Zeljka Zorz
CCNP Security Secure 642-637 Official Cert Guide
The title of the book says it all - thick and all-encompassing, it covers the topics addressed in the exam CCNP Secure 642-637, but it should not be considered the only source …
DDoS bot masquerades as Java update
An especially virulent Trojan variant with DDoS capabilities has been spotted masquerading as a regular Java update and is being served both from legitimate and malicious …
Internet activist charged with hacking, theft of millions of digital documents
24-year-old Aaron Swartz, renowned programmer and Internet activist, stands accused of having stolen over 4 million digital documents from MIT’s JSTOR archive with the …
Google warns users about active malware infection
Google has begun notifying its users that a particular piece of malware is installed on their computers by showing a big yellow notification above their search results (click …
Santander customers targeted with clever phishing scam
Brazilian customers of Santander, one of the largest banks in the world, have been targeted by a very clever phishing scam that did not involve clicking on malicious links in …
A new approach to circumventing state-level Internet censorship
A group of researchers led by J. Alex Halderman, assistant professor of electrical engineering and computer science at the University of Michigan, have been working on a new …
U.S. military contractors targeted with malicious PDFs
The last few months have seen a lot of cyber attacks aimed at U.S. military contractors and they are still ongoing. F-Secure researchers have recently spotted an email …
LulzSec hacks News International servers, “kills” Murdoch
Hacktivist group LulzSec is back in business. It has added to the pressure put on Rupert Murdoch following the phone hacking scandal by hacking into News International …
Toshiba admits to hack, customer data loss
Toshiba has confirmed the claims of a hacker that managed to compromise one of its US sites and steal and publish part of a user database on pastebin.com. While the hacker …
Facebook scammers use Tumblr sites to evade detection
Facebook users are targeted once again by survey scammers, and this time the lure is a video of a woman exposing herself on live television: There are two versions of the …
Fake financial statements and postal documents lead to fake AV
Fake emails purportedly coming from financial institutions and the post are currently hitting inboxes and are carrying a malicious .exe file disguised as a Word document. …
EU data breach notification law under advisement
The recent onslaught of cyber attacks against a variety of companies big and small and the consequent compromises of user information gathered by them has led the European …
Featured news
Sponsored
Don't miss
- Cisco fixes critical flaws in Secure Email Gateway and SSM On-Prem (CVE-2024-20401, CVE-2024-20419)
- Fighting AI-powered synthetic ID fraud with AI
- Laying the groundwork for zero trust in the military
- Grype: Open-source vulnerability scanner for container images, filesystems
- Signatures should become cloud security history