Zeljka Zorz
Oracle confirms existence of another critical Java flaw
When Oracle finally patched the CVE-2012-4681 Java 0-day that was being actively exploited in the wild, Polish firm Security Explorations immediately piped up to say they …
Bogus GTA Vice City Android game leads to SMS Trojan
Offering bogus packs of popular games have always been a well-liked approach of malware peddlers around the world. GFI has recently spotted a fictitious Vice City version of …
Millions of GoDaddy sites go offline due to alleged DDoS attack
GoDaddy, on of the biggest and most popular Internet domain registrars and web hosting companies in the world, has suffered an outage on Monday that left many of its …
Publishing firm says leaked Apple IDs came from their servers
BlueToad, a Florida-based digital edition publishing company, has announced that the recent massive Apple UDID leak originated from their own servers, and not an FBI laptop. …
Pirate Bay’s Svartholm arrested for hacking, not piracy
Well, as it turns out, the recent arrest of Pirate Bay co-founder Gottfrid Svartholm in Cambodia is a consequence of a “crime related to information technology,” …
Windows 8 users open to Flash exploits
Users who have downloaded and are using the “Release To Manufacturing” version of Windows 8 or the 90-day trial version of Windows 8 Enterprise should be aware …
11,000 Guild Wars 2 accounts hacked in ongoing attacks
The second sequel of the popular Guild Wars multiplayer online RPG by ArenaNet has been released less than two weeks ago, and player accounts are already being heavily …
Apache HTTP Server set to ignore IE10’s Do Not Track request
Microsoft’s decision to make Internet Explorer 10 in Windows 8 have the “Do Not Track” (DNT) option turned on by default has stirred a heated discussion …
BEAST developers come up with new SSL/TLS attack
From the security researchers who created and demonstrated the BEAST (Browser Exploit Against SSL/TLS) tool for breaking SSL/TLS encryption comes another attack that exploits …
Zero-day-loving Google hackers furiously active in last three years
The hackers behind the Aurora attacks that were discovered targeting Google, Adobe and other big U.S. companies in 2009 have seemingly been working hard ever since. Symantec …
Malicious FB Timeline Remover plugins still tricking users
It is a well-known fact that some Facebook users simply can’t stand the (relatively) new Timeline interface and have actively sought for ways to revert their accounts to …
Apple denies handing UDIDs over to FBI
As the issue of the leaked million of Apple device IDs by the AntiSec hacker group and the alleged existence of a list of over 12 million of those and other personal …
Featured news
Resources
Don't miss
- GitHub CISO on security strategy and collaborating with the open-source community
- Chainsaw: Open-source tool for hunting through Windows forensic artefacts
- Time for a change: Elevating developers’ security skills
- Job-seeking devs targeted with fake CrowdStrike offer via email
- January 2025 Patch Tuesday forecast: Changes coming in cybersecurity guidance