Zeljka Zorz
Google’s new Cloud Security Scanner detects common security bugs
Here’s some good news for Google App Engine developers: Google has released a new application security scanner that’s especially fitting to test new app builds for …
How to wipe Superfish adware and offending cert from your Lenovo laptop
After the recent revelation that Lenovo has been shipping some of it laptops with pre-installed adware that’s also breaking the security of secure connections by using …
AT&T: Pay more if you don’t want to share data for personalized ads
If you are a customer of AT&T’s GigaPower fiber-optic Internet access service and you don’t want to see personalized ads based on your browsing history, …
New Android Trojan fakes device shut down, spies on users
A new Android Trojan that tricks users into believing they have shut their device down while it continues working, and is able to silently make calls, send messages, take …
Darkleaks: An online black market for selling secrets
Whistleblowers and those individuals that are simply out to make a buck out of any confidential and valuable information, can now offer it for sale on Darkleaks, a …
Lenovo computers come with pre-installed adware and MITM proxy
If you have recently bought a new Lenovo computer, you’re in for a nasty surprise: the company has been shipping them with pre-installed adware. And, what’s even …
Windows 10 will offer password-free authentication
The upcoming Windows 10 will offer more authentication options instead of just passwords, Dustin Ingalls, Group Program Manager for Windows Security & Identity, has …
UK banks’ customers can access accounts with their fingerprint
iPhone users who are also customers of UK banks RBS and NatWest can now access their online banking app by simply pressing their finger on their phone’s home button. The …
Credit card info stolen in BigFish Games site compromise
Seattle-based casual gaming company Big Fish Games has has its site and personal and financial information of some of its users compromised in an attack that started on last …
Beware of fake Facebook “Copyright Violations” warnings
The latest Facebook-themed phishing messages doing rounds are trying to trick users into believing they are “making copyright violations” on their Facebook page. …
Pwn2Own 2015: New rules, prizes, and potential problems
If you intend to participate in the Pwn2Own competition at the CanSecWest 2015 conference on March 18 and 19 in Vancouver, Canada, you would do well to consult with a legal …
Vawtrack malware peddlers turn to malicious macros
Cybercriminals spreading new versions of the Vawtrak banking Trojan are the latest ones to use the once again popular macro-based attack. Popular in the early 2000s, this type …
Featured news
Resources
Don't miss
- Balancing usability and security in the fight against identity-based attacks
- MSSqlPwner: Open-source tool for pentesting MSSQL servers
- Critical SimpleHelp vulnerabilities fixed, update your server instances!
- Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)