Zeljka Zorz
News of Boston Marathon bombings used to spread malware
As expected, the Boston Marathon bombings have become an effective lure in the hands of cyber scammers and malware peddlers. Kaspersky Lab researchers are warning about spam …
Linode hackers say they will release stolen customer data
Linode, the web hosting provider that (among others) provides a home for Internet security resource sites Insecure.Org, Nmap.Org, SecLists.Org, and SecTools.Org, has announced …
90% of game hacks and cracks contain malware
Computer and online gaming is big business for companies creating the games, but a considerable drain on the finances of gamers, so it should not come as a surprise that many …
2.4M cards compromised in US supermarket chain breach
Popular US supermarket chain Schnucks has announced on Monday that some 2.4 million credit and debit cards used at 79 of its 100 stores may have been compromised during a four …
Pass-thoughts as a solution to the password problem
A group of researchers from University of California, Berkeley, claims to have achieved 99 percent accuracy when using brainwave signals instead of passwords for user …
WordPress sites targeted by mass brute-force attack
US-CERT has issued an alert regarding the ongoing massive brute-force attacks against WordPress sites, warning users and administrators to keep their installation always …
Set your Google account to be deleted after you die
Google has rolled out an interesting feature: the Inactive Account Manager. Aimed at providing some peace of mind for privacy minded users that worry what will happen with …
FAA and EASA say hijacking planes using an app is not possible
The big news last week was that, according to researcher Hugo Teso, it is possible for malicious individuals to take control of an airplane using a special framework and an …
Twitter’s recipe for security awareness
Security awareness training is an issue that has been and continues to be hotly debated both online and offline. It is also a topic that seems a little out of place at the …
Instant Penetration Testing: Setting Up a Test Lab How-to
If you want to start practicing penetration testing, you will be needing a test lab. This book will tell you what you need in order to do it, how to set it up, and how to use …
Malicious HP scan notifications target employees
Users are once again being targeted with fake notifications about a scanned document, but instead of attaching a malicious file to the email, malware peddlers have opted for …
Cutwail botnet now spreads Android malware
Successful malware peddlers are always thinking up new ways of delivering malware to unsuspecting users. In the past Android malware was mostly served on third-party online …
Featured news
Sponsored
Don't miss
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA
- Choosing the right secure messaging app for your organization
- Zero-day data security