Zeljka Zorz
Massive spike of Tor users caused by Mevade botnet
When Project Tor director Roger Dingledine recently drew the public’s attention to the unusual and considerable rise in the number of Tor users, he invited people to …
PayPal unblocks MailPile’s account
MailPile, the open-source web-mail client with user-friendly encryption that has proved to be a hit with the Indiegogo crowd, has been slapped with some bad news: PayPal has …
Obad Android Trojan distributed via mobile botnets
When first unearthed three months ago, the Obad Android Trojan has fascinated researchers with its sophistication. Difficult to analyze, using a bug in the Android OS to …
Sykipot-wielding attackers now targeting US civil aviation firms
The Sykipot backdoor Trojan is not a new threat. First detected over six years ago, its existence and use has been tied almost exclusively with the cyber espionage activities …
Placing the Suspect Behind the Keyboard
There are many books addressing the subject of computer forensics out there, but this tome is one of the rare ones that approaches cybercrime investigations in a holistic …
Replacing passwords and PINs with your heartbeat
We’ve been hearing for a while now that passwords will soon become a thing of the past and, as it seems now, biometric authentication is likely to take their place. The …
Fake Facebook “Pages you might like” emails deliver malware
Fake Facebook emails urging users to review some Pages they might like are hitting inboxes around the world, warns ThreatTrack. Sporting “Hi [name], here are some Pages …
GitHub adds two-factor authentication option
GitHub is the latest web-based service to add a 2-factor authentication feature to make the users’ login process more secure. “When logging in to GitHub, after …
Hand of Thief Linux Trojan fails to work as promised
RSA researchers have recently spotted a banking Trojan targeting Linux systems being sold online by a cybercrime team based in Russia. Dubbed Hand of Thief by its creator(s), …
AT&T’s massive call detail record database accessible to DEA agents
Since 2007, AT&T employees have been working side by side with US Drug Enforcement Administration and local law enforcement agents, helping them access electronic call …
Persistent adversaries can identify Tor users
Using the Tor network will not you grant perfect anonymity – in fact, a group of researchers from the US Naval Research Laboratory and Georgetown University say that …
NetTraveler APT group is back, adds watering hole attacks to its arsenal
The “Red Star” APT group employing the NetTraveler malware family is still active, but has changed its modus operandi. Its targets remain the same: government …
Featured news
Sponsored
Don't miss
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA