Zeljka Zorz
Major browser makers synchronize end of support for RC4
Mozilla, Google and Microsoft have come to an agreement: support for the increasingly vulnerable RC4 cryptographic cypher in the companies’ browsers will end in early …
Popular Android AppLock app full of gaping security holes
AppLock, by DoMobile, is a very popular Android app for limiting access to certain content on the device (text messages, photos, videos, etc.). The user decides what content …
0-days found in widely used Belkin router, fixes still unavailable
CERT/CC has issued a warning about the existence of several serious zero-day vulnerabilities affecting the popular Belkin N600 routers, and has offered advice on how users can …
Adware installer gives itself permission to access Mac users’ keychain
“Malwarebytes researcher Adam Thomas has made an interesting discovery: an adware installer created by Genieo, a well-known distributor of unwanted software, is taking …
An emerging global threat: BEC scams hitting more and more businesses
As more and more victims come forward, and the losses sustained by firms in the US and around the world passed the billion dollar mark, the FBI is once again warning …
Ashley Madison-themed blackmail, data deletion scams hitting inboxes
In the wake of the Ashley Madison hack and consequent data leaks, blackmailers and scammers are doing their best to extract as much money and information as it’s …
49 new Regin backdoor modules discovered
“Since Symantec and Kaspersky Lab researchers presented their findings on the Regin backdoor late last year, there has been only one additional publicly revealed …
How Linux Foundation sysadmins secure their workstations
Sysadmins around the world have been provided with another helpful guide on how to go about hardening their Linux workstations, as Konstantin Ryabitsev, Director of …
Over 225,000 Apple accounts compromised via iOS malware
“Researchers from Palo Alto Networks and China-based WeipTech have unearthed a scheme that resulted in the largest known Apple account theft caused by malware. All in …
Spotting malicious apps on Android markets just got easier
“Spotting malicious apps before they are offered for download and/or removing them is a tough challenge for every online Android app marketplace, including Google Play, …
Cloud Storage Security, A Practical Guide
Authors: Aaron Wheeler and Michael WinburnPages: 144 pagesPublisher: ElsevierISBN: 0128029307 Introduction Practically everybody keeps at least some of their data in the …
UDP-based Portmap latest target for DDoS attackers looking to amplify attacks
US-based carrier and global backbone operator Level 3 has spotted a new vector being used for DDoS reflection attacks: Portmapper (or simply Portmap). The Portmap service …
Featured news
Resources
Don't miss
- Balancing usability and security in the fight against identity-based attacks
- MSSqlPwner: Open-source tool for pentesting MSSQL servers
- Critical SimpleHelp vulnerabilities fixed, update your server instances!
- Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)