Zeljka Zorz
Facebook invites white hats to attack its corporate network
Nearly a year ago, Facebook introduced its bug bounty program, inviting security researchers to poke around the site, discover vulnerabilities that could compromise the …
Crisis OS X Trojan is an effective spy tool
The Crisis/Morcut OS X malware recently discovered via samples submitted to VirusTotal is more than just a backdoor Trojan, Sophos researchers say after analyzing it. Its …
The dangers of Java and what to do about it
Since late 2010, Java exploits have become way more popular with hackers than the Adobe-related ones. The problem with Java is not so much in the newly discovered …
Bogus Olympics ticket site spotted
If you’re looking to score tickets for Olympic events you should be extremely careful when buying them online, as fake ticket sites are still around. Take for example …
VirusTotal starts sandbox-testing, shares behavioral information
Developer Emiliano Martinez has recently confirmed what many users of VirusTotal have already noticed: that the online file scanning service has added behavioral information …
Seven Databases in Seven Weeks
For years, the popularity of relational databases created by Oracle, Microsoft, and IBM, and of the open source MySQL, PostgreSQL, and SQLite was undisputed. But, in time, …
New Mac backdoor Trojan spotted
A new Mac Trojan – dubbed Crisis or Morcut – has been spotted but, luckily, not in the wild. Security firms Intego and Sophos have picked up samples from Virus …
Android malware no longer just posing as Opera Mini
Malicious Android apps posing as the mobile Opera Mini browser or an update for it are nothing new, and they are usually malware that sends text messages to premium-rate …
Bot herders try to resurrect Grum, fail
As you have probably already heard, the Grum botnet – formerly the third largest in the world – has been effectively shut down last week after several security …
8.2 million Gamigo passwords leaked
When German gaming website Gamigo was breached in February this year, they reacted by sharing the fact with their users, warning that user information such as usernames and …
Bogus “Booking Confirmation” emails lead to malware
Booking.com is a well-known and very helpful website for those looking for deals when planning their travels, but if you’re a habitual user, be wary of malicious emails …
Penetration testing tool masquerades as surge protector
In the same way that a hardware keylogger may remain undetected by office workers, Power Pwn – a newly created piece of hardware resembling a power strip or surge …
Featured news
Resources
Don't miss
- Social data puts user passwords at risk in unexpected ways
- New observational auditing framework takes aim at machine learning privacy leaks
- Why password management defines PCI DSS success
- Hottest cybersecurity open-source tools of the month: November 2025
- Gainsight breach: Salesforce details attack window, issues investigation guidance