Zeljka Zorz
Malware used in Target breach sold on underground forums
Target continues to be rather tight-lipped about the circumstances of the massive user data theft and the breach of their networks that made it possible, but the few details …
Microsoft extends support for Win XP’s security solutions to mid-2015
Despite having announced earlier this month that they would stop providing signature updates for Security Essentials for Windows XP in April 8, 2014 – the same date when …
Starbucks iOS app stores passwords in clear text
A security researcher has discovered that Starbuck’s iOS mobile application stores users’ usernames, email address and passwords in clear text, and has tried to …
Scammers bypass protection mechanism, offer trojanized Minecraft Android app
Russian Android users who are looking to download the popular Minecraft game app from third-party app markets should be very careful, F-Secure researchers told PC Magazine, as …
User financial info compromised in US Fund for Unicef breach
The US Fund for Unicef, a non-profit NGO headquartered in New York, has notified the Office of the New Hampshire Attorney General that it had suffered a breach in November …
US Federal Court deals a blow to net neutrality
With a verdict of 3-to-0, judges of the US Court of Appeals for the District of Columbia Circuit have decided to strike down the Federal Communications Commission’s Open …
Target hackers shopping around for data decryption services?
The target breach and the massive amount of user information compromised in its wake is understandably worrying customers. But what are the odds of it being actually used by …
Equation determines the optimal moment for a cyber attack
Two researchers have developed a mathematical model for discovering the optimal moment to deploy specific cyber weapons in their arsenal. In a research paper recently …
Trust but verify: Mozilla execs invite researchers to audit their code
The recent revelations about NSA surveillance efforts, and especially the claims that the agency has been persuading or forcing software developers to put in backdoors into …
Bitcoin cold storage and insurance services sprout
The pros and cons of using and investing in Bitcoin and crypto currency in general are no longer a mystery, and solutions to some of the problems are being presented almost …
Fake Target breach notification leads to phishing and complex scams
The extensive Target breach has resounded far and wide in US media, and its customers should worry about their personal or credit card information being misused. After the …
Neiman Marcus, three other US retailers breached
In the wake of the revelations that US retail giant Target has been targeted by cyber thieves comes the news that American luxury department store Neiman Marcus has also …
Featured news
Resources
Don't miss
- Balancing usability and security in the fight against identity-based attacks
- MSSqlPwner: Open-source tool for pentesting MSSQL servers
- Critical SimpleHelp vulnerabilities fixed, update your server instances!
- Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)