Zeljka Zorz
Researchers share more details about the Target POS malware
A handful of security companies have been researching the Target breach, and the information they unearthed is slowly trickling out to satisfy the public’s curiosity as …
Symantec seeks to patent technology for spotting malicious torrents
In most people’s minds, the concept of torrents is generally associated with pirated content. Despite this, everyone should know that BitTorrent is a file transfer / …
Malware used in Target breach sold on underground forums
Target continues to be rather tight-lipped about the circumstances of the massive user data theft and the breach of their networks that made it possible, but the few details …
Microsoft extends support for Win XP’s security solutions to mid-2015
Despite having announced earlier this month that they would stop providing signature updates for Security Essentials for Windows XP in April 8, 2014 – the same date when …
Starbucks iOS app stores passwords in clear text
A security researcher has discovered that Starbuck’s iOS mobile application stores users’ usernames, email address and passwords in clear text, and has tried to …
Scammers bypass protection mechanism, offer trojanized Minecraft Android app
Russian Android users who are looking to download the popular Minecraft game app from third-party app markets should be very careful, F-Secure researchers told PC Magazine, as …
User financial info compromised in US Fund for Unicef breach
The US Fund for Unicef, a non-profit NGO headquartered in New York, has notified the Office of the New Hampshire Attorney General that it had suffered a breach in November …
US Federal Court deals a blow to net neutrality
With a verdict of 3-to-0, judges of the US Court of Appeals for the District of Columbia Circuit have decided to strike down the Federal Communications Commission’s Open …
Target hackers shopping around for data decryption services?
The target breach and the massive amount of user information compromised in its wake is understandably worrying customers. But what are the odds of it being actually used by …
Equation determines the optimal moment for a cyber attack
Two researchers have developed a mathematical model for discovering the optimal moment to deploy specific cyber weapons in their arsenal. In a research paper recently …
Trust but verify: Mozilla execs invite researchers to audit their code
The recent revelations about NSA surveillance efforts, and especially the claims that the agency has been persuading or forcing software developers to put in backdoors into …
Bitcoin cold storage and insurance services sprout
The pros and cons of using and investing in Bitcoin and crypto currency in general are no longer a mystery, and solutions to some of the problems are being presented almost …
Featured news
Resources
Don't miss
- Hackers used Cisco zero-day to plant rootkits on network switches (CVE-2025-20352)
- Microsoft revokes 200 certs used to sign malicious Teams installers
- A new approach to blockchain spam: Local reputation over global rules
- SAP zero-day wake-up call: Why ERP systems need a unified defense
- “Perfect” Adobe Experience Manager vulnerability is being exploited (CVE-2025-54253)