Zeljka Zorz
Hackers destroy pump in U.S. water utility attack
Hackers attacking SCADA systems and wreaking havoc in a nation’s critical infrastructure has become a justified concern for all countries. But, setting aside Iran and …
Backdoor Trojan pushed via versatile Facebook campaign
Thanks to its social nature, Facebook is one of the preferred tools of cyber crooks looking to scam users and peddle malware. Microsoft recently spotted a considerably …
DevilRobber Trojan returns, masquerades as PixelMator
DevilRobber, the latest Trojan to target Mac users, got updated. As you may remember, the previous incarnation stole Bitcoins from the user’s wallet file, used the …
Hearing on draconian new U.S. piracy legislation is under way
Today’s the day of the long awaited House Judiciary Committee’s hearing on the Stop Online Privacy Act (SOPA) and, as the Electronic Frontier Foundation claims, …
Facebook trims response to data requests
After the possibility to request data from Facebook under European data privacy laws became common knowledge, Europeans began inundating the social networks with requests. …
The Basics of Hacking and Penetration Testing
Have you always wondered about how penetration testing is performed, but never had the opportunity to ask a professional about it or to witness him (or her) at work? If that's …
Hacker breached, changed grades in university academic record system
Santa Clara University, a private university run by the Jesuits and located in the Silicon Valley, has issued a statement confirming that it has called the FBI to investigate …
Windows 8 to do away with constant restarts after updating
I don’t know a single Windows user who isn’t annoyed at the number of times the operating system requires a restart, and especially annoyed when the request …
Hiding messages in VoIP packets
A group of researchers from the Institute of Telecommunications of the Warsaw University of Technology have devised a relatively simple way of hiding information within VoIP …
What hides behind the get-rich-working-from-home offers?
Do you ever get tempted to click on one of the myriad of work-from-home, get-paid-huge-money adverts that are littering the Internet? Do you ever wonder if those claims are …
Bogus chat spying Facebook app targets users
No matter how often fake “See who viewed your profile” apps are touted on Facebook, there are always users that fall for the trick and follow the steps required by …
Trojan masquerading as PDF signed with stolen government certificate
Since the discovery of the Stuxnet worm, and especially after the recent string of certification authority compromises, cyber attackers’ practice of using digital …
Featured news
Resources
Don't miss
- Henkel CISO on the messy truth of monitoring factories built across decades
- The hidden dynamics shaping who produces influential cybersecurity research
- UTMStack: Open-source unified threat management platform
- LLMs are everywhere in your stack and every layer brings new risk
- Building SOX compliance through smarter training and stronger password practices