Zeljka Zorz
Selectively re-using bad passwords is not a bad idea, researchers say
For all the repeated advice to use different, complex password for each online account, users are still opting for easy-to-guess, short ones and use them repeatedly across …
Researcher launches SSL Blacklist
Roman Hussy, the Swiss security activist behind Abuse.ch, has started another project: the SSL Blacklist (SSLBL). Known for the trackers that keep tabs on command and control …
Google goes to war against zero-days
Google has announced the launch of Project Zero, a dedicated internal team that will concentrate on finding zero-day vulnerabilities in Google’s and third-party software …
PittyTiger APT group sells its services to companies
APT attackers thought to be operating from China often seem financed by the government, but there are other groups that work for the highest bidder, which is usually a private …
CNET attacked by Russian hackers, user database stolen
Russian hacker group W0rm has apparently managed to breach servers belonging to media website CNET, and make off with databases containing usernames, emails, and encrypted …
First aid kit for people who face digital threats
A group of NGOs that includes the EFF, Global Voices, and Internews, has launched the Digital First Aid Kit, an open source self-assessment tool for people who face digital …
Google testing new phishing and malware warnings
A Google engineer and a member of the Google Chrome security team has shared on Twitter a new look that is being tested for the phishing and malware warnings seen by Chrome …
Critical vulnerabilities in web-based password managers found
A group of researchers from University of California, Berkeley, have analyzed five popular web-based password managers and have discovered – and then responsibly …
Keyloggers found at hotel business centers, US Secret Service warns
In the wake of the arrest of a group of people suspected of having compromised computers in hotel business centers in Texas, the US Secret Service and the DHS’s National …
Penetration Testing: A Hands-On Introduction to Hacking
There are many people out there fascinated by the idea of penetration testing, but they believe they could never learn to do it, or haven't got a clue on where to start. This …
Estimated $3.75bn stolen by Brazil fraud ring
An estimated $3.75 billion have been netted by a single fraud ring that took advantage of a popular Brazilian payment method – the Boleto – by wielding a …
No-IP reclaims control of domains seized by Microsoft
The end of No-IP customers’ troubles seems near, as Microsoft has relinquished control of the 23 domain names it seized control of on Monday with the blessing of a …
Featured news
Resources
Don't miss
- Cybercriminals exploit RMM tools to steal real-world cargo
- Former ransomware negotiators allegedly targeted US firms with ALPHV/BlackCat ransomware
- How nations build and defend their cyberspace capabilities
- Uncovering the risks of unmanaged identities
- Deepfakes, fraud, and the fight for trust online