Zeljka Zorz
Amateur hacker behind DDoS attack on China?
When, in late August, China’s Domain Name Service was targeted by a huge DDoS attack which ultimately lead to many websites being completely inaccessible for a period of …
Data broker databases breached, stolen info used by ID theft service
Stolen users information is regularly sold and bought online by cyber crooks and attackers, and many services have sprung up to meet the demand for information that can be …
Yahoo ID recycling scheme is potential security minefield
Yahoo’s recently announced email account / Yahoo ID recycling scheme was meant to free up inactive (and attractive) accounts so that they can be snapped up by another …
Researcher despairs of critical SIM flaws being fixed before attacks happen
Two months have passed since researcher Karsten Nohl announced that he has found and managed to leverage critical flaws in the encryption technology used by some SIM cards, …
A short overview of Android banking malware
As more and more people use their mobile phones to do their online banking, money transfers, and so on, cyber crooks wielding banking malware are increasingly turning to …
IE 0-day attack reports push ISC to raise official threat level
Over the weekend, FireEye researchers have managed to shed some light on the in-the-wild attacks leveraging the latest discovered Internet Explorer zero-day vulnerability …
RSA advises customers to stop using NSA-influenced encryption algorithm
In the wake of the disclosure that the NSA has influenced NIST to adopt an encryption standard that includes one random bit generator with a weakness known only to the …
Clever email campaign delivers deadly ransomware to orgs
A new type of ransomware that obviously concentrates on targeting organizations instead of home users has been spotted by Emsisoft researchers. Dubbed CryptoLocker, the …
Belgacom was breached by Britain’s GCHQ
Earlier this week, the primarily state owned Belgacom – the largest telecom in Belgium, with customers such as the European Commission, Council and Parliament – …
Websites of energy sector companies compromised in watering hole attack
The websites of nearly a dozen energy sector companies have been compromised to serve as so-called “watering holes”, where visitors would be served with malware or …
Researchers discover ties between TDSS and ZeroAccess rootkit families
A lot has been said and written about the long-lasting TDSS (or TDL) and the considerably newer ZeroAccess (or Sirefef) rootkits, and the similarities between the two have …
New wave of Shylock Trojan targets bank customers
Cybercrooks wielding the Caphaw (better known as Shylock) banking Trojan are once again targeting users of financial institutions around the world, warns Zscaler. The initial …
Featured news
Resources
Don't miss
- A suspected Fortinet FortiWeb zero-day is actively exploited, researchers warn
- Why your security strategy is failing before it even starts
- Protecting mobile privacy in real time with predictive adversarial defense
- Los Alamos researchers warn AI may upend national security
- Fake spam filter alerts are hitting inboxes