Zeljka Zorz
Hidden crypto currency-mining code spotted in apps on Google Play
You already know that cyber criminals are using malware to make victims’ computers mine crypto currencies for them, but did you know that your phone can be instructed to …
Banks sue Target and Trustwave for damages due to data breach
The Target data breach was one of the biggest in recent history, and has been calamitous for more than just the customers who have had their information stolen. The latest …
Facebook boasts of superior threat detection system
Facebook has a new internal threat-catching framework that is fed with disparate data from all over the Internet, different vendors, and Facebook’s internal sources, and …
ACLU probes US police’s use of fake cell towers
The American Civil Liberties Union (ACLU) is on a mission to find out which local and state law enforcement forces in the US are using “stingrays” and how, but are …
Over half of Android users fail to lock their phones
An ad hoc survey conducted by Google’s anti-abuse research lead Elie Bursztein has shown that over half of Android users don’t lock their phones in any meaningful …
Nmap’s Fyodor restarts the Full Disclosure mailing list
The Full Disclosure mailing list is back on track, with Nmap’s Gordon “Fyodor” Lyon picking up the mantle put down by John Cartwright. “Upon hearing …
Gameover ZeuS now targets users of employment websites
Some newer variants of the Gameover Zeus Trojan, which is exceptionally good at using complex web injections to perform Man-in-the-Browser (MITB) attacks and gain additional …
ATMs running Windows XP targeted with cash-dispensing malware
Microsoft has been aggressively campaigning to get users to stop using Windows XP, and has gone so far as to offer $100 off the purchase of a new PC via the Microsoft Store in …
Android bug can push devices into an endless reboot loop
A Proof-of-Concept app exploiting a recently discovered Android vulnerability that triggers the continuous rebooting of an affected device was apparently also behind the …
Tumblr now offers two-factor authentication
In a playful post on its official feed, Tumblr has announced that it’s now offering two-factor authentication to its users. “You know how you need two keys to …
0-day Microsoft Word flaw exploited in targeted attacks
Microsoft has issued a security advisory warning of a remote code execution vulnerability that is being exploited in “limited, targeted attacks directed at Microsoft …
Flaws in Android update mechanism could turn apps into malware
A group of researchers from Indiana University and Microsoft Research have unearthed six Android vulnerabilities that can be exploited to turn apparently harmless apps into …
Featured news
Resources
Don't miss
- Balancing usability and security in the fight against identity-based attacks
- MSSqlPwner: Open-source tool for pentesting MSSQL servers
- Critical SimpleHelp vulnerabilities fixed, update your server instances!
- Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)