Zeljka Zorz
Opera infrastructure compromised, users hit with malicious update
A breach of the Opera Software internal infrastructure has resulted in the theft of an expired Opera code signing certificate and used it to sign a piece of malware, package …
Data-slurping Facebook Graph Search flaw revealed
A mobile developer has discovered what he claims is a security vulnerability in the Facebook Graph Search that allowed him to automate the compilation of a list of some 2.5 …
Confirmed: Carberp source code leaked
It has been confirmed: the password-protected ZIP file that is currently sold on a number of underground forum does indeed contain the source code of the infamous Carberp …
Stolen laptop containing info on victims, suspects, witnesses and police
Some 2,300 individuals have been notified that they might become victims of identity thieves after a laptop and a personal hard drive belonging to an undercover officer of a …
Blizzard suspends mobile app access following account hijacks
A number of World of Warcraft players have been unpleasantly surprised this last week to find that someone has apparently broken into their accounts and bought low-level items …
Lulzsec hacker Davis freed, back on the Internet
Jake Davis (aka Topiary), the former Lulzsec hacker and spokesman, has been released from the Feltham Young Offenders’ Institution, where he spent 37 days following his …
Car hack attack a possible theory behind journalist’s death
The upcoming DEFCON hacking conference will have many presenters touching on a great number of subjects, including that of car hacking. Security researcher Charlie Miller, …
U.S. senators propose new privacy bill following surveillance scandal
A group of U.S. senators lead by Senator and Chairman of the Senate Judiciary Committee Patrick Leahy have introduced a new legislation that aims to improve government …
Researchers reveal tricks for Cutwail’s endurance
While some botherders have opted for the arguably much safer P2P architecture in order to assure their botnets’ resilience, others are still clinging to the standard …
Google implements malware scan for submissions to Chrome Web Store
Late last week, Google has announced that submissions to the Chrome Web Store will, from now on, be checked for malware. Mimicking the Android Bouncer program incorporated …
Snowden on the run, leaks continue unabated
The chase is on for whistleblower Edward Snowden and the U.S. government. After legally leaving Hong Kong for Moscow, and despite having his U.S. passport revoked, the former …
Bitcoin Foundation hit with cease and desist order
The Bitcoin Foundation has received a cease and desist letter from the California Department of Financial Institutions, saying that they have been informed that the …
Featured news
Resources
Don't miss
- Social data puts user passwords at risk in unexpected ways
- New observational auditing framework takes aim at machine learning privacy leaks
- Why password management defines PCI DSS success
- Hottest cybersecurity open-source tools of the month: November 2025
- Gainsight breach: Salesforce details attack window, issues investigation guidance