Zeljka Zorz
AutoCAD malware paves the way for future attacks
A piece of malware masquerading as an AutoCAD component with the goal of making systems vulnerable to later exploits has been analyzed by Trend Micro researchers. Unlike the …
Facebook “flaw” discloses users’ private friends list
A recently unearthed potential Facebook security vulnerability can turn out to be a boon for stalkers or social engineers trying to get their friendship request accepted by a …
Do large companies follow encryption best practices?
Following last month’s revelations of the existence of the MUSCULAR program, in which the NSA and the British GCHQ have collaborated in tapping the overseas fiber-optic …
Lavabit founder submits final arguments in potentially game-changing privacy case
The saga surrounding secure email provider Lavabit and its legal fight against the US government continues with a reply brief filed last Friday by the former, arguing that …
NSA compromised 50,000 global computer networks
The NSA has managed to compromise over 50,000 computer networks in its effort to keep abreast of the political, military and economic situation around the world, Dutch daily …
Twitter adds Forward Secrecy to thwart surveillance efforts
Following in the footsteps of Google and Facebook, Twitter has joined the ranks of Internet companies that have (or are working on) implementing Perfect Forward Secrecy, and …
Large-scale net traffic misdirections and MitM attacks detected
Man-In-the-Middle BGP route hijacking attacks are becoming regular occurrences, but it’s still impossible to tell who is behind them, and what their ultimate goal is, …
Judge denies bail for alleged Silk Road owner
Ross William Ulbricht, the alleged 29-year-old founder of black market drug website Silk Road, has been denied bail by US District Judge Kevin Fox in the Southern District of …
Fake AV update notifications deliver malware
Spam emails impersonating a variety of antivirus vendors have been spotted targeting worried users around the globe, urging them to download and run an “important system …
SAP Trojan based partially on Carberp code
Bit by bit, details about the first information-stealing Trojan discovered targeting SAP enterprise software are being unveiled, and Microsoft researchers have tied at least …
Researcher offers new perspective on Stuxnet-wielding sabotage program
Stuxnet, the malware that rocked the security world and the first recorded cyber weapon, has an older and more complex “sibling” that was also aimed at disrupting …
Unified Communications Forensics
“Unified Communications is the integration of real-time communication services such as instant messaging, presence information, telephony (including IP telephony), video …
Featured news
Sponsored
Don't miss
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA