Zeljka Zorz
Pwn2Own 2015: New rules, prizes, and potential problems
If you intend to participate in the Pwn2Own competition at the CanSecWest 2015 conference on March 18 and 19 in Vancouver, Canada, you would do well to consult with a legal …
Vawtrack malware peddlers turn to malicious macros
Cybercriminals spreading new versions of the Vawtrak banking Trojan are the latest ones to use the once again popular macro-based attack. Popular in the early 2000s, this type …
Beware of fake Windows 10 “activators”
The considerable interest users have shown for testing Microsoft’s Windows 10 Technical Preview version has not passed unnoticed by cyber scammers and malware peddlers. …
Flaw in Netgear Wi-Fi routers exposes admin password, WLAN details
A number of Netgear home wireless routers sport a vulnerability that can be misused by unauthenticated attackers to obtain the administrator password, device serial number, …
Is there an overarching organization that helps Arab hackers?
Trend Micro researchers have unearthed two separate but closely linked malware campaigns attributed to Arab parties. The first one, dubbed Operation Arid Viper, is aimed …
Carbanak cyber gang stole hundreds of millions from banks
Since late 2013, an international cyber criminal group has been targeting banks around the world and has made off with $300 million – possibly even more – by …
Google relaxes its rigid 90-day bug disclosure period
Google has announced that its 90-day vulnerability disclosure period will, from now on, be little longer if the situation warrants it. Earlier this year the company was …
Scammers pushing fake AdwCleaner in active scareware campaign
An active scareware campaign pushing a fake version of the popular freeware spyware removal tool AdwCleaner is targeting Windows users and is trying to get them to fork over …
How to enable two-step verification for iMessages and FaceTime
After having added a two-step verification feature to allow users to secure their iCloud (Apple ID) accounts, and extending the protection to iCloud backups last September, …
VirusTotal sets up huge AV whitelist to minimize false positives
One of the worst things that can happen to a software developer, and especially if they are a small firm or a single individual, is for their program to be falsely detected as …
Attackers can bypass Windows’ protections by changing a single bit
Among the many vulnerabilities that Microsoft patched on Tuesday is one that can be exploited to bypass all Windows security measures by, curiously enough, modifying a single …
Improved Simplocker variant hits Android users hard
Mobile crypto-ransomware Simplocker has evolved, and returning the encrypted files to their unencrypted state is no longer easy as it was. First spotted in June 2014, …
Featured news
Resources
Don't miss
- Why your security team feels stuck
- It’s time to give AI security its own playbook and the people to run it
- Kanvas: Open-source incident response case management tool
- 6 eye-opening books on AI’s rise, risks, and realities
- Check for CitrixBleed 2 exploitation even if you patched quickly! (CVE-2025-5777)