggest telecoms, has suffered a “significant and sustained cyberattack” on their website, and it’s possible that personal and …
Microsoft wants researchers to find bugs in .NET Core and ASP.NET, will pay
Microsoft has launched another specialized bug bounty that’s set to run until January 20th, 2016.Bug hunters, who can earn between $500 and $15,000 depending on the …
New ransomware delivered via Windows Remote Desktop Services
A new type of ransomware – dubbed LowLevel04 – is hitting users in Greece and Bulgaria. It is apparently delivered on the affected computers manually by the …
Apple pushes out critical security updates for OS X, iOS, watchOS, and other products
Apple has released security updates to fix critical vulnerabilities in the following Apple products: OS X El Capitan, Mavericks and Yosemite, OS X Server, Safari, watchOS, …
WikiLeaks publishes documents stolen from CIA director’s email account
CIA Director John Brennan’s private AOL email account has been hacked, apparently by teenage hackers with good social engineering skills.While it seems that the account …
Featured news
Sponsored
Don't miss
- The effect of compliance requirements on vulnerability management strategies
- Modernizing incident response in the AI era
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader