Zeljka Zorz
Researchers demonstrate tragic state of SCADA security
Since the discovery of Stuxnet, we’ve been hearing from a variety of researchers about security vulnerabilities in SCADA computer systems. While some researchers such as …
Online reputation manager suspected of Illegal code injection
For individuals and companies that have a bad online reputation, online reputation management (ORM) services might sound like a good investment. Such services are not illegal, …
Tax-themed spam delivers malware
The US Internal Revenue Service kicked off the 2012 tax filing season on January 4, and malware peddlers haven’t waited much to begin targeting users with tax-themed …
DreamHost hacker accessed pool of unencrypted passwords
DreamHost, one of the world’s most popular and well-known web hosting providers, has sent a warning out to its customers saying that one of their databases containing …
Mozilla offers alternative to OpenID
Mozilla has been working for a while now on a new browser-based system for identifying and authenticating users it calls BrowserID, but its only this month that all of its …
McAfee closes spam-spewing hole in its anti-malware service
McAfee has patched a vulnerability in its SaaS for Total Protection hosted anti-malware service that seems to have been misused by spammers to make users’ computers spew …
Programmer steals US government software source code
A Chinese computer programmer has been arrested in New York for having allegedly copied and stolen the source code of software developed by the US Treasury Department, …
Koobface botnet goes down, suspects scurry to erase tracks
As the names of the five individuals believed to be behind the Koobface botnet were revealed on Tuesday, their reaction was almost immediate and seems to validate the …
Free Facebook Mug scam doing rounds
A few months ago it was a free Facebook t-shirt to celebrate the social network’s 7th birthday, now it’s a free Facebook-themed ceramic mug, but the scam behind …
Symantec admits its networks were hacked and source code stolen
After having first claimed that the source code leaked by Indian hacking group Dharmaraja was not stolen through a breach of its networks, but possibly by compromising the …
Bogus Western Union notice leads to phishing
A fake Western Union notice is hitting inboxes around the world and scaring people into following the offered link to a phishing page. “Failure in updating your profile …
Google tests QR code-based authentication
Google has apparently been testing an alternative to its two-step verification option for accessing Gmail and Google accounts, and it uses a QR code. The option is thought to …