Zeljka Zorz
Backdoored NIST standard revealed, will be reopened for review
Following last week’s revelation that the NSA has, among other things, influenced the US National Institute of Standards and Technology (NIST) to adopt an encryption …
JollyBot SMS Trojan offered for use to low-level crooks via affiliate network
The current cybercrime market is all about Cybercrime-as-a-Service – knowledgeable individuals focus on their core competencies to offer services to those who have not …
Bogus iPhone 5C giveaway hits Facebook users
The long awaited unveiling of the upcoming iPhone 5S and 5C has provided the perfect lure for Facebook scammers. A message showing a picture of multicolored iPhones 5C and …
Android scareware delivered via spoofed email notices
A spam campaign targeting Android and PC users simultaneously has been recently spotted by FireEye researchers. The attacks starts with spoofed emails made to look like a …
C&C PHP script for staging DDoS attacks sold on underground forums
Earlier this year, US-CERT has deemed it important to release an alert about publicly accessible open recursive DNS servers that are increasingly being used in DNS …
EU politicians want to suspend banking data-sharing program
Following the claims that the NSA has spied on the Belgian-based Society for Worldwide Interbank Financial Telecommunication (SWIFT) – the organization that provides the …
Fake AVG AV apps offered on Google Play
However hard Google works to prevent malicious apps from being offered on Google Play, its official online Android market, some always get through. AVG researchers warn about …
Phishers use free iPhone 5S as lure ahead of launch
As the moment when Apple is set to unveil its latest offerings slowly approaches and it seems almost sure they will show several version of iPhone 5, cyber scammers are trying …
With crypto being insecure, whom do you trust?
Last week’s revelation that the NSA has for years now concentrated on subverting the encryption that protects commerce and banking transactions, sensitive data, e-mails, …
Fake emails saying US is bombing Syria lead to malware
Two distinct spam campaigns taking advantage of the current political situation in Syria have been spotted by Symantec and Kaspersky Lab researchers. The first one consists of …
Backdoor brute-forces Joomla and WordPress sites
A recently discovered backdoor with brute-forcing capabilities that are used against Joomla- and WordPress-managed blogs has shown, once again, the importance of keeping your …
NSA’s quest to subvert encryption, install backdoors
Journalists from the NYT and ProPublica have joined efforts and have published the most explosive article to date dealing with revelations about NSA spying efforts. Backed by …
Featured news
Sponsored
Don't miss
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA