Zeljka Zorz
“Blizzard Entertainment IP Restrictions” phishing email doing rounds
Blizzard Entertainment has acknowledged that the notification email that has been hitting users’ inboxes and has been purportedly sent by the company is, in fact, a …
Information Security Risk Assessment Toolkit
It is a truth universally acknowledged that in order to know what company IT assets you should protect and how, you need to first perform a risk assessment. But how do to go …
Ubisoft breached, user account credentials compromised
Ubisoft has begun notifying account holders of a breach that resulted in their email addresses, usernames and (encrypted) passwords being compromised. “We recently …
Current cybercrime market is all about Cybercrime-as-a-Service
The cybercrime market is constantly evolving, and it is currently full of knowledgeable individuals who have focused on their core competencies to offer services to those who …
Litecoin-stealing Trojan found
Bitcoin is the most popular, but not the only crypto currency out there. As interest in and use of other ones rises, malware that tries to steal particular types of currencies …
NSA hacking and spying on EU officials
Over the weekend, the German Der Spiegel published a report based on a document leaked by NSA whistleblower Edward Snowden that show that the US has been spying on EU …
Android hack tool harvests info from PCs
Stealing information is a piece of cake if you can manage to get malware on the target’s Windows computer, but did you know that it can also be as easy as connecting …
Beware of “Social Security” Facebook phishing scams
Hijacked Facebook Fan Pages are a great asset to online spammers and scammers, so it’s no wonder that at any given time there are a number of active phishing campaigns …
Wi-Vi: Seeing through walls with Wi-Fi signals
Two MIT researchers have created Wi-Vi, an experimental system that uses Wi-Fi signals to track moving objects – usually people – behind a wall and in closed …
Opera developers explain why malicious “update” wasn’t detected
Opera Software has finally come out with more details about the recent compromise of its internal infrastructure, the theft of an expired code signing certificate, and the …
Another NSA internet and email data collection program revealed
As the hunt for Edward Snowden continues, and the NSA whistleblower is thought to be still located in the transit zone of the Moscow Sheremetyevo International Airport, …
U.S. Army cyber forces to get new rules of engagement
“We now live in a world of weaponized bits and bytes, where an entire country can be disrupted by the click of mouse. There are new missions we must take on as a …
Featured news
Sponsored
Don't miss
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA
- Choosing the right secure messaging app for your organization
- Zero-day data security