Zeljka Zorz
Obama panel advises big changes to NSA surveillance practices
The “independent” Review Group on Intelligence and Communications Technologies ordered to be created by US president Barack Obama in August has finally delivered …
Target breach affects millions who shopped at their stores
US retail giant Target is investigating a security breach that could turn out to be one of the biggest ever, involving compromised payment card information of millions of its …
India set to escalate Internet surveillance
The Indian government is all but set to launch Netra (Network Traffic Analysis), a surveillance system capable of analysing online communication in near real-time and …
DDoS botnet spreading on Linux and Windows machines
A blended DDoS botnet consisting of both Windows and Linux machines has been detected by researchers working with the Polish CERT. The botnet is exclusively dedicated to …
Effective new Trojan skims card info from widely used ATMs
Researchers from Russian AV company Doctor Web have managed to get their hands on a Trojan aimed at recording and collecting card information from one of the most widespread …
Easily deflected ransomware relies on victims’ embarrassment
The appearance of Browlock ransomware earlier this year demonstrates that this type of malware does not need to wreak much havoc on the targets’ computer to be taken …
IE flaw targeted in Aurora attacks still actively exploited
Regular software patching is often touted as one of the best things you can do to keep your computer safe against malware infection. Unfortunately, not all users follow that …
How effective are Android AV solutions?
As the onslaught of Android malware continues, the recently released testing results by independent IT-security institute AV-Test show that most providers of Android antivirus …
Mozilla blocks rogue add-on that made computers scan sites for flaws
A singular new botnet composed of over 12,500 infected computers has been used by its masters to effectively crowdsource the search for websites vulnerable to SQL injection …
Resurgence of malware signed with stolen certificates
Since 2009, variants of the Winwebsec rogue AV family have been trying to trick users into believing their computer has been infected and into paying for …
NSA can easily decrypt private cell calls
A document from the seemingly inexhaustible trove delivered by former NSA contractor Edward Snowden shows that the NSA can easily break the old and weak algorithm still used …
Shady Android AV pushed onto unsuspecting users
A deceptive advertising campaign pushing a shady antivirus solution is actively targeting Android users, warns Malwarebytes’ Armando Orozco. The pop-ups are triggered …
Featured news
Sponsored
Don't miss
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA