Zeljka Zorz
Xen Project plugs critical host hijacking flaw, patch ASAP
The latest security update (XSA-145 through 153) for the popular Xen virtualization software fixes nine issues. Eight of them can lead to Denial of Service, but the ninth is …
European Parliament members want member states to protect Edward Snowden
Too little has been done to safeguard citizens’ fundamental rights following revelations of electronic mass surveillance, members of the European Parliament have stated …
UK dating fraud victims lost £33,5 million last year
Action Fraud, UK’s national fraud and Internet crime reporting centre, and the City of London Police have started a Twitter campaign with the aim of teaching people …
.onion officially registered as special-use domain name by the IETF
By publishing the RFC 7686 standard, the Internet Engineering Task Force (IETF) has formally recognized the .onion domain as a special-use domain name. “Over the last …
Domain name holders hit with personalized, malware-laden suspension notices
A clever new email spam campaign has been spotted targeting domain name holders, trying to trick them into downloading malware on their systems.The emails take the form of a …
Hackers put up for sale 13 million plaintext passwords stolen from 000webhost
000webhost, a popular free web hosting service, has suffered a data breach that resulted in the compromise of the name, email address and plaintext password of some 13 million …
Attackers are turning MySQL servers into DDoS bots
Someone has been compromising MySQL servers around the world and using them to mount DDoS attacks. The latest targets of these attacks are an (unnamed) US hosting provider and …
US Library of Congress makes tinkering with your car software legal
The US Digital Millennium Copyright Act (DMCA) makes it illegal to circumvent technological measures used to prevent unauthorized access to copyrighted works. But, there are …
Europe’s new “net neutrality” regulation is full of loopholes
The European Parliament voted yesterday for a Regulation on a Single Market for Electronic Communications. The new regulation brings a complete ban on roaming charges for …
How can we decide on surveillance and privacy when we can’t see the whole picture?
“The surveillance of communications faces a legitimization crisis,” says James Losey, a fellow with the Open Technology Institute, the technology program of the …
Regin spyware found on German Chancellery staff’s personal laptop
The German Federal Prosecutor’s Office has started an investigation regarding the discovery of the infamous Regin backdoor on the private laptop owned by a staff member …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility