Zeljka Zorz
ZeroLocker ransomware “helps” you get your files back
In early June, the FBI has lead a rather successful multi-national effort to disrupt the GameOver Zeus botnet which was also responsible for delivering Cryptolocker. …
Beware of fake “Gmail suspicious login” warnings
Malicious emails impersonating Gmail Account Services have been spotted hitting inboxes around the world, falsely claiming that the users’ Gmail account has been logged …
Google starts warning users about deceptive downloads
Google has announced a welcome change to its Safe Browsing service: starting next week, Google Chrome will also warn users about attempts to make them download software that …
Social Engineering Penetration Testing
We know that the human element is often the weakest link in the security chain, and that attackers - whether they are after money, user information, corporate or state secrets …
US defense contractors still waiting for breach notification rules
US Department of Defense contractors will have to wait until September 24 to see what specific rules they will be required to follow when it comes to the reporting of computer …
SynoLocker gang planning to move on?
The crooks behind SynoLocker have made some changes to the website sporting the payment instructions. They are trying to spur more victims to pay up by saying that the website …
Fake Tor Project website delivers malware instead of anonymity
A computer science student has discovered an almost perfect copy of The Tor Project’s website, offering malware for download instead of the Tor Browser Bundle and …
Malware targets jailbroken iOS devices, hijacks ad revenue
AdThief (or Spad) is the name of a recently discovered iOS malware that has managed to infect some 75,000 jailbroken iOS devices and steal revenue from around 22 million ads …
Virtual machines no longer keeping malware at bay
It used to be that running and working on a virtual machine could almost guarantee you complete avoidance of malware infections, but that time has passed, says Symantec …
15 new bugs exploited at DEF CON router hacking contest
Security researchers taking part of the SOHOpelessly Broken hacking competition at this year’s edition of DEF CON have demonstrated 15 flaws affecting a number of small …
iPhones are immune to FinSpy infections
FinSpyMobile, the mobile spying software sold by German company Gamma Group, can’t be installed on iPhones that have not been jailbroken, shows one of the documents …
Square launches bug bounty program
Popular California-based financial services and mobile payments company Square has set up a bug bounty program on the HackerOne platform. The announcement was made at a panel …
Featured news
Resources
Don't miss
- Balancing usability and security in the fight against identity-based attacks
- MSSqlPwner: Open-source tool for pentesting MSSQL servers
- Critical SimpleHelp vulnerabilities fixed, update your server instances!
- Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)