Zeljka Zorz
Microsoft refuses to hand over emails stored in Ireland, held in contempt by judge
Microsoft has urged US District Judge Loretta Preska, the judge presiding over the case that sees the company refusing to hand some emails stored in its Dublin facility over …
Phishers resort to AES crypto to obfuscate phishing sites
Phishers have started employing AES encryption to disguise the real nature of phishing sites from automatic phishing detection tools. This is the latest obfuscating trick in …
DARPA is after vulnerabilities in algorithms implemented in software
The Defense Advanced Research Projects Agency (DARPA) is looking for new program analysis techniques and tools to enable analysts to identify vulnerabilities in algorithms …
Home Depot breach confirmed, stolen info used to change PINs, collect money
In a terse statement, and an annoyingly repetitive FAQ, Home Depot has confirmed that it had suffered a breach of its payment data systems. The breach could impact any …
FBI’s account of locating Silk Road’s server disputed by researchers
The US government’s explanation of how it managed to discover the location of the servers hosting Silk Road, the infamous online black market, is being disputed by a …
Blackphone security issues and vulnerabilities unveiled
Blackphone, the carrier- and vendor-independent smartphone that was created with the goal of placing privacy and control directly in the hands of its users, is not without its …
Salesforce users hit with malware-based targeted attack
Late last Friday, global cloud-based CRM provider Salesforce has sent out a warning to its account administrators about its customers being targeted by the Dyreza malware. …
Review your Facebook privacy settings with Privacy Checkup
Facebook’s Privacy Checkup tool – informally dubbed “Privacy Dinosaur” – has been made available for use to all users of the popular social …
Google will start gradually sunsetting SHA-1
Google has announced that it will begin the process of gradually sunsetting SHA-1 (as used in certificate signatures for HTTPS) with Chrome 39, which is due to be released in …
Researchers compile list of Android apps that allow MitM attacks
Around 350 Android apps that can be downloaded from Google Play and Amazon stores fail to properly validate SSL certificates for HTTPS connections, and thus open users to …
Coursera privacy issues exposed
When well-known lawyer and Stanford law lecturer Jonathan Mayer was invited to teach a course on government surveillance on Coursera, the popular online website offering free …
HealthCare.gov breach affected test server, not users
A server within the Healthcare.gov system has been compromised, but the good news is that it didn’t contain consumer personal information. It was just a development …
Featured news
Resources
Don't miss
- Balancing usability and security in the fight against identity-based attacks
- MSSqlPwner: Open-source tool for pentesting MSSQL servers
- Critical SimpleHelp vulnerabilities fixed, update your server instances!
- Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)