Zeljka Zorz
More developers looking to keep TrueCrypt alive
The news that the developers of TrueCrypt have abandoned the popular software has hit the security community like a ton of bricks, but there is apparently no lack of people …
Beware of emails offering bogus HeartBleed removal tool
Malware peddlers are taking advantage of the fact that the existence of the Heartbleed bug has breached the confines of the cyber security world and has entered the awareness …
Molerats attacks continue targeting US, EU, Middle East organizations
Not all RAT-wielding attackers come from China, say FireEye researchers. For over a year they have been following the activities of a group of hackers that uses the Poison Ivy …
Cupid exploits Heartbleed bug on WiFi networks and Android
Nearly two months have passed since the public revelation of the Heartbleed bug affecting the widely used open source cryptographic library OpenSSL. The reaction of the …
NSA collects photos to feed facial recognition programs
The NSA has been collecting photos of people’s faces at the tune of 55,000 images every day, and has been feeding the images into its facial recognition programs, James …
Open Crypt Audit Project considers taking over development of TrueCrypt
The unexpected notice saying TrueCrypt isn’t safe, which has apparently been posted last week by the developers of the software, took the security community by surprise …
What inspired you to start hacking?
This is a question that Jennifer Steffens, IOActive CEO, often asks hackers she meets on conferences around the world. More often than not, the answer is movies: War Games, …
Hacking for the greater good
As long as people write code, they will write code with flaws, says Katie Moussouris, former Senior Security Strategist Lead at Microsoft Security Response Center and, as of …
Outlook for Android fails to keep emails confidential
Did you know that Outlook and many other email and mobile messaging Android apps store your emails and messages on the device’s SD card, unencrypted, and accessible to …
Apps on your Android phone can take photos without you knowing
A researcher has demonstrated that it’s possible for malicious attackers to create an Android app that will surreptitiously take pictures and upload them to a remote …
Hybrid Zberp Trojan targets bank users around the world
A new threat created by the amalgamation of the publicly available code of two of the most (in)famous malware around is targeting users of over 450 financial institutions …
Hacker hijacks Apple devices remotely, asks for ransom
An unusual case of cyber extortion has been spotted in Australia: Apple device users in Queensland, NSW, Western Australia, South Australia and Victoria have woken up to see …
Featured news
Resources
Don't miss
- Avoiding vendor lock-in when using managed cloud security services
- The CISO’s dilemma of protecting the enterprise while driving innovation
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence