Zeljka Zorz
50,000 Statista users affected by data breach
Customers of the biggest online statistics portal Statista are being notified that the company’s systems have been breached and the hackers likely made away with its …
Malware peddlers are trying out different exploit kits
Websense researchers have been following several recent email spam campaigns targeting users of popular services such as Skype and Evernote, and believe them to be initiated …
Hackers dox Mt. Gox CEO, say they have proof of fraud
News about what actually happened in the days leading up to the Mt. Gox Bitcoin exchange filing for bankruptcy are few and far between, and some of its customers are losing …
Latvia establishes a Cyber Defence Unit
With the current situation in Ukraine, and Russian hackers’ penchant for escalating minor and major disputes and conflicts their nation has with neighbouring countries …
Personal info of 12 million KT customers stolen and misused
Two men have been arrested in connection with the massive KT Corp. data breach that resulted in the theft of personal and financial information of some 12 million customers of …
Dendroid spying RAT malware found on Google Play
A new Android malware toolkit called Dendroid is being offered for sale by its creators, and at least one of the malicious APKs created with it has managed to fool Google …
Siesta cyber espionage campaign targets many industries
Trend Micro researchers have uncovered yet another cyber espionage campaign targeting a wide variety of industries including energy, finance, security and defense, and …
Using free Wi-Fi in Europe is risky
Internet users would do well to be extra careful when attempting to use public Wi-Fi hotspots in Europe, as hackers and cyber crooks have lately ramped up their efforts to …
HTTPS can’t be trusted to obscure private online activity
HTTPS was initially used to prove to Internet users that the website and web server with which they are communicating are indeed the ones they want to communicate with, but …
Cybercriminals increasingly drawn to Tor anonymity and hidden services
Initially created to help political dissidents bypass traffic restrictions and hide their online activity from authoritarian governments, the Tor anonymity network has long …
A peek into China’s burgeoning mobile cybercriminal underground
Every country’s cybercriminal underground market has distinct characteristics, and with 500 million national mobile Internet users and the number continuously rising, …
Microsoft’s quest to make users drop Windows XP continues
As the date of the scheduled retirement of Windows XP – arguably one of Microsoft’s most popular products ever – draws near, the company continues its quest …
Featured news
Resources
Don't miss
- Balancing usability and security in the fight against identity-based attacks
- MSSqlPwner: Open-source tool for pentesting MSSQL servers
- Critical SimpleHelp vulnerabilities fixed, update your server instances!
- Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)