Zeljka Zorz
Fake HD repair tool targets Windows users
In the last year, ransomware infections have taken over from scareware as the cybercriminals’ favorite mode of squeezing money out of their victims, but that …
Another alleged TeamPoison hacker arrested
A 17-year-old male that is suspected to be “MLT”, a member and the unofficial spokesman of the notorious “TeamPoison” hacking gang, has been arrested …
Trojan posing as Flash Player for Android
Russian Android users are constantly targeted with Trojans posing as legitimate apps. Last month it was fake Instagram and Angry Birds Space apps, this time the lure is a …
Two Norwegians arrested over DDoS attacks
Two Norwegian teenagers believed to have led DDoS attacks on a number of Norwegian and international websites have been arrested last Friday and Monday. The rather short …
Digital Forensics with Open Source Tools
Proprietary digital forensics tools have long been popular with the majority of forensic practitioners, but there are also open source ones that can come very handy. The book …
Fake mobile AV apps offered on Google Play
Downloading apps from Google Play, the official online Android app market, is not without its dangers. Even though Google has been scanning the offered apps for malware by …
Ransomware starts targeting US users
A year or two ago, fake antivirus solutions were pushed almost daily onto users, but as time went by, they became wiser and more able to recognize them. So cybercriminals …
MySpace charged for violating user privacy, vows to do better
Charged by the US Federal Trade Commission with violating federal law due to having shared its users’ personal information and Web browsing habits with third parties, …
Java drive-by generator used in recent attack
A malware delivery campaign that doubles its infections efforts to really make sure the users get compromised has been recently spotted by F-Secure researchers. One of them …
Privacy icons summarize privacy policies
A group of students from Yale University have shared their final project for their Control, Privacy, and Technology course which offers the novel idea of using icons to brief …
Survey scammers impersonate Apple via SMS
As the number of smartphone users increases with each passing day, survey scammers have turned some of their attention to targeting users directly via SMS messages containing …
Securing mobile apps in the enterprise
The mobile app has become the endpoint. With the advent of consumerization and BYOD, the number of managed devices began shrinking and that of unmanaged devices continues to …
Featured news
Sponsored
Don't miss
- Black Friday shoppers targeted with thousands of fraudulent online stores
- RomCom hackers chained Firefox and Windows zero-days to deliver backdoor
- How to recognize employment fraud before it becomes a security issue
- Practical strategies to build an inclusive culture in cybersecurity
- Domain security posture of Forbes Global 2000 companies