Zeljka Zorz
Worldwide IT spending to grow 2.1 percent in 2014
Worldwide IT spending is on pace to total $3.7 trillion in 2014, a 2.1 percent increase from last year, however, this grow rate is down from earlier projections of 3.2 percent …
Western energy companies hit by state-sponsored hackers
Symantec researchers have confirmed the findings of their colleagues at F-Secure, who have been monitoring the spreading of the Havex malware family, and have put them in a …
Microsoft disrupts malware networks and APT operations
Microsoft’s Digital Crimes Unit struck again, and was allowed to seize 23 free domain names in an effort to strike a fatal blow to malware delivery networks run by a …
163k individuals affected in Butler Uni data breach
Personal and financial information of some 163,000 students, alumni, faculty, staff, and past applicants of Indianapolis-based Butler University have been stolen following a …
Google Drive update fixes data-leaking flaw
Google has fixed a security issue that made some of the files stored on Google Drive and shared with friends or colleagues via a direct link potentially reachable by …
Banking malware sniffs out data sent over HTTPS
Careful online banking users can sometimes spot that something is amiss when malware installed on their computer pops up phishing pages or adds fields to legitimate banking …
How does a rogue ad network function?
It’s a well known fact that a considerable chunk of Internet traffic is bogus, made by infected computers that visit sites and click on adverts chosen by malicious …
Germany cancels Verizon’s government contract due to spying fears
Verizon will no longer provide internet services to a number of German government departments, as their contract has been cancelled as part of a restructuration of the federal …
PayPal 2FA flow partially mitigated, accounts are safe
In the wake of the revelation of a flaw that allows attackers to bypass PayPal’s two-factor authentication feature, the e-payment giant has made it temporarily …
A look at Interflow, Microsoft’s threat information exchange platform
In the last few years, there has been one constant call from almost all participants in the information security community: the call for cooperation. But that is easier said …
Critical Android code-execution flaw affects all but the latest version
IBM researchers have discovered a critical security vulnerability in Android 4.3 (Jelly Bean) and below which could allow attackers to exfiltrate sensitive information – …
Cops must get a warrant before looking through cellphone content
The nine judges of the US Supreme Court have unanimously ruled that law enforcement officers can’t search the contents of an arrested individual’s cell phone(s) …
Featured news
Resources
Don't miss
- Avoiding vendor lock-in when using managed cloud security services
- The CISO’s dilemma of protecting the enterprise while driving innovation
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence