Zeljka Zorz
Defense companies persistently targeted by cyber spies
Researchers from security companies Zscaler and Seculert have issued a warning about bogus emails targeting employees of defense-related organizations around the world in …
Fake Tumblr Staff Blog offers still targeting users
A week ago, compromised Tumblr accounts were sporting fake messages from a “Tumblr Staff Blog” offering Starbucks gift cards in return for completing surveys and …
Counterclank: Info-stealing Trojan or advertising tool?
A couple of days ago, Symantec has warned about Counterclank, an Android Trojan that has been unknowingly installed by users on over five million devices. This huge number was …
Law firms get hacked for deal data
A successful cooperation between a law firm and its clients depends on the firm’s ability of keeping the details of these relationships confidential – something …
Compromised WordPress sites lead to Phoenix exploit kit
Several hundred compromised websites that at first glance don’t appear to be malicious have been discovered by M86 researchers. The websites – mostly blogs and …
The F-BOMB: A tiny $50 spying computer for DARPA
Everyone loves a cheap but effective solution, and DARPA – the US Department of Defense’s agency for developing new military technologies – is no exception. …
Students used keyloggers on school computers, changed grades
Three Californian 16-year-olds have been arrested for having allegedly broken into their high school, stolen keys and tests, installed keyloggers onto teachers’ …
Bogus “browser update” pages deliver malware
Fake “browser update” pages are currently being used to deliver malware and redirect users to survey pages, warns GFI. Their malware researchers have recently …
FBI in the market for app to monitor social networks
The US FBI is looking into the possibility of using an “Open Source and social media alert, mapping, and analysis application” for increasing its situational …
Facebook scammers leverage the Amazon Cloud
Survey scams have been targeting Facebook users for longer that they would wish. The goal of all of them has always been to make users fill out survey, but the lures and …
Perplexing malware served on social welfare site
Legitimate compromised sites usually serve malware that directly or indirectly makes money for its peddlers, but ever now and then an exception to that rule arises. …
A peek into the Sykipot campaigns
The group(s) behind the massive and consistent campaigns targeting US defense contractors with the Sykipot Trojan continue their attacks unabated, reports Symantec. Its …