Zeljka Zorz
XSS bug allows Amazon account hijacking
A recurring XSS bug in Amazon’s Kindle Library, i.e. the “Manage your Kindle” web application, can be exploited by attackers looking to hijack users’ …
Internet giants band together to improve open source programs
A group of companies that includes Facebook, Google, Dropbox, GitHub and Khan Academy has announced a new collaboration that will focus on making open source “easier for …
“Win Free iPhone 6” scams hit Facebook
As the day of the release of Apple’s iPhone 6 and iPhone 6 Plus draws near, scammers have expectedly begun using the new devices as a lure in Facebook scams. As usual, …
Researcher creates exploit for compromising scammers’ computers
Even if you never had to deal personally with “Windows support” scammers, chances are someone you know did or you have heard about these type of scams. These …
Google Apps scripts can be easily misused by scammers
Andrew Cantino, VP of Engineering at Mavenlink but also a bug hunter in his free time, has discovered that Google Apps Scripts can be misused by attackers to access …
Freenode suffers breach, asks users to change their passwords
Popular IRC network Freenode has suffered a security breach and is asking users to change their passwords, as they might have been compromised. “Earlier today the …
Bulletproof SSL and TLS
Deploying SSL or TLS in a secure way is a great challenge for system administrators. This book aims to simplify that challenge by offering extensive knowledge and good advice …
Home Depot and Target attackers likely not the same
More details about the malware used in the Home Depot breach have surfaced, and it seems that, after all, it wasn’t the one used in the Target breach (BlackPOS). …
Yahoo’s fight against US govt secret surveillance revealed
Unsealed documents from Yahoo’s challenge to the expansion of US surveillance laws in 2007 and 2008 have shown how the company was ultimately made to comply to the US …
Researchers find malicious extensions in Chrome Web Store
Earlier this year, Google has made it so that extension that are not hosted on the Chrome Web Store can’t be installed and used by users of its popular browser. This …
Researchers unlock TorrentLocker encryption
A team of Finnish researchers has discovered that the files encrypted by the recently unearthed TorrentLocker ransomware can be decrypted without paying the ransom – if …
Massive Gmail credential leak is not result of a breach
By now, you might have heard that there has been a leak of a nearly 5 million username and password combinations associated with Google accounts. According to an RT report, …
Featured news
Resources
Don't miss
- Balancing usability and security in the fight against identity-based attacks
- MSSqlPwner: Open-source tool for pentesting MSSQL servers
- Critical SimpleHelp vulnerabilities fixed, update your server instances!
- Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)