Zeljka Zorz
Critical Java 0-day flaw exploited in the wild
Researchers from security firm FireEye have discovered targeted attacks exploiting a zero-day Java vulnerability to deliver the Poison Ivy RAT onto the unsuspecting …
Dropbox introduces 2-factor authentication
Early this month, popular file hosting service Dropbox confirmed an internal breach the resulted in its European users receiving spam advertising gambling websites, and …
“Tax Payment Rejected” spam campaign
Bogus emails supposedly coming from the US Internal Revenue Service (IRS), informing users that their “tax transaction” has been cancelled and trying to get them …
Crisis malware doesn’t affect most VMware hypervisors
A few days ago Symantec researchers revealed that the Crisis malware is not limited to attacking Mac machines, but has the ability to infect devices running Windows and …
“Compensation for Scam Victims” 419 scam doing rounds
The psychology and economics behind the so-called Nigerian advanced fee fraud scams have been recently been explained by Microsoft researcher Cormac Herley in great detail, …
Female Android users targeted with Loozfon Trojan
An information-stealing piece of Android malware that is currently being used in a campaign aimed specifically at female Japanese users has been spotted by Symantec …
Aramco hackers threaten to attack oil giant again
The group of hackers that claimed responsibility for the recent Saudi Aramco breach has announced that it will be targeting the company again because they want to prove that …
US Feds shutter three Android app pirate sites
For the first time since it has started the war against illegal sites, the US Department of Justice has swooped on three websites that were engaged in the illegal distribution …
Bogus Booking.com emails carry malware
The popularity of the Booking.com, one of the world’s biggest and most used online hotel reservations agency is getting misused in the latest malware distribution …
Google instituting internal Privacy Red Team
Google is looking for a Data Privacy Engineer to be part of an internal team whose goal will be to find – and remove – privacy risks in the company’s many …
The Tangled Web: A Guide to Securing Modern Web Applications
We all use the Internet to some extent and browsers to surf through it. With security vulnerabilities affecting them and the technologies that allow them to function popping …
FTC to investigate websites allegedly collecting data from children
As the years roll by, Internet users are getting more aware of the need to actively protect their privacy. But there is one group of people that is overwhelmingly unaware of …
Featured news
Sponsored
Don't miss
- Update: Worldwide IT outage due to buggy Crowdstrike sensor configuration update
- Faulty CrowdStrike update takes out Windows machines worldwide
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality