Zeljka Zorz
Open source Knock Knock tool reveals OS X malware
At this year’s Virus Bulletin conference held last month in Seattle, security researcher Patrick Wardle spoke about methods of malware persistence on Mac OS X. The video …
Android dialler hides, resists attempts to remove it
A malicious dialler disguised as an application for adults could become a big problem for Android users, as the malware systematically removes traces of itself from the phone …
Dyre malware targeting Swiss bank customers
The Dyre/Dyreza banking Trojan has lately become very popular with cyber criminals – so much so that the US-CERT has issued an alert warning about the danger. …
Cyber crime tool automates monetization of stolen payment cards
Cyber criminals who have acquired stolen payment card information and wish to make the most of them can now simply buy professional-looking software that will automate the …
Facebook open sources osquery, an OS analysis tool
Facebook has open sourced osquery, a framework that exposes an operating system as a high-performance relational database and allows developers to write SQL-based queries to …
CurrentC mobile payment system hacked, user info stolen
CurrentC, the mobile payment service backed by the Merchant Customer Exchange (MCX), has suffered a data breach. “Within the last 36 hours, we learned that unauthorized …
Assume your Drupal 7 site has been compromised
Administrators of sites that run Drupal 7, and have not yet updated to version 7.32 or have done so later than 7 hours after the public revelation of the highly critical SQL …
White House network breach was likely nation-sponsored
The White House has confirmed that the unclassified Executive Office of the President network has been breached by unknown hackers. People in the know speculate that the …
Fake “Online Ebola Alert Tool” delivers Trojan, unwanted apps
Cyber scammers continue to take advantage of the fear and apprehension surrounding the proliferation of the Ebola virus. While Ebola-themed online hoaxes are nothing new, …
ScanBox keylogging framework lurking on disparate watering holes
Watering hole attacks are usually associated with cyber espionage efforts and are booby-trapped with exploit kits that deliver malware onto the visitors’ vulnerable …
Belgacom shares more details about alleged GCHQ breach
Late last year, documents from Edward Snowden’s NSA trove have revealed that Britain’s GCHQ has allegedly mounted a successful attack against primarily state-owned …
Crooks use stolen magnetic payment card info to make fraudulent chip-enabled transactions
The chip and PIN payment card system – or EMV – is considered to be more secure than the magnetic strip one, but it’s also not bulletproof. Nevertheless, US …
Featured news
Resources
Don't miss
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence
- Misconfig Mapper: Open-source tool to uncover security misconfigurations
- Why AI deployment requires a new level of governance