Zeljka Zorz
IE8 0-day used in watering hole attacks
Last week a U.S. Department of Labor website was discovered to be redirecting users to sites serving a hard-to-detect variant Poison Ivy backdoor Trojan. Researchers are now …
Malware you can “live with”, but shouldn’t
The main symptom of a computer being infected with the ZeroAccess (or Sirefef) malware is that online searches via Google Search often lead to unhelpful pages filled with ads …
IRC/HTTP based DDoS bot nukes other bots
Online underground markets seem to offer anything and everything a budding cyber criminal might need. Compromised online accounts? They’ve got them. Malicious domain …
Top Android AV software fooled by common evasion techniques
A team of researchers from Northwestern University and North Carolina State University have tested ten of the most popular Android anti-virus software and have discovered that …
Google Glass hacked, could be used for spying
The advent of Google Glass – the Augmented reality, head-mounted display that looks like a pair of glasses (albeit a little more high-tech) and allows users to access …
A primer on Bitcoin risks and threats
Bitcoin is a digital currency whose creation and transfer is based on an open source cryptographic protocol. There are many benefits to using it (no transaction fees, …
FinFisher spy kit’s C&C servers are popping up around the world
Some two months ago, Reporters Without Borders have identified UK-based Gamma International as one of the “enemies of the Internet” due to their FinFisher spyware …
Hackers challenged to crack unhackable secure messaging app
Swiss-based U.K. firm Redact has launched a new app which, they claim, offers a completely secure way of exchanging encrypted messages from iPhone to iPhone and even the …
Fake PayPal “Reset your password” request leads to malware
PayPal customers are being targeted with a fake email impersonating the e-payment service, claiming that their account has been put “on hold” and will stay that …
APT1 cyber espionage group is back to their old tricks
Despite Mandiant’s prediction that the release of their report on the attack methodology of the so-called APT1 (or “Comment Crew”) cyber espionage group …
FBI wants to fine companies not complying with wiretap orders
The FBI is pushing for a new legislation aimed at pressuring tech companies to create ways for law enforcement officials to be able to wiretap popular communication channels …
Scammy Profile Viewer app is now “offered” by Facebook
Once users become too familiar with a type of scam and stop falling for it, scammers tend to move on to new ones. But every now and then they go back to using old ones for a …
Featured news
Resources
Don't miss
- Social data puts user passwords at risk in unexpected ways
- New observational auditing framework takes aim at machine learning privacy leaks
- Why password management defines PCI DSS success
- Hottest cybersecurity open-source tools of the month: November 2025
- Gainsight breach: Salesforce details attack window, issues investigation guidance