Zeljka Zorz
How safe are Android-based children’s tablets?
Looking for an Android-based tablet for your child but don’t know which one to choose? If you are concerned about the security of your child’s data – as you …
Gemalto says NSA and GCHQ intrusions “probably happened”
“The investigation into the intrusion methods described in the document and the sophisticated attacks that Gemalto detected in 2010 and 2011 give us reasonable grounds …
Researchers create automated signature compiler for exploit detection
A trio of researchers from Microsoft and University of Erlangen-Nuremberg have created Kizzle, a compiler for generating signatures for detecting exploit kits delivering …
Critical Samba flaw allows unauthorized remote code execution
Samba, the popular free software that allows file and print sharing between computers running Windows and those running Unix or Linux, has been found sporting a critical flaw …
Google ups efforts to protect users against unwanted software
Google is looking to minimize its users’ exposure to potentially unwanted software, and to that end they have announced a few changes. For one, Chrome users will now see …
Fake face aging app steals Facebook login credentials
Offers for an app that can purportedly show you how you will look in 20 years have been recently popping up in Facebook users’ newsfeed and on their walls, occasionally …
Superfish not the only app using Komodia’s SSL-busting code
As Lenovo backtracked on its initial position that the Superfish adware pre-installed on some of its notebooks is not a security danger, and released a security advisory about …
CTOs targeted with tax-themed phishing emails carrying malware
Tax-themed phishing emails targeting CTOs of tech companies have been spotted by researchers at Talos, Cisco’s security intelligence and research group. The initial …
Flaw makes Cisco routing hardware vulnerable to DoS attacks
A serious vulnerability affecting the software of some of Cisco’s routing hardware systems for telecommunications and Internet service providers could be exploited to …
Citizenfour awarded Oscar for Best Documentary
Film director Laura Poitras’ Citizenfour has been recognized as past year’s Best Documentary Feature by the Academy of Motion Picture Arts and Sciences. Most of …
Gemalto announces investigation of massive SIM heist
Yesterday’s report by The Intercept hit the information security community like a ton of bricks, as a set of documents from Edward Snowden’s trove indicate that …
Over 250,000 home routers sport same SSH keys, warns researcher
With a simple search, John Matherly, the creator of Shodan, has discovered with it more than 250,000 routers that share the same SSH key, meaning they also share the same …
Featured news
Sponsored
Don't miss
- Despite economic uncertainty, organizations are prioritizing SaaS security investments
- Confidential AI: Enabling secure processing of sensitive data
- Microsoft releases tool to speed up recovery of systems borked by CrowdStrike update
- Cross-industry standards for data provenance in AI
- Shuffle Automation: Open-source security automation platform