Zeljka Zorz
Unexpectedly benevolent malware improves security of routers, IoT devices
At this point in time, the existence of a botnet comprising of tens of thousands of compromised routers and other IoT devices is not news. Nevertheless, this latest one mapped …
Stagefright 2.0: A billion Android devices could be compromised
Most Android users are, once again, in danger of having their devices compromised by simply previewing specially crafted MP3 or MP4 files.Zimperium researchers, who were the …
Apple releases OS X El Capitan, patches passcode loophole in iOS
Yesterday Apple released OS X 10.11 El Capitan to end users. With it, the company concentrated more on performance and security instead on new features.Among the security …
Compromising Macs with simple Gatekeeper bypass
Patrick Wardle, director of research at security firm Synack, has discovered a worryingly simple way to bypass OS X’s Gatekeeper defense mechanism: just bundle up a …
The barriers to cybersecurity research, and how to remove them
Earlier this year, a considerable number of computer scientists and lawyers, from academia, civil society, and industry, congregated at UC Berkeley School of Law to take part …
500 million users at risk of compromise via unpatched WinRAR bug
A critical vulnerability has been found in the latest version of WinRAR, the popular file archiver and compressor utility for Windows, and can be exploited by remote attackers …
Scammers use Google AdWords, fake Windows BSOD to steal money from users
Faced with the infamous Windows Blue Screen of Death (BSOD), many unexperienced computer users’ first reaction is panic. If that screen contains a toll free number …
VBA malware is back!
“VBA malware is far from dead. In fact, as Sophos researchers recently noted, approximately 50 to 100 new VBA malware samples are spotted each day. For those who …
Too many vulnerable medical systems can be found online
How many critical medical systems can be found on the Internet, accessible to and hackable by remote attackers? According to security researchers Scott Erven and Mark Collao, …
Chinese fraudsters are hijacking and misusing Uber accounts
Uber accounts continue to be hijacked, this time by Chinese fraudsters. According to Motherboard, a number of users complained recently on Twitter that their accounts have …
Oysters tablet comes preinstalled with Trojanized Android firmware
“Keeping your mobile device free of malware requires intentional care, but sometimes even that is not enough. As Dr. Web researchers recently pointed out, a device you …
Hilton, Trump hotel chains hit by PoS malware
“Payment card data of visitors of a number of Hilton and Trump hotels in the US have been compromised, and some of it is being already used by crooks to rack up …