Zeljka Zorz
Atypical cloned banking app pops up on Google Play
An unusual instance of a cloned banking app has been spotted on Google Play by Lookout researchers: the app steals only the users’ ID, and leaves alone the password. The …
Drastic decline in vulnerable NTP servers due to Heartbleed?
In light of the escalation of DDoS attacks used as a means of extorting money from online businesses, the news that there has been a significant decrease in vulnerable Network …
Improperly anonymized taxi logs reveal drivers’ identity, movements
Software developer Vijay Pandurangan has demonstrated that sometimes data anonymizing efforts made by governments and businesses are worryingly inadequate, as he managed to …
Capabilities of “lawful interception” mobile malware revealed
Researchers from Russian AV company Kaspersky Labs and the Citizen Lab of the University of Toronto have released details about the mobile surveillance tools provided by …
Havex malware targets ICS/SCADA systems
F-Secure researchers have, for a while now, been monitoring the spreading of the Havex malware family and have been trying to determine who are the attackers that wield it. …
Dropbox-themed phishing is after multiple login credentials
Phishing emails purportedly leading users to a file hosted on Dropbox are targeting Yahoo!, Gmail, Hotmail, and Aol email users, warns Malwarebytes’ Jovi Umawing. …
Google forks OpenSSL: BoringSSL will be used in company products
Google has announced another OpenSSL fork. Dubbed BoringSSL, it will, in time, replace the OpenSSL library in various Google’s projects. “We have used a number of …
Cisco releases source code for experimental block cipher
A team of Cisco software engineers has created a new encryption scheme, and has released it to the public along with the caveat that this new block cypher is not ready for …
Critical flaw exposes admin passwords of nearly 32,000 servers
Over 30,000 servers with Supermicro baseboard management controllers (BMCs) on their motherboards are offering up administrator passwords to anyone who knowns where to look, …
TrueCrypt developer says forking the software is impossible
Even though a number of people have expressed interest in continuing the development of TrueCrypt, the future of these projects is questionable as one of the TrueCrypt …
Court decides bank is not to blame for $440k cybertheft
In many ways, small businesses are the perfect target for money hungry cyber crooks. Smaller companies are unlikely to have dedicated IT employees, making it less likely they …
Code hosting Code Spaces destroyed by extortion hack attack
Cloud code hosting service Code Spaces is forced to shut down, as a DDoS attack coupled with an unsuccessful extortion attempt was followed by the attacker deleting most of …
Featured news
Resources
Don't miss
- Why a decade-old EnCase driver still works as an EDR killer
- Smart glasses are back, privacy issues included
- Cybersecurity planning keeps moving toward whole-of-society models
- Major vulnerabilities found in Google Looker, putting self-hosted deployments at risk
- Global Threat Map: Open-source real-time situational awareness platform