Zeljka Zorz
Shortened .gov URLs lead to scams
The fact that cyber crooks often misuse URL shortening services in order to trick users into following dangerous links is not news, but Symantec researchers have lately …
French hacker arrested for creating, spreading SMS Trojan
A 20-year-old from Amiens, France, has allegedly managed to steal around half a million of euros (over $650,000) by creating and distributing a Trojan disguised as legitimate …
Newest Apple Java update kills the Java browser plug-in
Determined not to fall behind on its Java updates, Apple has issued the latest one on Tuesday, the very same day that Oracle pushed out its own. But the big news isn’t …
Multi-platform attack site discovered via fake Lookout Android app
Researchers from security firm TrustGo have recently spotted on Google Play a bogus app that supposedly automatizes the updating of a batch of other apps. What piqued their …
Fake KLM e-tickets lead to malware
If you have recently booked a flight with KLM, please be careful when reviewing emails that appear to have been sent from the airline carrier, as rather legitimate-looking …
eBay phishers quickly react to branding change
eBay has recently redesigned its logo, and it didn’t take long for some phishers to modify their attempts to match the change: “It probably won’t be long …
Ransomware adds audio component to force users to pay up
Not satisfied with just showing the fake FBI note, the criminals behind one of the many ransomware campaigns going on at the moment are trying to assault the users’ …
Massive WoW killing spree due to in-game exploit
What should have been a relaxing and afternoon in the virtual world of Azeroth turned to a veritable bloodbath as unknown hackers used a still unknown exploit to kill off …
Proxy service users download malware, unknowingly join botnet
In yet another example of if-it’s-too-good-to-be-true-it-probably-isn’t, hundreds of thousands of users signing up for a cheap and supposedly legitimate proxy …
Malware Forensics Field Guide for Windows Systems
If you are looking for a field guide that will help you identify malware on a Windows computer system, examine it, and determine its impact, than this book might be just the …
The danger behind low-volume email attacks
“Broad campaigns often spoof notifications from well-known businesses, establishments, organizations, and agencies, and are very widespread these days. However, smaller …
Info-stealing Trojan posing as Panda Cloud Antivirus
Researchers from Spanish antivirus vendor Panda Security are warning potential users about information-stealing malware disguised as their Panda Cloud Antivirus solution. The …
Featured news
Resources
Don't miss
- Attackers are exploiting auth bypass vulnerability on FortiGate firewalls (CVE-2025-59718)
- Why vulnerability reports stall inside shared hosting companies
- Zabbix: Open-source IT and OT observability solution
- How exposure management changes cyber defense
- European police busts Ukraine scam call centers