Zeljka Zorz
Can mobile malware be activated via sensors?
Can mobile malware be activated via sensors available on current mobile devices, and receive commands through out-of-band communication methods? If you ask a group of …
U.S. weapons systems designs reportedly stolen by hackers
Hackers – more than likely Chinese – have stolen designs for two dozen U.S. weapons systems during a series of raids, a previously undisclosed section of a report …
Brazilian govt sites found serving malware
Cyber crooks targeting Brazilian users have a well-documented predilection for banking Trojans, but every now and then they opt for other types of malware. Trend Micro …
Liberty Reserve founder arrested, site and service inaccessible
When the website of Liberty Reserve, a Costa Rica-based payment processor popular with cyber criminals, became inaccessible late last week, speculation about what caused were …
Scanner identifies malware strains, could be future of AV
When it comes to spotting malware, signature-based detection, heuristics and cloud-based recognition and information sharing used by many antivirus solutions today work well …
Zeus variants are back with a vengeance
After analyzing the feedback from the company’s Smart Protection Network, Trend Micro researchers have noted an upswing in attempted Zeus / Zbot Trojan infections. After …
Google set to upgrade its SSL certs
As a fine example of proactive security, Google has announced that it will be upgrading its SSL certificates to 2048-bit keys by the end of 2013. “We will begin …
Facebook phishers target Fan Pages owners
Phishing emails claiming to come from “Facebook Security” are once again hitting users’ inboxes, and this time they are aiming for the big fish: pages that …
Google researcher reveals another Windows 0-day
Tavis Ormandy – the Google researcher known for discovering a slew of Windows, Java and Flash Player vulnerabilities and zero-days and his combative attitude regarding …
DHS employees’ info possibly compromised due to system flaw
U.S. Department of Homeland Security employees have begun receiving notifications about a vulnerability that has inadvertently made their personal information potentially …
The dangers of downloading software from unofficial sites
Because malware peddlers often bundle their malicious wares with legitimate software, downloading anything from unofficial download sites is a bit like playing Russian …
Twitter finally offers 2-factor authentication
Following a slew of high-profile compromises of accounts belonging to media outlets such as AP and satirical news site The Onion, Twitter has finally implemented two-factor …
Featured news
Resources
Don't miss
- Social data puts user passwords at risk in unexpected ways
- New observational auditing framework takes aim at machine learning privacy leaks
- Why password management defines PCI DSS success
- Hottest cybersecurity open-source tools of the month: November 2025
- Gainsight breach: Salesforce details attack window, issues investigation guidance