Zeljka Zorz
Verisign asks for ability to suspend domains without a court order
Verisign, the operator for all .com, .net, and .name top-level domain, has submitted a request to ICANN asking for the power of taking down “abusive” domains …
90,000 accounts compromised in new Sony attack
60,000 PlayStation Network and Sony Entertainment Network accounts and 33,000 Sony Online Entertainment accounts have been compromised during what Sony describes as a testing …
Two state-sponsored groups responsible for RSA breach
Two distinct groups were behind the March attack against RSA’s networks, said RSA president Tom Heiser, and they seem to have been directed in their efforts by a single …
Large-scale spam campaign uses compromised webmail accounts and WordPress sites
A spam campaign currently under way has been spotted coming from several thousand compromised Yahoo!, AOL and Hotmail email accounts and taking advantage of compromised …
German states say “federal trojan” used within legal boundaries
The reaction following CCC’s claims that a government-made “lawful interception” Trojan has abilities that exceed those allowed by the nation’s …
Fake virus warning from company IT department brings real malware
Emails purportedly coming from a company’s IT department has been spotted targeting users of various big companies and trying to make them download malware for the last …
“I saw a real bad blog about you” Twitter phishing scam
Twitter has been warning users not to fall for the latest phishing scam that takes the form of a DM from someone you know warning you to check out a “real bad blog about …
U.S. military drones hit by computer virus
An unnamed virus with a “keylogger” payload has been found in the computers used to operate U.S. Air Force’s Predator and Reaper remotely operated drones. …
Virus Bulletin news tweets spread malware
Malware peddlers are known for using news of unfolding events as lures to trick curious users into clicking on an offered malicious link. This practice is most often seen on …
Government telecommunication-spying malware opens backdoor
The Chaos Computer Club claims that a government-made “lawful interception” Trojan has abilities that exceed those allowed by the nation’s legislature and …
Photos: The look and feel of Virus Bulletin 2011
Help Net Security is attending the Virus Bulletin 2011 conference in Barcelona this week. Here’s an overview of the event in photos. DC Bob Burls of UK’s Police …
Picasa Web Albums and Yahoo! Groups are loved by spammers
Cyber crooks and spammers are always on the lookout for ways to reach and victimize the largest amount of individuals possible. And sometimes even Internet giants such as …
Featured news
Sponsored
Don't miss
- GenAI network acceleration requires prior WAN optimization
- Critical Splunk flaw can be exploited to grab passwords (CVE-2024-36991)
- eBook: How CISSP turns career goals into reality
- FIN7 sells improved EDR killer tool
- Cisco fixes critical flaws in Secure Email Gateway and SSM On-Prem (CVE-2024-20401, CVE-2024-20419)