Zeljka Zorz
Mobile Pwn2Own: $300k prize pool awaits successful contestants
The next Mobile Pwn2own competition is to be held in November at the PacSec Applied Security Conference in Tokyo, and contestants can earn as much as $100,000 for a successful …
Too long passwords can DoS some servers
The discovery of a vulnerability in popular open source web application framework Django has recently demonstrated that using a long password is not always the best thing to …
Researchers create undetectable layout-level hardware Trojans
The fact that most of computer hardware is produced outside the US and Europe has long presented a worry for the governments of those countries and for the companies and …
Largest Belgian telecom breached by the NSA?
Belgacom, primarily state owned and the largest telecom in Belgium, has announced that its internal IT systems have been breached and compromised with malware by an …
FBI confirms they were behind Freedom Hosting’s takeover
An FBI agent testifying at the court hearing where the subject of bail for Freedom Hosting owner Eric Eoin Marques was discussed has confirmed that the FBI has, indeed, had a …
NSA impersonated Google in MitM attacks
After all the recent revelations about the NSA and their surveillance and encryption-foiling activities, would it surprise you to know that the agency or its British …
Fake “new voicemail” notification targets Android WhatsApp users
Malware peddlers have decided to bank on the popularity of the WhatsApp cross-platform IM app for smartphones in order to get users to install malicious apps on their devices, …
Java finally gets a whitelisting feature
The latest Java Development Kit update (JDK 7u40) includes a number of bug fixes, new security features and changes, and among them is one that has been long overdue: a …
Aggressive ransomware scam redirects to child porn
Getting denounced for viewing or owning child pornography is a huge deal in most Western world countries, so it’s no wonder that ransomware peddlers are using that …
NSA says illegal data collection was caused by too complex tech
NSA’s repeated claims about having its surveillance apparatus under control have taken another hit after the agency has been legally forced to publish a huge batch of …
Attacks targeting unsupported Java 6 are on the rise
As predicted at the end of 2012 and proved by the ever expanding use of exploit kits, vulnerabilities in popular and widespread software such as Java and Adobe’s Acrobat …
2M Vodafone users’ personal and banking info compromised
The names, addresses, birth dates, and bank account information of some 2 million German Vodafone users has been compromised in a breach of a server located “deep in the …
Featured news
Resources
Don't miss
- Smart grids are trying to modernize and attackers are treating it like an invitation
- A day in the life of the internet tells a bigger story
- AI vs. you: Who’s better at permission decisions?
- Massive gambling network doubles as hidden C2 and anonymity infrastructure, researchers say
- Portmaster: Open-source application firewall