Zeljka Zorz
Bomb-threatening student caught because he used Tor on school Wi-Fi
20-year-old Harvard student Eldo Kim has been accused of sending fake bomb threats to Harvard University on Monday. What makes this case interesting is that he used the Tor …
MacBook webcam indicator light can be disabled to aid spying
Two researchers from Johns Hopkins University have proved, without a doubt, that it is possible to activate internal iSight webcams included in some legacy Apple machines …
OpenX / Revive Adserver zero-day actively exploited in the wild
A zero-day vulnerability that allows attackers to gain back-end access to popular open-source advertising server OpenX Source has been discovered by Florian Sander, founder of …
Obama panel advises big changes to NSA surveillance practices
The “independent” Review Group on Intelligence and Communications Technologies ordered to be created by US president Barack Obama in August has finally delivered …
Target breach affects millions who shopped at their stores
US retail giant Target is investigating a security breach that could turn out to be one of the biggest ever, involving compromised payment card information of millions of its …
India set to escalate Internet surveillance
The Indian government is all but set to launch Netra (Network Traffic Analysis), a surveillance system capable of analysing online communication in near real-time and …
DDoS botnet spreading on Linux and Windows machines
A blended DDoS botnet consisting of both Windows and Linux machines has been detected by researchers working with the Polish CERT. The botnet is exclusively dedicated to …
Effective new Trojan skims card info from widely used ATMs
Researchers from Russian AV company Doctor Web have managed to get their hands on a Trojan aimed at recording and collecting card information from one of the most widespread …
Easily deflected ransomware relies on victims’ embarrassment
The appearance of Browlock ransomware earlier this year demonstrates that this type of malware does not need to wreak much havoc on the targets’ computer to be taken …
IE flaw targeted in Aurora attacks still actively exploited
Regular software patching is often touted as one of the best things you can do to keep your computer safe against malware infection. Unfortunately, not all users follow that …
How effective are Android AV solutions?
As the onslaught of Android malware continues, the recently released testing results by independent IT-security institute AV-Test show that most providers of Android antivirus …
Mozilla blocks rogue add-on that made computers scan sites for flaws
A singular new botnet composed of over 12,500 infected computers has been used by its masters to effectively crowdsource the search for websites vulnerable to SQL injection …
Featured news
Resources
Don't miss
- Balancing usability and security in the fight against identity-based attacks
- MSSqlPwner: Open-source tool for pentesting MSSQL servers
- Critical SimpleHelp vulnerabilities fixed, update your server instances!
- Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)