Zeljka Zorz
iPhone and iOS Forensics
With the seemingly unstoppable popularity of Apple mobile devices such as the iPhone and the iPad, forensic specialists need to learn about the specific device models and …
Cybercriminal gang ringleaders convicted for stealing over $4.5 million
Two Ukrainians who admitted to have been the ringleaders of a criminal ring bent on stealing money from online bank accounts have finally been sentenced to four years and …
WikiLeaks founder loses extradition appeal
Wikileaks’ founder Julian Assange has lost another appeal to the February decision by a UK court that he should be extradited to Sweden in order to face possible charges …
Nearly 50 chemical, defense companies hit with cyber espionage attacks
Nearly 50 (and quite possibly more) companies in the chemical, defense, and other sectors have been hit with a spear phishing campaign carrying a backdoor Trojan with the …
How to create effective CAPTCHAs
Half a year ago, a team of researchers from Stanford University’s Security Laboratory has managed to build a computer program able to solve audio CAPTCHAs and to define …
Fake Apple notifications lead to phishing site
When changes are made to an Apple ID account, Apple sends a notification about it to the user so that he can react promptly if the changes weren’t made by him. …
Multitasking DevilRobber Trojan targets Mac OS X users
Another week, another Mac OS X Trojan spotted. Both Sophos and Intego have detected a Bitcoin-mining Trojan that also opens a backdoor into the infected system and steals …
New Facebook security features
Facebook will be adding two new security features that will allow users to regain control of their account if it gets hijacked and to use a unique password for different third …
Cyber crooks migrate to “ce.ms” free domains
Online scammers and malware peddlers often exhibit locust-like behavior as they migrate from one type of free domains to another in order to evade detection by spam filters …
Facebook spammers trick users into sharing anti-CSRF tokens
Facebook spammers have already used a number of different approaches to make users inadvertently propagate their scams, and most of them fall into the social engineering …
Microsoft drops suit against Kelihos botnet domain provider
The recent takedown of the relatively small Kelihos botnet and the subsequent civil suit raised by Microsoft was the first ever in which some of the defendants were …
Hackers attacked U.S. government satellites
Two U.S. satellites have been tampered with by hackers – possibly Chinese ones – in 2007 and 2008, claims a soon-to-be released report by the the U.S.-China …
Featured news
Resources
Don't miss
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground
- Open source has a malware problem, and it’s getting worse