Zeljka Zorz
SCADA password cracking code available
ICS-CERT has issued an alert about the existence and general availability of the proof-of-concept exploit code for a tool that can brute force passwords and thus gain access …
Barracuda Networks confirms exploitable backdoors in its appliances
Barracuda Networks has released firmware updates that remove SSH backdoors in a number of their products and resolve a vulnerability in Barracuda SSL VPN that allows attackers …
Watering hole campaign targeting “Reporters without Borders” visitors
Watering hole attacks continue unabated and, according to Avast’s Director of Threat Intelligence Jindrich Kubec, the finger could be safely pointed to China once again. …
Sony fined £250,000 for 2011 Playstation Network breach
The UK Information Commissioner’s Office has fined Sony £250,000 for failing to adequately protect UK gamers’ personal and possibly even financial information …
Users targeted with phishing scam via Facebook messages
Facebook users are advised to be on the lookout for bogus personal messages supposedly sent by the Facebook Security Team. The message claims that the users’ account has …
Australia’s first National Security Strategy emphasizes cyber defense
The publication of Australia’s first National Security Strategy has revealed that Australia will be turning its economic and strategic focus towards the Asia-Pacific …
Jobs offered to student kicked out of college for discovering security flaw
Ahmed Al-Khabaz, the student that has been expelled from Dawson College because of an unauthorized intrusion in the college’s systems to check whether a flaw he recently …
Augmented Reality: An Emerging Technologies Guide to AR
Augmented Reality is not the stuff of science fiction any more, and we should all be at least familiar with its current and likely future uses. This book aims to be an …
Employees targeted with fake DocuSign “confidential message”
An email purportedly sent by the DocuSign Electronic Signature Service on behalf of the administrative departments of a wide variety of organizations and businesses is hitting …
Skype becomes a malware minefield
Skype users should be careful when using the service these days. First CSIS researchers unearthed a campaign misusing Skype to replicate and spread the Shylock banking Trojan …
How to spot APT attacks
With the proliferation of Advanced Persistent Threats (APTs), it’s paramount for those who are charged with defending the systems and networks of likely targets to know …
Google searching for hardware alternatives to passwords
Passwords are on the way out, it seems. With current boom – and obvious success – of phishing, it’s time to see what could be a better alternative to this …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality