Zeljka Zorz
Details for 30 Oracle Java Cloud Service flaws revealed
Polish security start-up Security Explorations has publicly released technical details and Proof-of-Concept code for 30 security vulnerabilities they found in Oracle Java …
Network Security Through Data Analysis
One of the most crucial tasks of a network administrator is to keep the network secure - or as secure as possible. In order to do this, they must know of which components the …
Cybercrooks target IoT devices to mine Bitcoins
The results of a recent investigation by SANS ISC CTO Johannes Ullrich are in: cybercriminals have been targeting a variety of Internet-of-Things devices and infecting them …
Coinbase denies security breach, defends spamming-friendly features
Popular Bitcoin exchange and online wallet service Coinbase has denied that it had suffered a breach and claims that the list of some 2,000 Coinbase user names and emails …
Tinder users targeted by spamming bots
Spammers are taking advantage of the popularity of the Tinder dating app to promote a game via bots posing as attractive women. For a week now users have been complaining of …
Passwords, messages of 158k+ Boxee.tv users leaked
The forum database of Web TV service Boxee.tv has been ransacked and the attacker made off with – and has subsequently made available for download – a dump …
Fake Bitdefender Antivirus Plus 2015 offers lead to malware and scams
Scammers are taking advantage of Bitdefender’s good reputation and are luring victims in with promises of free downloads of “Bitdefender Antivirus Plus …
NSA and GCHQ spied on German satcomms, world governments’ leaders
Another week, another explosive revelation coming from Edward Snowden’s archive of NSA documents. This time they reveal the widespread compromise of several German …
Additional NSA-backed code found in RSA crypto products
A group of professors and researchers from several universities in the US and the Netherlands have tested the exploitability of various implementations of the infamous …
Mylar: A system that protects data against server-side snooping
A group of researchers from the Massachusetts Institute of Technology and Meteor Development Group have created a system for building Web services that woud protect data …
WordPress sites hijacked via “free” premium plugins
If you run a WordPress site, and are trying to make some money through it, think twice before installing “free” versions of premium plugins. Researchers from …
Uncommon new worm targets Word and Excel files
Trend Micro researchers have uncovered a new malware family targeting Word and Excel files: the Crigent worm (a.k.a. Power Worm). Crigent uses the Windows PowerShell scripting …
Featured news
Resources
Don't miss
- Chinese cyber spies used Claude AI to automate 90% of their attack campaign, Anthropic claims
- A suspected Fortinet FortiWeb zero-day is actively exploited, researchers warn
- Why your security strategy is failing before it even starts
- Protecting mobile privacy in real time with predictive adversarial defense
- Los Alamos researchers warn AI may upend national security