Zeljka Zorz
Open Whisper Systems helps WhatsApp achieve end-to-end encryption
The immensely popular Whatsapp instant messenger has the potential to become an even more attractive option for users, as the company has partnered with Open Whisper Systems …
Cisco open sources Big Data security analytics framework
“Technically advanced attackers often leave behind clue-based evidence of their activities, but uncovering them usually involves filtering through mountains of logs and …
Michaels and Staples breaches carried out by same attackers?
The attackers that stole payment card information from consumers of Texas-based arts and crafts store chain Michaels and international office supply chain store Staples are …
Trojanized Android firmware found on inexpensive handhelds
It’s unfortunate, but true: we live in a world where even if we buy a brand new mobile phone, it’s no guarantee that it’s malware-free. Researchers from …
Suspected WireLurker creators and distributors arrested in China
Three individuals been arrested by the Beijing Municipal Public Security Bureau in connection to the WireLurker OS X and iOS malware being served to users of Maiyadi, a …
Attackers shellshock, take over devices running on BusyBox
ShellShock, the remote code execution bug (CVE-2014-6271) affecting GNU Bash, the command interpreter present on many Unix systems and Linux distributions, is still being …
US State Department targeted by hackers
Around the same time the unclassified network of the Executive Office of the US President was breached, the same thing happened to some computer systems belonging to the US …
Malicious Tor exit node is run by MiniDuke APT actors
The malicious Tor exit node located in Russia that added malicious code to the software downloaded by users has been tied to the APT actors wielding the MiniDuke backdoor. …
Default ATM passcodes still exploited by crooks
Once again, ATMs have been “hacked” by individuals taking advantage of default, factory-set passcodes. This time the passcode hasn’t been guessed, or ended …
Mobile Pwn2Own 2014: Windows Phone’s sandbox resists attack
The Mobile Pwn2Own 2014 hacking competition, held at the PacSec Applied Security Conference in Tokyo, Japan, was concluded on Thursday, and not one of the targeted phones has …
Facebook updates terms and policies, introduces interactive privacy guides
Facebook continues with its plan to make the social network’s privacy settings easier to understand, and has introduced Privacy Basics. Private Basics is a page where …
Americans’ privacy behaviors and attitudes in the post-Snowden era
Most Americans are aware of and worried about government efforts to monitor communications and access their data but, interestingly enough, they still look to the government …
Featured news
Resources
Don't miss
- Balancing usability and security in the fight against identity-based attacks
- MSSqlPwner: Open-source tool for pentesting MSSQL servers
- Critical SimpleHelp vulnerabilities fixed, update your server instances!
- Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)