Zeljka Zorz
34 SCADA vulnerabilities revealed
It is safe to say that the existence of SCADA (supervisory control and data acquisition) systems was a fact unknown to many before the advent of the Stuxnet worm, and not many …
Google blames China for Gmail service disruptions
It seems that the active exploitation of the MHTML vulnerability that Google’s Security Team reported on earlier this month has a lot to do with recent attempts by the …
Outdated law makes wireless hacking acceptable
A ruling handed out earlier this month in The Netherlands set a precedent that will allow the nation’s citizens to “piggyback” on open WiFi networks and to …
Japanese tsunami videos lead to malware
A new Japanese disaster themed campaign is doing the rounds of inboxes. The e-mails supposedly offer links to videos about “The village that escaped the tsunami”, …
Rustock botnet downed by Microsoft
As many security companies and experts noted in the last few days, the activities of the Rustock botnet came to a standstill. They speculated about the reason behind this …
RSA hacked, SecurID users possibly affected
In an open letter, Art Coviello, the executive chairman of RSA (the security division of EMC), made public the fact that the company has suffered a breach and data loss …
A closer look at MacKeeper
MacKeeper (v1.0.3.) is a comprehensive bundle of various system utilities that will help you keep your Mac secure from malware; find it if it gets stolen; backup, restore, …
Google extends SSL to developer facing APIs
Firesheep‘s authors can be the satisfied with the gradual migration towards SSL that most of the biggest social networks, search engines, online shops and others have …
Low-tech approach to ATM heist
ATM thieves in San Francisco have adopted an unusual and very low-tech way of getting their hands on some money. According to The SF Examiner, they simply glue down the …
Phishing HTML attachments bypass browser detection
In the constant war that goes on between online crooks and scammers and security professionals, adaptability is a quality greatly prized by all. All of them are tied together …
Japanese “miracle survival” Youtube scam clips
Online scams taking advantage of the ongoing Japanese tragedy are popping up daily. The latest one spotted is perpetuated on YouTube, where users go to search for videos that …
Twitter spambots advertise “Radiation health” e-book
The earthquake/tsunami/nuclear reactor explosion situation in Japan is currently being exploited by cyber scammers in a great variety of ways, but among the things that I …
Featured news
Resources
Don't miss
- Cybersecurity in 2025: Global conflict, grown-up AI, and the wisdom of the crowd
- Ivanti Connect Secure zero-day exploited by attackers (CVE-2025-0282)
- The U.S. Cyber Trust Mark set to launch
- Mitel MiCollab, Oracle WebLogic Server vulnerabilities exploited by attackers
- Why an “all gas, no brakes” approach for AI use won’t work