Zeljka Zorz
0-days found in Symantec Endpoint Protection
While testing of the systems and networks of a financial services company, a team of penetration testers from Offensive Security have unearthed a number of vulnerabilities, …
IoT devices are filled with security flaws, researchers warn
We are living in an increasingly interconnected world, and the so-called Internet of Things is our (inescapable) future. But how safe will we, our possessions and our …
Free iPhone app for encrypted phone calls released
There is finally a free alternative for all iOS users who are looking to encrypt their voice calls: the app is called Signal, and has been developed by the Open Whisper …
Researchers successfully attack Android through device’s speaker
A group of researchers from the Chinese University of Hong Kong have demonstrated that even applications with zero permissions can be used to launch attacks that allow …
I2P patched against de-anonymizing 0-day, Tails integration still to follow
Developers of the I2P anonymous networking tool have released a new version (0.9.14) of the tool that fixes XSS and remote execution vulnerabilities reported by Exodus …
AV engines are riddled with exploitable bugs
A security researcher has found a great number of exploitable vulnerabilities in popular security solutions and the AV engines they use, proving not only that AV engines are …
A peek into Police Locker’s distribution infrastructure
An analysis of the distribution infrastructure for the bothersome Android “Police Locker” ransomware has revealed that the attackers behind it are not putting all …
Google and EU debate on implementation of “right to be forgotten”
It is, by now, widely known that European users can ask Google to “forget” sites with content these users find damaging to their reputation, but the European Court …
Fake GoogleBots are third most common DDoS attacker
An analysis of 400 million search engine visits to 10,000 sites done by Incapsula researchers has revealed details that might be interesting to web operators and SEO …
European Central Bank blackmailed in wake of data breach
The European Central Bank (ECB) – the central bank for the euro – has suffered a data breach, and has only discovered it after receiving a blackmail letter from …
Apple confirms iOS backdoors, researcher says explanation is misleading
In the wake of the discovery of undocumented features in Apple’s iOS that can serve as backdoors, the company has modified a knowledge base article to enumerate and …
Operation Emmental exploits holes in banking security
Trend Micro researchers have discovered and analyzed a clever attack aimed at customers of Austrian, Swiss, Swedish, and Japanese banks. They dubbed it Emmental, after the …
Featured news
Resources
Don't miss
- Avoiding vendor lock-in when using managed cloud security services
- The CISO’s dilemma of protecting the enterprise while driving innovation
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence