Zeljka Zorz
White Lodging confirms POS system breach at 14 US hotels
Hotel management firm White Lodging has confirmed that it has suffered a breach of point of sales systems and has released additional information about the investigation. …
Cyber risks awaiting visitors and viewers of Sochi 2014 Olympics
The 2014 Winter Olympics are set to start on Friday in Sochi, a Russian city located on the shores of the Black Sea. There have been many controversies regarding this choice …
Google ups rewards for third-party software patches
Google is constantly tweaking its bug bounty and patch reward program, and the latest change consists of another broadening of scope and reward amount increases. …
Adobe Flash flaw exploited in the wild, update now
Adobe has released an emergency patch for a critical vulnerability affecting Flash Player for Windows, Linux and OS X, the exploitation of which can result in an attacker …
Windows, IE, Java are most vulnerable
When compared with the numbers from the previous year, 2013 has seen an increase in reported security vulnerabilities and, what’s more, the number of critical …
Target advocates smart cards in wake of breach
The recent avalanche of breaches that resulted in tens of millions of payment cards being compromised has shook both the US retail market and the customers. Despite subsequent …
Personal info of 800,000 Orange customers compromised
Global telecom giant Orange has sent out alerts to nearly 800,000 (some 3 percent) of its French customers warning them that their personal information was compromised in a …
Hackers sue German government for helping NSA spy on its citizens
The Chaos Computer Club (CCC), Europe’s largest hacker association, and the International League for Human Rights (ILMR) are suing the German government for allegedly …
Hotel management firm breached, card details of guests stolen
Hotel management firm White Lodging seems to have had its systems compromised and the attackers managed to exfiltrate a yet unknown quantity of credit and debit card details. …
Pwn2Own 2014: $150,000 for an “exploit unicorn”
There are a few new rules for this years’ edition of the Pwn2Own hacking contest and a huge new prize for an “Exploit Unicorn worthy of myth and legend” …
A solution for fixing hijacked Chrome settings
Many users – if not all – have experienced downloading a free screensaver or game without looking at the small print and consequently getting their browser …
How a fake antivirus attack works
Earlier this month, Invincea researchers have warned about visitors of video-sharing website Dailymotion being targeted with malicious ads leading to bogus infection warnings …
Featured news
Sponsored
Don't miss
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA