Zeljka Zorz
WiFi jamming attacks more simple and cheaper than ever
A security researcher has demonstrated that jamming WiFi, Bluetooth, and Zigbee networks is not difficult to perform but, most importantly, also not as costly as one might …
America’s Thrift Stores breached by Eastern European criminals
America’s Thrift Stores, a for-profit organization that operates thrift stores in Alabama, Georgia, Louisiana, Mississippi and Tennessee, is the victim of a data …
Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts
Author: Nitesh DhanjaniPages: 296Publisher: O’Reilly MediaISBN: 1491902337 Introduction Whether you like it or not, the Internet of Things is happening. As the author …
Android ransomware gets new, professional look thanks to Googles Material Design
“Ransomware authors are stepping up their game: they have begun using Google’s Material Design language to create extremely convincing notices/ransom requests that …
Thousands of Zhone SOHO routers can be easily hijacked
Two days before he is scheduled to give a talk about discovering and exploiting 0-day vulnerabilities in SOHO routers’ firmware, security researcher Lyon Yang has …
Chinese hackers arrested at US request
Late last month, China’s president Xi Jinping made a state visit to the US and it resulted, among other things, in an agreement that the US and China will provide each …
Authentication bypass flaw in Netgear SOHO routers exploited in the wild
A critical security vulnerability affecting nine Netgear router models is being exploited in the wild. The flaw that the attackers took advantage of allowed them to access the …
Apple boots some ad blockers from App Store to protect users’ privacy
Less than a month has passed since the release of iOS 9, with which Apple welcomed third-party ad blocking apps, and the company has removed some of them from the App …
Which Android smartphones are most secure?
87% of Android devices are vulnerable to attack by malicious apps and messages, a group of researchers from Cambridge University in England has revealed.For years now, they …
Attackers compromise Cisco Web VPNs to steal login credentials, backdoor target networks
Another Cisco product is being targeted by attackers looking for a permanent way into the computer networks and systems of various organizations, Volexity researchers …
Former journalist faces 25 years in prison for article defacement
Matthew Keys, a former Reuters social media editor, has been found guilty of computer hacking, and could be sentenced to spend as many as 25 years in prison.Keys was indicted …
Hackers breach firm whose tech is used in Samsung Pay
It was revealed on Wednesday by the New York Times that LoopPay, a US-based Samsung subsidiary whose technology is central to the Samsung Pay mobile payment system, has …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits