Zeljka Zorz
Adobe Flash Player sandboxed in Safari on OS X Mavericks
After having worked with Google, Microsoft and Mozilla to incorporate an app sandbox for Flash Player, Adobe has announced that Safari in the recently released OS X Mavericks …
US allies demand explanations about NSA surveillance
Following Le Monde’s Monday report on NSA’s systematic gathering of phone call data of French citizens and the recording of certain calls and text messages has …
GTA 5 cracked PC game scams users
Thousands of impatient gamers have been duped into downloading and running a bogus Grand Theft Auto V version for PCs that made them complete a number of surveys and …
A new classification for potentially unwanted mobile apps
What are PUAs (Potentially Unwanted Applications), and how should they be classified in the mobile (specifically Android) environment? PUAs are not technically malware, and …
Can you trust the apps you use?
With the advent of smartphones, the word “app” has almost become a synonym for pleasure. Whatever you need, whatever you want is right there at your fingertips, …
How meaningful are AV tests?
Anti-malware software from vendors big and small is regularly tested by several antivirus test labs, which may result in awards and certification, but also in disappointment. …
Apple’s iCloud protocols cracked and analyzed
Smartphones carry a lot of sensitive data that in theory should be accessible only to their owners. In practice, a lot of it can be exfiltrated from the devices and from the …
Customizing defense models to reduce the window of exposure
Most organizations already have a defense model in place that is meant to protect them from attacks, but the problem is that many use an outdated one. But the threat landscape …
Lessons learned from sinkholing the ZeroAccess botnet
ZeroAccess (or Sirefef) is a piece of malware that is very adept at hiding its existence from users, and brings in huge sums of money to its masters by performing click-fraud …
Convincing “Urgent Windows Error Fix” phishing email doing rounds
A pretty convincing email phishing campaign is targeting one of the largest user bases out there – those who use Microsoft’s Windows OS – by taking advantage …
Lavabit users allowed to access accounts and retrieve data
Lavabit’s Ladar Levison has announced that the users of his recently closed down email service will be able to briefly access their accounts so that they can retrieve …
Solving the dilemma of vulnerability exploitation disclosure
The subject of software and hardware vulnerability disclosure has been debate time and time again, and most agree that, if possible, vulnerabilities should first be disclosed …
Featured news
Sponsored
Don't miss
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA