Zeljka Zorz
Scan of Google Play apps reveals thousands of secret keys
A team of researchers from Columbia University has downloaded and decompiled over 880,000 applications found on Google Play, and has discovered – among other things …
Would you run potentially malicious programs in return for a dollar?
A group of researchers have discovered a depressing fact: some computer users will download and run an executable that they can’t be sure isn’t malicious for as …
Microsoft patches DoS flaw in its Malware Protection Engine
Microsoft has released an update for its Malware Protection Engine to fix a privately reported security vulnerability that could allow a denial of service if the Microsoft …
Android smartphones pre-installed with malware hit the market
Cheap Android-based smartphones pre-installed with spyware are being distributed to European users, experts from German security vendor G Data are warning. The malware is …
GCHQ legally intercepts Google, Facebook users’ communications
A successful legal challenge has forced the UK’s top counter-terrorism official to reveal the (until now) secret government policy that allows the GCHQ to intercept …
Hacker nets over $600k by compromising NAS systems to mine Dogecoin
A single threat actor is responsible for the compromise of a considerable number of Synology NAS systems that were set to mine Dogecoing in secret and have netted him over …
There’s a new banking Trojan in town
A new piece of banking malware is being delivered via tax- and invoice-themed phishing campaigns, Danish security company CSIS is warning. Dubbed “Dyreza,” the …
Java program to reverse Android ransomware damage
University of Sussex student Simon Bell has reverse-engineered the Android Simplocker (Simplelocker) ransomware, and has created a Java program that can be converted into an …
A new defense against kernel-mode exploits
Over the past many years, there’ve been a plethora of security solutions available for Windows-based endpoints, but most of them are helpless against malicious code …
Being a CISO at a higher education institution
In this interview, Matt Santill, CISO of Broward College, talks about the requirements and peculiarities of his job, the technologies the college uses to make its network …
Use your own encryption keys for Amazon S3 storage
Amazon Web Services has some good news for users of S3, its popular online file storage web service: they can now use their own encryption keys to protect their data at rest. …
Microsoft says user content won’t be used for targeted advertising
Microsoft has announced several changes to its Microsoft Services Agreement (MSA), and the most important one is that they have now put in writing that they are not using …
Featured news
Resources
Don't miss
- Groupe Rocher CISO on strengthening a modern retail cybersecurity strategy
- Zen-AI-Pentest: Open-source AI-powered penetration testing framework
- Singapore telcos breached in China-linked cyber espionage campaign
- Microsoft tightens Windows security with app transparency and user consent
- Unpatched SolarWinds WHD instances under active attack