Zeljka Zorz
Bogus “Scan from a HP OfficeJet” notifications lead to malware
Notifications about documents purportedly having been scanned and sent via a HP OfficeJet printer/scanner are targeting users again and trying to trick them into opening the …
Pastry lovers served with ransomware via exploit kit
French cake and pastry lovers have been targeted by cyber crooks as the website of the famous confectionery company Laduree has been compromised and found serving ransomware. …
FCC offers advice to ISPs for boosting network security
The Chairman of the Federal Communications Commission, an independent agency of the US government whose goals include public safety, says that Internet service providers …
Facebook scams racing against the clock
Facebook scammers have lately initiated a number of scams that use an unusual approach to make users “like” 70+ Facebook pages without even knowing what they are. …
Trojan hijacks often-used DLL file for stealthier approach
A new dropper Trojan has been detected by BitDefender researchers, and this one utilizes an interesting technique in order to hide from antivirus software installed on the …
Indian govt to ask Yahoo, Google to route emails through servers in India
Web mail service providers such as Google, Yahoo, and others will be asked to route all emails accessed in India through servers located in the country – even if the …
New Zeus/SpyEye makes bots function as C&C servers
The latest build of the Zeus/SpyEye malware shows a change that could very well hamper the security researchers’ ability to take down the botnets using it and to find …
Self-selected PINs aren’t that hard to guess
Four-digit banking PINs are usually randomly assigned by banks after the issuing of credit and debit cards, but there are still some out there that let its customers choose …
Fake RIAA copyright violation notification serves malware
First spotted nearly a week ago, notifications of copyright violation supposedly sent by the Recording Industry Association of America are still hitting inboxes around the …
Microsoft says Google also bypassed IE’s privacy settings
Following the discovery that Google and other online advertising companies are bypassing Safari’s default “no tracking” settings with specific code inserted …
Mozilla asks CAs in its root program to revoke all MitM certificates
Following the big brouhaha raised by Trustwave’s acknowledgement that it has revoked a “MitM” subordinate root certificate it issued to a business for its …
“Ex-girlfriend sex video” Facebook scam
Survey scammers love targeting Facebook users, because the social nature of the network makes sure that the scam will be propagated far and wide. The latest of these scams has …
Featured news
Resources
Don't miss
- Building cyber resilience in banking: Expert insights on strategy, risk, and regulation
- CISO vs. CIO: Where security and IT leadership clash (and how to fix it)
- Why a push for encryption backdoors is a global security risk
- Innovation vs. security: Managing shadow AI risks
- Commix: Open-source OS command injection exploitation tool