Zeljka Zorz
What hides behind the get-rich-working-from-home offers?
Do you ever get tempted to click on one of the myriad of work-from-home, get-paid-huge-money adverts that are littering the Internet? Do you ever wonder if those claims are …
Bogus chat spying Facebook app targets users
No matter how often fake “See who viewed your profile” apps are touted on Facebook, there are always users that fall for the trick and follow the steps required by …
Trojan masquerading as PDF signed with stolen government certificate
Since the discovery of the Stuxnet worm, and especially after the recent string of certification authority compromises, cyber attackers’ practice of using digital …
Mass manipulation through automated social engineering
In the past few years, social engineering has become cyber attackers’ preferred method for gaining access to target systems, and it usually takes the form of a spoofed …
Cyber crooks should get tougher sentences, says PCeU chief
Cyber fraudsters and robbers often receive considerably lighter sentences that their real-world counterparts, says Detective Superintendent Charlie McMurdie, the head of …
Apple OS X sandbox hole allows bypassing of restrictions
Following Apple’s announcement that all applications submitted for inclusion in the App Store will have to have sandboxing implemented starting from March 1, 2012, …
Hacked Sky News Twitter account falsely reports on Murdoch arrest
Hacking Twitter feeds of popular mainstream media outlets is a perfect way of getting your message across to or create panic among a great number of people. It has also lately …
Steam server attackers grabbed passwords, credit card data
As Bethesda Software was preparing to release Skyrim, the latest installment of its mega popular Elder Scrolls series, news that the forum of Steam, the online …
Scammers sending out bogus job offers
Cyber scammers do not hesitate using every scrap of information there is on the Internet in order to gain users’ trust and misuse it for their malicious purposes. Also, …
Block cipher encryption effectively hides banking Trojan
Brazilian malware peddlers have turned to encrypting banking Trojans with block ciphers, effectively bypassing most AV software. Kaspersky Lab’s Dmitry Bestuzhev says …
How does cell phone money laundering work?
In Russia, most cell phone SIM cards are prepaid. One of the major Russian operators offers a legal service that allows anyone to transfer the prepaid amount of money from a …
New techniques for detecting hardware Trojans
Most Internet users know about the existence of software Trojans, but that of hardware ones is less known. They consist of integrated circuits that have been modified by …
Featured news
Resources
Don't miss
- Job-seeking devs targeted with fake CrowdStrike offer via email
- January 2025 Patch Tuesday forecast: Changes coming in cybersecurity guidance
- The SBI fake banking app shows that SMS authentication has had its day
- Preventing the next ransomware attack with help from AI
- Banshee Stealer variant targets Russian-speaking macOS users