Zeljka Zorz
Facebook Lottery scam emails making rounds
Offline crooks have had a lot of success with the bogus lottery winning letter scam, so it should come as no surprise it is often “translated” into an email and …
Personal info of 9 million Israelis stolen, available online
Personal information of some 9 million Israelis (alive and deceased) has been stolen by a contractor working for the country’s Ministry of Labor and Welfare with the …
Anonymous shuts down child porn sites, leaks usernames
Hacktivist group Anonymous has started a new campaign. Dubbed “Operation Darknet”, it aims to battle child pornography and ISPs that knowingly support and allow …
Microsoft YouTube channel hacked
A week after the official Sesame Street YouTube channel got compromised and started offering adult content to children, Microsoft’s official YouTube channel has been …
Scammers asking for donations for bogus Steve Jobs charity
Before his death, Apple CEO Steve Jobs was well known for not giving donations to charities or setting up foundations for various humanitarian causes, so it may come as a …
Skype can be used to tie users to illegal download activity
A team of researchers has proved that it is possible to determine the IP address of a user and tie it with his Internet use, and even correlate this information to his …
Bloody photos of Gaddafi used as bait in malware-laden email run
As predicted, the violent death of Libyan dictator Moammar Gaddafi has been taken advantage of by cyber criminals in order to trick gore-hungry users into downloading malware: …
Nasdaq attackers spied on companies
The systems of the company that operates the Nasdaq Stock Market were breached many times last year, but the actual trading platform was never compromised. A subsequent …
Flash bug allows spying of website visitors through webcam
A slight variation of a previously designed clickjacking attack that used a Adobe Flash vulnerability has once again made it possible for website administrators to …
Which mobile OS is most hit by malware?
As most mobile phone users still don’t have a mobile AV solution installed on their devices, it can be rather hard to gauge just how many of them have been hit by mobile …
Hijacked phishing page warns users about phishing
hen you follow security news daily like I do, it is tough to keep a positive outlook when day after day you hear and read of users falling for basically the same scams simply …
Federal Trojan has more capabilities than previously thought
Ten days ago, the Chaos Computer Club made public a set of worrisome discoveries made by their analysis of the “lawful interception” Trojan used by German law …
Featured news
Sponsored
Don't miss
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality
- FIN7 sells improved EDR killer tool
- Cisco fixes critical flaws in Secure Email Gateway and SSM On-Prem (CVE-2024-20401, CVE-2024-20419)