Zeljka Zorz
Chrome, Firefox users targeted with account-hijacking plugins
Hijacked social networking accounts can be monetized in a number of ways, so cyber crooks are always thinking up new ways of doing so, preferably without the user noticing. …
How to spot and avoid SMS scams
2013 has been touted by Gartner as the year when mobile phones will overtake PCs as the most common Web access device worldwide. When you think about it, it’s logical, …
72k people affected by University of Delaware hack
University of Delaware is the latest of the high-learning institutions in the US to have been hit with a cyber attack that resulted in a data breach. According to a …
Microsoft announces MAPP overhaul
Introduced in 2008, the Microsoft Active Protections Program (MAPP) was created to give antivirus vendors a head start against malware developers. Vendors would get …
Syrian hackers target White House staffers, Reuters
The Syrian Electronic Army has been busy over the last few days, and has managed both to hijack the official Reuters Twitter account and to compromise personal email accounts …
Hijacking ships and planes with cheap GPS spoofers and laptops
After demonstrating a successful GPS spoofing attack against a drone (UAV – unmanned aerial vehicle) last June, Cockrell School of Engineering Assistant Professor Todd …
Apple Dev Center partially back online, still no details about the hack
Parts of the Apple Developer Center are back online after a week long outage caused by an unnamed intruder that has “attempted to secure” personal information of …
Pinterest joins Twitter in supporting Do No Track
Pinterest, the popular pinboard-style photo-sharing website, has announced a couple of big changes, and among them is the Do Not Track (DNT) feature. “We want you to …
The future of phishing: Credit card redirection
Cyber crooks will go at great lengths to get their hand on users’ credit and debit card information. Usually they try to trick them with spoofed emails that lead to …
Stanford University suffers another data breach
Stanford University has suffered another IT breach, and while its scope is yet to be determined, all users of the university’s computer system are advised to change the …
US SEC data leak shows lax data access practices
When a former employee of the US Securities and Exchange Commission left the organization for a job with another federal agency, he “inadvertently and unknowingly” …
Feds to web firms: Hand over encryption keys and user passwords
The US government and its intelligence and law-enforcement agencies have apparently been trying to get Internet firms to hand over both their users’ account passwords …
Featured news
Sponsored
Don't miss
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA