Zeljka Zorz
Tool for creating booby-trapped PDFs made public
Freelance security researcher Claes Spett has made available a tool he dubbed “PDF Exploit Generator,” which allows penetration testers – but also malicious …
The state of GRX security
Late last year, documents from Edward Snowden’s NSA trove have revealed that Britain’s GCHQ has mounted a successful attack against Belgacom (the largest telecom …
Automatic updating of Android apps becomes riskier
Google has made unwelcome changes to the way new app permissions are disclosed to users: no warnings will be shown if a new permission if is in the same category as an old one …
Microsoft battles US search warrant requesting customer emails stored abroad
Microsoft is battling a search warrant that could have a great impact on the future of US tech companies in the global market. Late last year, a federal magistrate judge in …
How apps and extensions affect your browsing
Google has announced the newest version of the Chrome Apps & Extensions Developer Tool, which helps developers debug apps and extensions, and power users to see which …
iOS 8 will randomize devices’ MAC address to increase privacy
The next major release of Apple’s iOS mobile operating system will include an important change: when local wireless networks scan for devices in range, devices running …
Payment card breach at US restaurant chain P.F. Chang’s
Asian-themed US restaurant chain P.F. Chang’s China Bistro has apparently suffered a breach that resulted in the theft of customers’ payment card data. The extent …
Crypto-ransomware brings in quite a profit
Crypto-ransomware is quickly becoming cybercrooks’ favorite tool to extort money from computer users. After the amazing success of CryptoLocker, copycats have begun …
Some governments have direct access to Vodafone networks
Telecommunications giant Vodafone has released its first-ever Law Enforcement Disclosure Report, and among the things revealed in it is the scary fact that some countries have …
Replicating NSA’s gadgets using open source
One peek at the leaked pages of NSA’s ANT catalog made wireless security researcher Michael Ossmann’s mind start spinning. “Could we – could I – …
German startup raises $2M for NSA-proof server
A German startup has broken crowdfunding records as it managed to get pledges for 1.5 million Euros (around $2 million) in less than a few hours. The project that prompted …
Defeating UEFI’s SecureBoot
The Unified Extensible Firmware Interface (UEFI) is ment to replace the Basic Input/Output System (BIOS) firmware interface found on all IBM PC-compatible personal computers. …
Featured news
Resources
Don't miss
- Webinar: Beyond the Quadrant: An Analyst’s Guide to Evaluating Email Security in 2026
- CISO Assistant: Open-source cybersecurity management and GRC
- Firmware scanning time, cost, and where teams run EMBA
- How AI image tools can be tricked into making political propaganda
- Product showcase: Orbot – Tor VPN for iOS