Zeljka Zorz
Backdoor targeting Apache servers spreads to nginx, Lighttpd
Last week’s revelation of the existence of Linux/Cdorked.A, a highly advanced and stealthy Apache backdoor used to drive traffic from legitimate compromised sites to …
Anonymous’ OpUSA is under way
Anonymous’ “Operation USA” began yesterday and among its first confirmed victims is the Honolulu Police Department. According to Hawaii News Now, the …
Phishers target eBay customers via live chat support
U.K.-based ISP Netcraft is warning users about phishers impersonating eBay’s live chat support feature in the hopes of getting their hands on eBay users’ login, …
Beware of fake AV and ransomware combo
Ransomware and fake antivirus solutions are well-known threats, but a deadly fraudulent combination of the two has been recently spotted by Total Defense researchers. The …
Pentagon report accuses China military of cyber espionage
The Pentagon has come out and said it: “China is using its computer network exploitation (CNE) capability to support intelligence collection against the U.S. diplomatic, …
Attackers breach and encrypt TV station’s email server
The email server of FOX21 News has been hacked over the weekend and the information it contained held ransom. The attackers were asking for $5,000 to decrypt the information …
U.S. media sites compromised, lead to malware
At least five U.S. media sites and a number of other popular ones have been compromised and are redirecting visitors to malicious URLs, Zscaler warns. The sites have been …
IE8 0-day used in watering hole attacks
Last week a U.S. Department of Labor website was discovered to be redirecting users to sites serving a hard-to-detect variant Poison Ivy backdoor Trojan. Researchers are now …
Malware you can “live with”, but shouldn’t
The main symptom of a computer being infected with the ZeroAccess (or Sirefef) malware is that online searches via Google Search often lead to unhelpful pages filled with ads …
IRC/HTTP based DDoS bot nukes other bots
Online underground markets seem to offer anything and everything a budding cyber criminal might need. Compromised online accounts? They’ve got them. Malicious domain …
Top Android AV software fooled by common evasion techniques
A team of researchers from Northwestern University and North Carolina State University have tested ten of the most popular Android anti-virus software and have discovered that …