Zeljka Zorz
Microsoft will add SSH support to PowerShell
Third time’s the charm for Microsoft’s PowerShell team, as they will – after two previous attempts unsuccessful due to leadership and culture – finally …
Dyre banking Trojan infections more than doubled
“Cybercriminal interest in online banking continues to grow, and crooks wielding the Dyre/Dyreza banking Trojan continue spewing out spam emails delivering a new variant …
How to raise users’ expectations about security and privacy?
Users do not seem to care much about privacy and security. When buying a new smartphone, for example, they rarely ask about security updates and how long the device will be …
USA Freedom Act is just the beginning of the fight for privacy
The US Senate voted for the passing of the USA Freedom Act on Tuesday, and President Obama signed it into law later the same day. So, how will this impact the surveillance …
SourceForge hijacks popular accounts to distribute 3rd-party software
Online source code repository SourceForge has apparently started taking over inactive accounts for popular software, and adding bundle-ware installers to the software …
Weak SSH keys opened many GitHub repositories to compromise
Github repositories of many entities, projects, and even one government could have been compromised and used to deliver malicious code due to the owners’ use of easily …
Bug hunting without much tech knowledge or many tools
Bas Venis has been programming since he was 14 years old. After gaining some experience as a web developer, this 18-year-old self-taught security researcher got into IT …
Employee credentials of half of European top 500 firms exposed online
Cyber attacks and data breaches very often start with phishing or spear-phishing. Access to good credentials is key – whether it’s for straight emailing or direct …
Google releases new hub for managing security and privacy settings
Google has released a new privacy tool for users: the My Account centralized hub for managing Google Settings.“Privacy and security are two sides of the same coin: if …
Future attacks: Hiding exploit code in images
Successfully hiding messages in images has already been done, but is it possible to deliver an exploit in one – and run it? Saumil Shah, founder and CEO of Net-Square, …
Hackers stole personal info of over a million of Japanese pensioners
Personal information of some 1.25 million of Japan’s pensioners has been compromised and some of it was leaked following a successful breach of Japan Pension …
Section 215 of the Patriot Act expired last night
A small, perhaps temporary, but important victory has been won by privacy advocates today, as the US Senate has allowed three sections of the USA PATRIOT Act to expire.Among …
Featured news
Resources
Don't miss
- CERT-UA warns against “security audit” requests via AnyDesk
- Decentralization is happening everywhere, so why are crypto wallets “walled gardens”?
- AI-driven insights transform security preparedness and recovery
- NDR’s role in a modern cybersecurity stack
- How Russian hackers went after NGOs’ WhatsApp accounts