Zeljka Zorz
Google adds another obstacle for developers of deceptive Chrome extensions
Starting on September 3, Google will begin disabling inline installation (i.e. installation from the developer’s website) for extensions linked to deceptive sites and …
UK job recruiters network hit by hacker, user info dumped online
TEAM (The Employment Agents Movement), the largest network of independent recruiters in the UK, has been hit by a Saudi Arabian hacker that goes by the online handle JM511.The …
Info of 2.4 million Carphone Warehouse customers stolen
Personal and financial information of 2.4 million customers of British mobile phone retailer Carphone Warehouse have likely been compromised in a breach, along with encrypted …
File-stealing Firefox bug exploited in the wild, patch immediately!
A critical Firefox vulnerability has been spotted being exploited in the wild.The bug, reported by security researcher Cody Crews, allows attackers to violate Firefox’ …
Pentagon’s unclassified email system breached, Russian hackers blamed
Pentagon’s Joint Staff unclassified email system, used by 4,000 military and civilian personnel, has been compromised by attackers, and it has been taken offline until …
GameOver Zeus gang boss also engaged in cyber espionage
Cyber crooks and cyber spies are often two distinct categories of attackers, but not always. Years-long research by the FBI, Fox-IT and Crowdstrike revealed that, at least in …
Zero-day disclosure-to-weaponization period cut in half
There’s no doubt about it: the batch of stolen information leaked in the wake of the Hacking Team breach was a boon for exploit kit developers.Not only did it contain a …
Android users rejoice! Security updates will be coming out faster
August 5, 2015, is the date that (hopefully) marks the beginning of one of the biggest positive changes in the Android ecosystem.Adrian Ludwig, Google’s lead engineer …
Microsoft expands Bug Bounty programs, increases rewards
Microsoft is continually tweaking its Bug Bounty programs, and the latest step in this evolution has been announced on Wednesday at Black Hat USA 2015.“We are raising …
Attackers use Google Drive, Dropbox to breach companies
A new type of attack, “Man in the Cloud” (MITC), can quietly coopt common file synchronization services, such as Google Drive and Dropbox, to turn them into devastating attack …
WordPress 4.2.4 fixes critical vulnerabilities
It’s time to update your self-hosted versions of WordPress again.WordPress 4.2.4, released on Tuesday, fixes four bugs and several security issues: Three cross-site …
How to protect your privacy on Windows 10
So, you have decided to switch to Windows 10, but you heard that the new OS is a veritable vacuum for user data, which it sends back to Microsoft.Fear not! While most of the …
Featured news
Resources
Don't miss
- Balancing usability and security in the fight against identity-based attacks
- MSSqlPwner: Open-source tool for pentesting MSSQL servers
- Critical SimpleHelp vulnerabilities fixed, update your server instances!
- Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)