Zeljka Zorz
Fake Diablo beta invites hitting inboxes
Since the third installment of the popular Diablo game franchise has been announced in 2008, fans all over the world have been impatiently waiting for it to become available. …
Fake stores dominant threat due to blackhat SEO
“Searches for buying software online remains 90 percent malicious, redirecting users to fake stores,” concluded Julian Sobrier recently, after having analyzed the …
A botnet for the masses
Did you know that you can buy a bot for just 10 Euros? Researchers of German security firm G Data have discovered that a bot builder dubbed “Aldi Bot” is currently …
Android bugs allow attackers to secretly install malware
Jon Oberheide – the security researcher who has so effectively pointed out the existence of a major security bug in the Android platform nearly a year ago – has …
“We are going to sue you” spam campaign leads to malware
Every once in a while, security researchers spot an email spam campaign so poorly thought out and executed that I have to wonder: “Who would fall far this?” But …
Researchers crack SSL encryption
Two security researchers have found a way of breaking the SSL/TLS encryption that allows the information that passes from browser/user to server and back be reliable and, …
XSS bug in Skype iPhone app allows address book theft
A bug in the latest version of Skype for iPhone and iPod touch makes its users vulnerable to having their address book stolen just by viewing a specially crafted message, says …
Microsoft re-releases botched security update
Microsoft has re-released a security update for Windows XP and Server 2003 after it has realized that the initial one – released last Tuesday in order to add six more …
Skype users targeted with calls spreading fake AV
Showing considerable resourcefulness in their attempt to trick Internet users, fake AV peddlers have begun targeting Skype users with an unexpected call. “Attention: …
Bots troll hacker forums to discover data breaches
When talking about bots, the first thing that comes to mind is often a bad one – i.e. how cyber crooks misuse the technology to bilk Internet users out of information or …
Pay-per-install services attempt discreet comeback
“Pay-per-install businesses can be temporarily compromised by welcome law enforcement action, but the crooks will always find a way to return,” says McAfee’s …
Con artists love social networks
Most social networks’ users are hit by online scams almost daily – whether its the ubiquitous survey scam or the “share your cell phone number, get …
Featured news
Resources
Don't miss
- Design weaknesses in major password managers enable vault attacks, researchers say
- ISC2 webinar: Power up your exam prep!
- OT teams are losing the time advantage against industrial threat actors
- Firmware-level Android backdoor found on tablets from multiple manufacturers
- Your encrypted data is already being stolen