Zeljka Zorz
BlackBerry Enterprise Server can be compromised due to TIFF-processing vulnerabilities
BlackBerry has released details about two critical vulnerabilities that can allow attackers to access and execute code on systems running BlackBerry Enterprise Server. The …
Freezing Android devices to break disk encryption
Two German computer scientists have proved that it’s possible to access and recover data from an encrypted Android smartphone by performing a set of simple and easily …
Facebook malware campaign targeting Bulgarian users
“Being” on Facebook brings its own set of dangers, and among them is inadvertently downloading malware by clicking on links posted by your own …
Fake invoices in personalized emails deliver ransomware
When a business, social network or any other online service that you use or have signed up for sends you an email, they address you by the name you provided. This is one of …
Facebook employees ambushed by zero-day exploit
Facebook is the latest big company to admit that they have been targeted with a “sophisticated” attack. The attack was triggered when a small number of Facebook …
Researchers reveal the identity of a Chinese hacker
It all started with Joe Stewart, director of malware research at Dell SecureWorks, who when investigating an unusual piece of malware and the command nodes which it contacted …
Uyghur Mac users targeted with spear-phishing emails
Uyghur activists are, once again, targeted with spear-phishing emails whose goal is to set up a backdoor on the victims’ computers. The Uyghurs are a Turkic ethnic …
Tax-themed malicious spam bombard inboxes
As the end of the U.S. tax season slowly approaches, cyber crooks are stepping up their game and are sending bogus out tax-themed emails. Webroot warns about an alert …
iOS flaw used to bypass iPhone’s lockscreen
The passcode lock in iPhones running iOS 6.x can be bypassed and anyone can access the photos, address book, make phone calls and send messages and emails from it, and more, …
Reactions to Obama’s Executive Order on cybersecurity
On February 12, we have witnessed U.S. President Barack Obama sign an Executive Order and issue a Presidential Policy Directive aimed at improving the cybersecurity of …
LA Times website redirected users to exploit kit for over six weeks
A sub-domain of Los Angeles Times’ website has been redirecting visitors to compromised websites hosting the latest version of the Blackhole exploit kit for over six …
Adobe offers mitigation for Reader 0-day attack, fix is yet to come
Adobe has confirmed FireEye researchers’ findings about new Adobe Reader and Acrobat zero-day vulnerabilities being exploited in the wild and has issued a security …
Featured news
Resources
Don't miss
- Hottest cybersecurity open-source tools of the month: November 2025
- Gainsight breach: Salesforce details attack window, issues investigation guidance
- New “HashJack” attack can hijack AI browsers and assistants
- Heineken CISO champions a new risk mindset to unlock innovation
- Small language models step into the fight against phishing sites