Zeljka Zorz
Chrome plugin aims to thwart user profiling efforts
Inspired by a piece of fictional software described in Cory Doctorow’s book Little Brother, developer Ben West created a browser plugin that should, in theory, make it …
New Zeus variant creates bogus Instagram accounts
If you are familiar with the results of a recently finished study regarding online content popularity that concluded that “likes” beget “likes”, the …
LastPass bug leaks plain text passwords
Users of popular password manager LastPass have been advised to update to the latest version of the software, which incorporates a patch for a recently discovered bug that …
Lavabit owner risks arrest for not complying with surveillance order
The incessant revelations fueled by the documents leaked by NSA whistleblower Edward Snowden have made people reevaluate their expectations of privacy and their beliefs on …
Firm found using browser plugins to inject unauthorized ads on YouTube
Sambreel, a California-based firm that nearly two years ago has been found using browser plugins to deliver ads by injecting them into Facebook and Google pages, is up to its …
NSA internal audit reveals thousands of privacy violations
An internal NSA audit document and several other seen by The Washington Post journalists prove that there have been over a 1,000 violations of FISA and presidential executive …
Google delivers patch for Android SecureRandom implementation
An Android security engineer has again confirmed the existence of the vulnerability that made the most popular Bitcoin wallet apps for the platform open to attack, and offered …
Cross-platform Frutas RAT delivered via targeted emails
The cross-platform Frutas RAT is being used in a new email phishing campaign targeting high-profile finance, mining, and telecom companies as well as governments in Europe and …
Practical Anonymity: Hiding in Plain Sight Online
With the recent surveillance scandals tied to the NSA, you can no longer be deemed paranoid or believe yourself to be overreacting if you want to find a way of keeping your …
Joomla exploit doing rounds, users advised to update
Users who run their sites own sites and use the Joomla CMS but haven’t updated it in a while should do so immediately if they don’t want to see their sites …
Cyber crooks misuse Google service to control Android Trojans
Cybercriminals have been spotted using a novel method of controlling Android mobile malware: a legitimate service called Google Cloud Messaging. GCM has been created to allow …
Hacker hijacks baby monitor camera, terrorizes family
A Houston, Texas couple got a great shock this weekend when they heard a male voice coming from a room where their two year old was sleeping. They heard the man shouting to …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality