Zeljka Zorz
Researchers reveal tricks for Cutwail’s endurance
While some botherders have opted for the arguably much safer P2P architecture in order to assure their botnets’ resilience, others are still clinging to the standard …
Google implements malware scan for submissions to Chrome Web Store
Late last week, Google has announced that submissions to the Chrome Web Store will, from now on, be checked for malware. Mimicking the Android Bouncer program incorporated …
Snowden on the run, leaks continue unabated
The chase is on for whistleblower Edward Snowden and the U.S. government. After legally leaving Hong Kong for Moscow, and despite having his U.S. passport revoked, the former …
Bitcoin Foundation hit with cease and desist order
The Bitcoin Foundation has received a cease and desist letter from the California Department of Financial Institutions, saying that they have been informed that the …
Facebook bug discloses user info, existence of shadow accounts
6 million Facebook users have been affected by a flaw that resulted in the email addresses and phone numbers associated with their accounts being shared with any friend and …
Android fake AV demands ransom, crashes
Fake AV software and ransomware are old news for computer users, but are now poised to become a problem for smartphone users as well. Symantec researchers have recently …
Skype’s Project Chess worked on letting U.S. agencies in
A lot has been said, written and claimed about Skype and the possibility that the U.S. government, intelligence, and law enforcement agencies have been given access to the …
LinkedIn outage was due to DNS records misconfiguration
The mystery of the LinkedIn outage has been revealed: Network Solutions, its DNS provider, has been battered by a DDoS attack and while defending itself, misconfigured the DNS …
Secret documents reveal broad extent of NSA domestic surveillance
Two more top secret NSA documents that Edward Snowden shared with reporters of The Guardian have revealed that his claims about what the agency’s analysts are authorized …
Global repercussions of PRISM scandal
The revelation of the existence of the PRISM program, which allows U.S. government agencies to either directly or indirectly have access to email and chat content, videos, …
Wall Street prepares for simulated cyber attack
Around 40 Wall Street firms – banks, exchanges, and brokerages – are getting ready for Quantum Dawn 2, a simulated cyber attack that will hit them on Friday, June …
Pirate Bay co-founder sentenced for hacking Swedish companies
Pirate Bay co-founder Gottfrid Svartholm has been found guilty of hacking into Swedish IT company Logica and the Nordea bank mainframe and has been sentenced to two years in …
Featured news
Resources
Don't miss
- Rsync vulnerabilities allow remote code execution on servers, patch quickly!
- Contextal Platform: Open-source threat detection and intelligence
- Using cognitive diversity for stronger, smarter cyber defense
- Microsoft fixes actively exploited Windows Hyper-V zero-day flaws
- Fortinet fixes FortiOS zero-day exploited by attackers for months (CVE-2024-55591)