Zeljka Zorz
Code hosting Code Spaces destroyed by extortion hack attack
Cloud code hosting service Code Spaces is forced to shut down, as a DDoS attack coupled with an unsuccessful extortion attempt was followed by the attacker deleting most of …
Bitcoin miner lurking on Facebook
Facebook users, beware: a new viral campaign aimed at saddling you with a Bitcoin mining Trojan has been spotted. “The virus spreads through private Facebook messages, …
Scan of Google Play apps reveals thousands of secret keys
A team of researchers from Columbia University has downloaded and decompiled over 880,000 applications found on Google Play, and has discovered – among other things …
Would you run potentially malicious programs in return for a dollar?
A group of researchers have discovered a depressing fact: some computer users will download and run an executable that they can’t be sure isn’t malicious for as …
Microsoft patches DoS flaw in its Malware Protection Engine
Microsoft has released an update for its Malware Protection Engine to fix a privately reported security vulnerability that could allow a denial of service if the Microsoft …
Android smartphones pre-installed with malware hit the market
Cheap Android-based smartphones pre-installed with spyware are being distributed to European users, experts from German security vendor G Data are warning. The malware is …
GCHQ legally intercepts Google, Facebook users’ communications
A successful legal challenge has forced the UK’s top counter-terrorism official to reveal the (until now) secret government policy that allows the GCHQ to intercept …
Hacker nets over $600k by compromising NAS systems to mine Dogecoin
A single threat actor is responsible for the compromise of a considerable number of Synology NAS systems that were set to mine Dogecoing in secret and have netted him over …
There’s a new banking Trojan in town
A new piece of banking malware is being delivered via tax- and invoice-themed phishing campaigns, Danish security company CSIS is warning. Dubbed “Dyreza,” the …
Java program to reverse Android ransomware damage
University of Sussex student Simon Bell has reverse-engineered the Android Simplocker (Simplelocker) ransomware, and has created a Java program that can be converted into an …
A new defense against kernel-mode exploits
Over the past many years, there’ve been a plethora of security solutions available for Windows-based endpoints, but most of them are helpless against malicious code …
Being a CISO at a higher education institution
In this interview, Matt Santill, CISO of Broward College, talks about the requirements and peculiarities of his job, the technologies the college uses to make its network …
Featured news
Resources
Don't miss
- Avoiding vendor lock-in when using managed cloud security services
- The CISO’s dilemma of protecting the enterprise while driving innovation
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence