Zeljka Zorz
Security for Microsoft Windows System Administrators
Security for Microsoft Windows System Administrators aims at teaching the reader the very basics of information security: general concepts, some cryptography, concepts and …
Adobe PDF format riddled with exploitable features
Adobe’s PDF format and standard has been known for a while now to be easily exploitable and, thus, rather insecure. In the past, attackers have taken advantage not only …
A closer look at Steganos Privacy Suite
Steganos Privacy Suite (v.12) is a suite offering most Steganos privacy and encryption products bundled up together: Safe, Portable Safe, Crypt & Hide, Password Manager, …
Android Trojan with botnet capabilities found in the wild
A new, more sophisticated Trojan for Android devices has been spotting lurking on third-party Chinese Android app markets – the first ever piece of Android malware that …
GSM cracking is all about knowledge, not money
Since the cracking of GSM encryption back in December 2009 by encryption expert Karsten Nohl, the cost of setting up an operation that includes sniffing out the calls made by …
Computer Incident Response and Product Security
As time passes, more and more companies realize the importance of having an in-house incident response team. But how to go about forming one and organizing its functioning? …
Older Facebook apps threaten your and your friends’ privacy
Facebook users that are concerned with keeping their privacy have probably become more careful with the years about adding applications to their account, since many ask access …
Man makes career out of suing e-mail spammers
There may be a lot people who thought about it, but there is one who decided to actually do it – Daniel Balsam from San Francisco quit his job and started his new …
Carders.cc, Exploit-db.org and others hacked on Christmas
Waking up on Christmas morning and finding out you’ve been hacked must be pretty annoying, and that it what happened to the administrators of Carders.cc – an …
Banknotes of the future?
There may come a time when banknotes will disappear altogether, but that time hasn’t come yet. The criminal practice of counterfeiting money has existed as long as money …
Inclement weather resurrects the “friend in need” scam
This recent spat of snowy weather has grounded may planes and stranded many passengers in Europe. It has also prompted scammers to resurrect en masse the tried and true friend …
Cisco CCENT Mind Share Game
The Cisco CCENT Mind Share Game covers key networking topics and is designed to test the players' technical knowledge and their ability to concentrate and perform under …