Zeljka Zorz
Backdoor instructions for Allied Telesis switches leaked
A simple categorizing mistake has resulted in the publishing of an internal Allied Telesis document that reveals how to set up backdoor accounts for the company’s …
Attack against Lockheed Martin result of previous RSA breach?
Lockheed Martin, one of United States’ largest military contractors, has experienced an attack against its computer networks, and speculations abound on whether the …
Fake YouTube notifications doing rounds
YouTube users are targeted with notifications supposedly sent by YouTube administrators and containing links to Canadian pharmacy sites, warns BitDefender. With “YouTube …
Apps with dangerous permissions pulled from Chrome Web Store
Do you trust Google to review and ban potentially malicious applications from its online stores? The Android Market has already been found offering “trojanized” …
Fake Epsilon breach warning tricks users
Among the most annoying things you can find online are pages that pretend to offer or try to push a service in order to make money by simply referring the user to another …
35 million Google Profiles collected into private database
If you are one of those individuals that made their own Google Profile, chances are that you knew and agreed to the fact that the information you included in it will be …
The resurrection of the Mariposa botnet
When the news that the Spanish police arrested the three individuals suspected of running the Mariposa botnet was made public back in March 2010, it was generally thought that …
New Mac Defender variant doesn’t need your admin password
There is a new variant of the Mac Defender rogue AV out there, and this one doesn’t require users to enter the administrator password in order to install the program, …
Program defeats audio CAPTCHAs, researchers learn how to improve it
A group of researchers from Stanford University’s Security Laboratory has managed to build a computer program able to solve audio CAPTCHAs, reported the University on …
Comodo Brazil breached, sensitive data leaked
The recent spate of attacks against Sony’s various assets has probably made a lot of companies thank their lucky stars that they aren’t the ones who have been …
Apple acknowledges Mac Defender existence, gives removal instructions
It took a while for Apple to react properly to the onslaught of Mac Defender and similar fake AV aimed at Mac users, but they finally did it. Only days after the revelation of …
Sony online store hacked and user information published
It seems that hacking Sony’s assets has become a communal game in the hacker underground. Since the PSN hack, hardly a week went by without a hacker notifying the public …
Featured news
Resources
Don't miss
- Banshee Stealer variant targets Russian-speaking macOS users
- Ivanti Connect Secure zero-day exploited since mid-December (CVE-2025-0282)
- GitLab CISO on proactive monitoring and metrics for DevSecOps success
- Sara: Open-source RouterOS security inspector
- Cybersecurity in 2025: Global conflict, grown-up AI, and the wisdom of the crowd