Zeljka Zorz
Fast-flux tactics for Facebook scams
Survey scams are a daily occurrence for many Facebook users, and “See who’s stalking you on Facebook” is an often-used proclamation to lure the users to …
Google offers Pwn2Own contestants $20,000 for Chrome exploit
As during the previous four years, this year’s edition of the CanSecWest conference will welcome security researchers bent on trying to exploit vulnerabilities in …
Fake Facebook Security page sending out phishing messages
Phishers have rolled out a new tactic to target Facebook users – they are misusing the name of legitimate Facebook Security page and sending out warnings about an …
500,000 stolen e-mail credentials for Waledac’s comeback
Almost a year ago, the Waledac botnet was crippled by a legal action initiated by Microsoft which resulted in the takedown of 273 Internet domains that were being used as …
Multilingual PayPal phishing e-mails doing rounds
A recent report compiled by OpenDNS showed that 45 percent of all phishing attempts made in 2010 were targeting PayPal customers. It is no wonder then that we witness PayPal …
Facebook bug allows user data theft via specially crafted websites
A proof-of-concept attack page that exploits a Facebook vulnerability to access a user’s private data has been devised by two students who shared the information with …
Spammers gearing up for Valentine’s Day
A spam run that supposedly offers flowers to send to your loved one is currently landing in inboxes around the world, but a click on the “Order Now” button takes …
Chinese spies attempted to spear-phish US diplomats?
While some of the documents from the batch of US diplomatic cables dumped by WikiLeaks have proved to be more explosive than others, every now and then some nugget of …
Private info on Facebook increasingly used in court
Making the content of your Facebook account private can thwart the social network’s plan to share as much information possible with advertisers, but may not keep out …
Rogueware starts misusing names of legitimate AV
Rogueware authors have so far mostly avoided misusing names of legitimate AV software, and I often wondered why. My best guess is that they wanted to minimize the possibility …
Egyptians can now tweet without an Internet connection
After Facebook experienced the state-wide password hijacking attempt organized by the Tunisian government and solved it by using social authentication and routing login …
“Facebook closing all accounts” scam hits users
The latest scam to hit Facebook users is a slight variation of the survey scams that target them daily. But this time, the lure isn’t bogus “OMG” I …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?