Zeljka Zorz
Mozilla releases add-on to reveal online data tracking
With a new version (1.0.2) released on Wednesday, Mozilla has once again put the spotlight on its Collusion add-on that aims to show users which first and third parties are …
PHP.net compromised to serve malware
On Thursday, Google’s Safe Browsing service began warning visitors to php.net that the website was discovered serving malware. Initially, most people and PHP maintainers …
Exploring the dangers of a mobile lifestyle
We live in an increasingly digital world, and rely on the devices we use to store our more or less valuable information and to perform critical tasks. In fact, according to a …
Adobe Flash Player sandboxed in Safari on OS X Mavericks
After having worked with Google, Microsoft and Mozilla to incorporate an app sandbox for Flash Player, Adobe has announced that Safari in the recently released OS X Mavericks …
US allies demand explanations about NSA surveillance
Following Le Monde’s Monday report on NSA’s systematic gathering of phone call data of French citizens and the recording of certain calls and text messages has …
GTA 5 cracked PC game scams users
Thousands of impatient gamers have been duped into downloading and running a bogus Grand Theft Auto V version for PCs that made them complete a number of surveys and …
A new classification for potentially unwanted mobile apps
What are PUAs (Potentially Unwanted Applications), and how should they be classified in the mobile (specifically Android) environment? PUAs are not technically malware, and …
Can you trust the apps you use?
With the advent of smartphones, the word “app” has almost become a synonym for pleasure. Whatever you need, whatever you want is right there at your fingertips, …
How meaningful are AV tests?
Anti-malware software from vendors big and small is regularly tested by several antivirus test labs, which may result in awards and certification, but also in disappointment. …
Apple’s iCloud protocols cracked and analyzed
Smartphones carry a lot of sensitive data that in theory should be accessible only to their owners. In practice, a lot of it can be exfiltrated from the devices and from the …
Customizing defense models to reduce the window of exposure
Most organizations already have a defense model in place that is meant to protect them from attacks, but the problem is that many use an outdated one. But the threat landscape …
Lessons learned from sinkholing the ZeroAccess botnet
ZeroAccess (or Sirefef) is a piece of malware that is very adept at hiding its existence from users, and brings in huge sums of money to its masters by performing click-fraud …
Featured news
Resources
Don't miss
- Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
- New UEFI Secure Boot bypass vulnerability discovered (CVE-2024-7344)
- Webinar: Amplifying SIEM with AI-driven NDR for IT/OT convergence
- How CISOs can elevate cybersecurity in boardroom discussions
- A humble proposal: The InfoSec CIA triad should be expanded