Zeljka Zorz
Fake Bitdefender Antivirus Plus 2015 offers lead to malware and scams
Scammers are taking advantage of Bitdefender’s good reputation and are luring victims in with promises of free downloads of “Bitdefender Antivirus Plus …
NSA and GCHQ spied on German satcomms, world governments’ leaders
Another week, another explosive revelation coming from Edward Snowden’s archive of NSA documents. This time they reveal the widespread compromise of several German …
Additional NSA-backed code found in RSA crypto products
A group of professors and researchers from several universities in the US and the Netherlands have tested the exploitability of various implementations of the infamous …
Mylar: A system that protects data against server-side snooping
A group of researchers from the Massachusetts Institute of Technology and Meteor Development Group have created a system for building Web services that woud protect data …
WordPress sites hijacked via “free” premium plugins
If you run a WordPress site, and are trying to make some money through it, think twice before installing “free” versions of premium plugins. Researchers from …
Uncommon new worm targets Word and Excel files
Trend Micro researchers have uncovered a new malware family targeting Word and Excel files: the Crigent worm (a.k.a. Power Worm). Crigent uses the Windows PowerShell scripting …
Zorenium bot can now hit iOS users as well
If all the claims included in the adverts for the multi-platform, multi-purpose piece of malware called Zorenium are true, it could very well have a considerable impact on a …
Google: We didn’t access Arrington’s Gmail account to identify leaker
In the wake of the revelation that Microsoft has accessed a blogger’s Hotmail account in order to discover the identity of an employee who leaked company trade secrets, …
Cerberus app users warned about data breach
Users of the Cerberus anti-theft Android app have been receiving warnings from the Cerberus Security Team, urging them to change their password as they have been reset in the …
Hidden crypto currency-mining code spotted in apps on Google Play
You already know that cyber criminals are using malware to make victims’ computers mine crypto currencies for them, but did you know that your phone can be instructed to …
Banks sue Target and Trustwave for damages due to data breach
The Target data breach was one of the biggest in recent history, and has been calamitous for more than just the customers who have had their information stolen. The latest …
Facebook boasts of superior threat detection system
Facebook has a new internal threat-catching framework that is fed with disparate data from all over the Internet, different vendors, and Facebook’s internal sources, and …
Featured news
Resources
Don't miss
- Avoiding vendor lock-in when using managed cloud security services
- The CISO’s dilemma of protecting the enterprise while driving innovation
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence