Zeljka Zorz
European Internet users urged to protect themselves against Facebook tracking
In the wake of the revelations about Facebook’s tracking of users who do not own a Facebook account, the Belgian Privacy Commission has issued a set of recommendations …
Rogue GTA 5 mods carry password-stealing malware
“Gamers who choose to play Grand Theft Auto V (GTA 5) on their PC should be carefull not to install two game mods that have been found to be bundled with malware. …
Rombertik’s disk wiping mechanism is aimed at pirates, not researchers
Rombertik, the information-stealing malware that was recently analyzed by Cisco researchers and which apparently tries to prevent researchers from doing so by rewriting the …
Security firm publishes details, exploit code for Google App Engine flaws
Polish firm Security Explorations has published technical details and PoC code for several security issues identified in Google App Engine (GAE) for Java.The company has found …
How Google handles “right to be forgotten” requests
Google has released a new report on its implementation of “right to be forgotten” requests, and has revealed that it has removed 58.7 percent of the URLs it was …
Google completes ban of extensions not in the Chrome Web Store
Google is slowly but surely working on preventing developers of malicious Chrome extensions from delivering their wares to users.First, in May 2014, they made it so that …
Sensitive customer data leaked following mSpy data breach
mSpy, a company that sells “customized and user-friendly mobile and computer monitoring solutions,” has apparently suffered a data breach.They still haven’t …
United Airlines offers air miles for vulnerability information
United Airlines has become the first airline to start a bug bounty program and instead of monetary rewards, it offers air miles: a million for remote code execution bugs, …
US House of Representatives votes to stop NSA’s bulk data collection
The highly debated USA FREEDOM Act, a bill whose purpose is “to rein in the dragnet collection of data by the NSA and other government agencies, increase transparency of …
WinYahoo adware changes your Chrome secure preferences
“Potentially unwanted programs (PUPs) might not be as dangerous as malware, but can often lead to unexpected perils. Take for example WinYahoo. Despite it’s name …
APT group’s malware retrieved C&C IP addresses from Microsoft’s TechNet portal
“A China-based APT group has been using Microsofts TechNet web portal to host encoded Command and Control IP addresses for its BLACKCOFFEE malware, FireEye researchers …
11-year-old VM escape bug opens host machines to compromise
CrowdStrike researchers have recently discovered a security vulnerability in the virtual floppy drive code used by many computer virtualization platforms, which could be …
Featured news
Resources
Don't miss
- CERT-UA warns against “security audit” requests via AnyDesk
- Decentralization is happening everywhere, so why are crypto wallets “walled gardens”?
- AI-driven insights transform security preparedness and recovery
- NDR’s role in a modern cybersecurity stack
- How Russian hackers went after NGOs’ WhatsApp accounts