Zeljka Zorz
iOS spyware used by Pawn Storm cyber spies
Trend Micro researchers have unearthed two variants of a spyware specially designed for targeting devices running iOS, and at least one of them can be installed on …
Canarywatch: Keeping track of warrant canaries
In the post-Snowden world, the term “warrant canary” – indicating a method used by some communications service providers to let their users know that they …
Critical IE 11 bug can be used for effective phishing attacks
A hacker has discovered a universal Cross Site Scripting (XSS) flaw that affects Internet Explorer 11 on Windows 7 and 8.1, and which could allow attackers to execute …
Massive malvertising campaign leads to latest Flash Player zero-day exploit
It has been a tough beginning of the year for Adobe and a dangerous one for Adobe Flash Player users. The recently discovered zero-day vulnerability (CVE-2015-0313) affecting …
Fake Facebook Account Suspended emails lead to Trojans, ransomware
Fake Facebook account suspension emails are doing rounds of inboxes around the world, trying to convince the recipients that their account has been temporarily disabled due to …
APT players lack deep skills of exploitation, fail at QA
Advanced Persistent Threat (APT) actors are generally considered to be among the most sophisticated cyber exploiters out there. But is this perception correct? Gabor …
Beware of emails pushing Google Chrome updates!
Google Chrome users are being actively targeted with a spam email campaign impersonating the Internet giant, urging them to download a newer version of the popular browser …
League of Legends exploit allows attackers to access gamers’ accounts
A string of hacks has revealed the existence of an exploit targeting League of Legends players, which allows the attackers to open up the game’s store from a web browser …
HipChat service users urged to change password after database breach
Australian enterprise software company Atlassian has notified users of its HipChat service that they have suffered a breach, which resulted in the compromise of names, …
New Flash Player 0-day exploited in malvertising attacks
A new Adobe Flash Player zero-day flaw is being actively exploited in the wild via the Angler exploit kit, Trend Micro threat analyst Peter Pi has warned. The flaw …
Browser security warning redesigned with partial success
How to make users understand a browser’s SSL warning, and make them choose the link that will lead them away from a site that has been deemed unsafe for use? A group of …
Hackers continue breaching, stealing credit card data from parking services
The hackers behind the Target and Home Depot data breaches have struck again, and this time the victims seem to be the customers of Book2Park.com, an online parking …
Featured news
Resources
Don't miss
- Man vs. machine: Striking the perfect balance in threat intelligence
- Misconfig Mapper: Open-source tool to uncover security misconfigurations
- Why AI deployment requires a new level of governance
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests