Zeljka Zorz
Fake AVG AV apps offered on Google Play
However hard Google works to prevent malicious apps from being offered on Google Play, its official online Android market, some always get through. AVG researchers warn about …
Phishers use free iPhone 5S as lure ahead of launch
As the moment when Apple is set to unveil its latest offerings slowly approaches and it seems almost sure they will show several version of iPhone 5, cyber scammers are trying …
With crypto being insecure, whom do you trust?
Last week’s revelation that the NSA has for years now concentrated on subverting the encryption that protects commerce and banking transactions, sensitive data, e-mails, …
Fake emails saying US is bombing Syria lead to malware
Two distinct spam campaigns taking advantage of the current political situation in Syria have been spotted by Symantec and Kaspersky Lab researchers. The first one consists of …
Backdoor brute-forces Joomla and WordPress sites
A recently discovered backdoor with brute-forcing capabilities that are used against Joomla- and WordPress-managed blogs has shown, once again, the importance of keeping your …
NSA’s quest to subvert encryption, install backdoors
Journalists from the NYT and ProPublica have joined efforts and have published the most explosive article to date dealing with revelations about NSA spying efforts. Backed by …
Massive spike of Tor users caused by Mevade botnet
When Project Tor director Roger Dingledine recently drew the public’s attention to the unusual and considerable rise in the number of Tor users, he invited people to …
PayPal unblocks MailPile’s account
MailPile, the open-source web-mail client with user-friendly encryption that has proved to be a hit with the Indiegogo crowd, has been slapped with some bad news: PayPal has …
Obad Android Trojan distributed via mobile botnets
When first unearthed three months ago, the Obad Android Trojan has fascinated researchers with its sophistication. Difficult to analyze, using a bug in the Android OS to …
Sykipot-wielding attackers now targeting US civil aviation firms
The Sykipot backdoor Trojan is not a new threat. First detected over six years ago, its existence and use has been tied almost exclusively with the cyber espionage activities …
Placing the Suspect Behind the Keyboard
There are many books addressing the subject of computer forensics out there, but this tome is one of the rare ones that approaches cybercrime investigations in a holistic …
Replacing passwords and PINs with your heartbeat
We’ve been hearing for a while now that passwords will soon become a thing of the past and, as it seems now, biometric authentication is likely to take their place. The …
Featured news
Resources
Don't miss
- January 2026 Patch Tuesday forecast: And so it continues
- How AI agents are turning security inside-out
- Security teams are paying more attention to the energy cost of detection
- Recently fixed HPE OneView flaw is being exploited (CVE-2025-37164)
- PoC released for unauthenticated RCE in Trend Micro Apex Central (CVE-2025-69258)