Zeljka Zorz
Gmail users get full, always-on HTTPS
Google has made good on its word and has introduced default encryption for all Gmail users. “Starting today, Gmail will always use an encrypted HTTPS connection when you …
NSA targets sys admins to breach computer networks
A newly analyzed document from Edward Snowden’s trove show that the NSA collects personal and account information on system administrators and uses it to compromise …
Bitcoin software update fixes transaction ID malleability bugs
Bitcoin Core – as the Bitcoin infrastructure software has been renamed to in order to avoid confusion with the the Bitcoin network – has been updated to make, …
Microsoft accessed Hotmail account to uncover internal leaker
This week’s charging of a former Microsoft employee for stealing the company’s trade secrets could have passed almost unnoticed were it not for an important detail …
BlackOS malicious web traffic managing software is on sale
Security researchers are keeping a close eye on underground cybercrime forums and are quick to spot new offerings, such as the BlackOS software package. Not to be confused …
US tech firms knew about and assisted with PRISM data collection
In a testimony before the Privacy and Civil Liberties Oversight Board, the NSA general council Rajesh De and his colleague stated on Wednesday that the tech companies that …
Over 31,000 IoT devices and computers infected by cryptocoin-mining worm
A new version of the Darlloz Linux worm, which targets Internet-enabled devices such as home routers and security cameras, computers running Intel x86 architectures as well as …
Oracle releases Java 8
Oracle has released Java Standard Edition (SE) 8, Java Development Kit (JDK) 8, and Java Runtime Environment (JRE) 8. The new releases work on Windows 8, Windows 7, Windows …
Tor warns of malicious Tor browser offered on the App Store
A public plea made on Twitter by Runa A. Sandvik, a (former?) developer with The Tor Project has turned the spotlight on a still unresolved issue of an apparently fake Tor …
Fake Malaysia Airlines Flight 370 video hides a backdoor
As the search for the missing Malaysia Airlines Flight 370 nears the end of the second week, cyber crooks are diversifying the attacks against users curious to know what …
NSA records a country’s phone calls, keeps the records for a month
By leveraging a surveillance system dubbed MYSTIC, the US National Security Agency has been recording all phone calls made in a foreign country for a period of 30 days, newly …
Aversion to new Facebook News Feed could lead to scams
Facebook has been gradually rolling out a new, more simplified design for users’ News Feed for a while now. It’s a given that some users won’t like the …
Featured news
Resources
Don't miss
- Avoiding vendor lock-in when using managed cloud security services
- The CISO’s dilemma of protecting the enterprise while driving innovation
- PoC exploit for Ivanti Endpoint Manager vulnerabilities released (CVE-2024-13159)
- Account takeover detection: There’s no single tell
- Man vs. machine: Striking the perfect balance in threat intelligence