Zeljka Zorz
Bredolab variant delivered by fake Facebook warning
There are over 600 millions of active Facebook users in the world, so it’s no wonder that they are often targets of a great variety of scams. The latest one is delivered …
Yahoo! backtracks on data retention policy decision
In late 2008, Yahoo! announced that their file retention period for most log file data would be cut down to 90 days – with the exception of raw data kept for 6 months …
Easter greetings deliver malware
The days leading up to major religious holidays are when you should be more careful with the contents of your inbox. One malicious spam run recently spotted by McAfee consists …
HBGary does some reputation building
A little over two months have passed from the HBGary breach, and the unfortunate incident seemed to have somewhat faded from public consciousness, supplanted by the slew of …
Gaping security hole in Skype for Android
The Skype application for Android contains a flaw that allows a rogue app to access and harvest users’ personal information and things like chat logs from the device …
IPv6 for Enterprise Networks
The February news that the last batch of IPv4 addresses has been distributed has resounded across the Internet as a final wake up call. It made everybody aware of the fact …
Epsilon breach leads to more than just phishing
Since the Epsilon breach, the customers of the company’s clients – such as US Bank, JPMorgan Chase, TiVo, Capital One, the Home Shopping Network, LL Bean Visa …
Next Safari version will include do-not-track tool
Safari is the latest of the top four most popular browsers to receive a do-not-track privacy tool. So far, the feature is still being tested by developers, but if everything …
Malware silently hijacks Facebook account and adds apps
Several months ago, when the operators of the Sality P2P botnet pushed out malware that not only collected usernames and passwords and sends them to the C&C servers but …
U.S. authorities hijack botnet by substituting C&C servers
The U.S. Department of Justice and the FBI have been granted by the federal court the permission to substitute the C&C servers of the massive Coreflood botnet with …
WordPress.com servers breached, source code presumed copied
Automattic – the web development corporation behind WordPress.com – has suffered a root break-in and a compromise of several of their servers. “We have been …
Why stealing at a security conference is a bad idea
ISC West is one of the biggest international security conferences, and practically every inch of the expo floor has a camera or two trained on it. You would expect that such a …
Featured news
Resources
Don't miss
- Banshee Stealer variant targets Russian-speaking macOS users
- Ivanti Connect Secure zero-day exploited since mid-December (CVE-2025-0282)
- GitLab CISO on proactive monitoring and metrics for DevSecOps success
- Sara: Open-source RouterOS security inspector
- Cybersecurity in 2025: Global conflict, grown-up AI, and the wisdom of the crowd