Zeljka Zorz
Microsoft launches bug bounty program for Online Services
Microsoft has launched another bug bounty program, and this one will focus on its Online Services. Bug hunters are urged to submit vulnerabilities affecting the following …
jQuery.com compromised to serve malware via drive-by download
jQuery.com, the official website of the popular cross-platform JavaScript library of the same name, has been compromised and has been redirecting visitors to a website hosting …
Beware of Apple Wave microwave wireless charging hoax
Excited about the new Wave iPhone wireless charging technology and can’t wait to try it out? Please don’t – it’s a hoax. You risk damaging both your …
Minimizing privacy risks of location data collection
With the advent of smartphones and tablets – devices users often carry with them everywhere they go – collected location data became a valuable source of …
Number of malicious eBay listings rises, accounts are hijacked
Pressure is mounting against eBay to quickly detect and remove bogus listings triggering cross-site scripting flaws to redirect users to phishing and other malicious pages. …
CipherShed: A replacement for TrueCrypt
Ever since TrueCrypt developers terminated the development of the popular encryption utility and announced that it was not safe to use, users who need such a tool have been …
Payment card info of 880k Viator customers compromised
Payment card and personal information of approximately 1.4 million Viator.com customers may have been compromised in a breach that was confirmed late last Friday. The popular …
Home Depot security was anything but, say former employees
Bit by bit, information about the Home Depot security breach is coming to light, and the picture it paints is extremely unflattering for the retailer. The latest insight comes …
Microsoft kills off its Trustworthy Computing Group
Microsoft’s Trustworthy Computing Group is headed for the axe, and its responsibilities will be taken over either by the company’s Cloud & Enterprise Division …
Google will display Android devs’ physical address
Developers/publishers of paid Android apps and apps that feature in-app purchases will, by the start of next month, be required to add a physical contact address to their …
Apple drops the “warrant canary” from transparency report
In the wake of the change of Apple’s Privacy Policy, and the encryption technology used in iOS 8 that makes it “not technically feasible” for Apple to …
Simply Secure aims to make security technology usable
Just two days after they joined a collaboration that will focus on making open source “easier for everyone,” Google and Dropbox have announced that they will be …
Featured news
Sponsored
Don't miss
- The effect of compliance requirements on vulnerability management strategies
- Modernizing incident response in the AI era
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader