Zeljka Zorz
British GCHQ spied on G20 delegates to gain advantage in talks
The British GCHQ has monitored computers and intercepted phone calls made by the foreign participants of two G20 summit meetings in London in 2009 and provided crucial …
Japan aims to monitor Internet-based communications
After having agreed on a draft of an official cybersecurity strategy earlier this month, Japan’s National Information Security Center (NISC) is looking to establish a …
Asia-wide targeted campaign drops backdoor, RAT
A new and widespread phishing campaign has been discovered targeting businesses and government institutions across Asia, Trend Micro reports. Telecoms, oil and gas companies, …
ISC-CERT warns about medical devices with hard-coded passwords
Approximately 300 different surgical and anesthesia devices, ventilators, drug infusion pumps, external defibrillators, patient monitors, and laboratory and analysis equipment …
Why does the public now listen to an U.S. government whistleblower?
This is not the first time that a government whistleblower has come forward and tried to warn the U.S. public about the surveillance overreach of government agencies, but it …
Google warns Iranian users of politically-motivated phishing
A massive phishing campaign believed to be motivated by the upcoming Iranian presidential election has been spotted targeting Iranian Gmail users, the company warned in a blog …
Congress reacts to NSA’s spying on U.S. citizens
A bipartisan group of senators has introduced on Tuesday a bill that would “require the Attorney General to declassify significant Foreign Intelligence Surveillance …
Sourceforge accounts hosting malicious files
Popular online source code repository Sourceforge has once again been misused by malware peddlers to host malicious files. A considerable number of malware downloads files …
80+ orgs ask U.S. Congress to halt government surveillance
Over 80 organizations, civil liberty groups, Internet companies, public figures and private individuals have launched the StopWatching.Us initiative and have signed an open …
Researches test resilience of P2P botnets
Following increased efforts by a number of companies and organizations, the takedown on botnet C&C servers is now a pretty regular occurrence and cyber crooks have …
Obama, Verizon, NSA sued for collecting U.S. citizens’ phone call data
Three individuals have filed the first lawsuit aimed at disputing the constitutionality of NSA’s collection of metadata on phone calls made by or to U.S. citizens. Larry …
Washington Free Beacon website redirects to malware
A “big” story like that regarding NSA spying was bound to be used by cyber crooks as a lure. So far, no emails containing links to booby-trapped pages or malicious …
Featured news
Sponsored
Don't miss
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA
- Choosing the right secure messaging app for your organization
- Zero-day data security