Zeljka Zorz
Popular Android games unmasked as phishing tools
“ESET researchers have discovered a new, ingenious, yet very simple Facebook phishing scheme: playable Android games that, before they are started, ask users to enter …
Sophisticated, successful Morpho APT group is after corporate data
Two reports published on Wednesday by Symantec and Kaspersky Lab detail the recent attacks executed by an unusual APT group they have dubbed Morpho and Wild Neutron.The group …
Teenage Lizard Squad hacker found guilty of 50,700 charges
A 17-year-old member of the infamous Lizard Squad has been found guilty of 50,700 charges by a Finnish court, but won’t serve his sentence in a prison.Among other …
Security experts explain to US, UK governments why mandated encryption backdoors are a bad idea
Today, FBI director James Comey and Sally Quillian Yates, the deputy attorney general at the Justice Department, are scheduled to address the US Senate Judiciary Committee …
Flash 0-day exploit found in Hacking Team’s leaked data exploited by criminals
Human rights and privacy activists and journalists are actively reviewing the data stolen in the Hacking Team breach.Reporters of The Intercept have concentrated on going …
Hacking Team scrambling to limit damage brought on by explosive data leak
Who hacked Hacking Team, the Milan-based company selling intrusion and surveillance software to governments, law enforcement agencies and (as it turns out) companies? A hacker …
Fake Android battery monitor app thoroughly compromises users’ devices
“Downloading apps from Google Play is a safer proposition than doing it from third party markets, but despite Google using an automated app scanning service …
Another malware building toolkit leaked, botnets already popping up
“Another malware building toolkit has been leaked, allowing less tech-savvy crooks to generate a fully functional variant of the KINS banking Trojan and to inject its …
Old MS Office feature can be exploited to deliver, execute malware
A Microsoft Office functionality that has been in use since the early 1990s can be exploited to deliver malicious, executable files to users without triggering widely used …
Let’s Encrypt CA releases transparency report before its first certificate
The non-profit CA launched by the EFF, Mozilla and several other businesses and organizations is determined to gain and retain users’ trust. After hiring outside experts …
Hacking Team hacked, 400GB+ of company documents and emails leaked
Hacking Team, the (in)famous Italian company that provides offensive intrusion and surveillance software to governments, intelligence and law enforcement agencies around the …
Mastercard is trying out purchase verification with selfies
Five hundred US MasterCard users will soon be testing out the company’s new system for quickly processing of digital payments, without having to input a PIN or …
Featured news
Sponsored
Don't miss
- The effect of compliance requirements on vulnerability management strategies
- Modernizing incident response in the AI era
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader