Zeljka Zorz
Google releases new hub for managing security and privacy settings
Google has released a new privacy tool for users: the My Account centralized hub for managing Google Settings.“Privacy and security are two sides of the same coin: if …
Future attacks: Hiding exploit code in images
Successfully hiding messages in images has already been done, but is it possible to deliver an exploit in one – and run it? Saumil Shah, founder and CEO of Net-Square, …
Hackers stole personal info of over a million of Japanese pensioners
Personal information of some 1.25 million of Japan’s pensioners has been compromised and some of it was leaked following a successful breach of Japan Pension …
Section 215 of the Patriot Act expired last night
A small, perhaps temporary, but important victory has been won by privacy advocates today, as the US Senate has allowed three sections of the USA PATRIOT Act to expire.Among …
Facebook introduces end-to-end encryption for notifications
Facebook is testing out an experimental new feature that will enable people to add OpenPGP public keys to their profile, and gives users the option of receiving notification …
Which malware lures work best?
“More often than not, malware peddlers’ main goal is to deliver their malicious wares to the maximum number of users possible. Choosing the right lure is crucial …
Researchers track Android users by collecting accelerator readings
A group of researchers from Nanjing University, China, have demonstrated that Android users’ movements can be tracked by simply analyzing the data provided by the …
Massive campaign uses router exploit kit to change routers’ DNS servers
Well-known security researcher Kafeine has spotted an active campaign aimed at compromising SOHO routers and changing their DNS settings so that the attackers can seamlessly …
Millions of users installed malicious Minecraft apps from Google Play
“Since August 2014, Minecraft lovers who like to play the popular game on their Android phones have been targeted with apps that are purportedly cheats for the game, but …
mSpy finally admits they’ve been hacked
After having first denied that they suffered a breach and had their customer’s data stolen and leaked on the Dark Web, mobile spyware maker mSpy has finally admitted …
Account recovery via secret questions is a bad idea
Secret questions offer far lower security than user-chosen passwords, and should never be used as the only way to reclaim access to a lost account, Google researchers have …
Isle of Man taxpayers’ info leaked due to email error
Email addresses of approximately 5000 customers of the Income Tax Division (ITD) of the Isle of Man – a self-governing British Crown dependency and a tax haven for the …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility