Zeljka Zorz
Bogus airline charge leads to Zeus Trojan
A recent spam campaign is targeting frequent users of a popular German airline carrier, baiting them with a exorbitant bogus fee that has apparently been charged to their …
Adobe changes Flash Player feature to prevent user tracking
In the last few years, Adobe has realized that their products will have no future if they don’t step up the security aspect, and so they started doing things like …
Raising the security bar: Know and fine-tune your IPS
A long time ago, people thought that having a firewall in place would protect their systems and networks from any and every outside attack. And for a very short while, they …
Third-party software responsible for most vulnerabilities
Most people owning a PC are familiar with Microsoft’s patching process – it’s easy and it’s there. For a lot of them, it also gives the impression that …
Who profits on vulnerabilities for sale?
The number of software vulnerabilities discovered during 2010 may be smaller than that of those discovered the previous year, but they still bring money to its discoverers. …
50,000 stolen iTunes accounts for sale in China
Some 50,000 iTunes accounts – each associated with an active credit card and some guaranteed to work for at least 12 hours before getting deactivated – are …
Mac App Store already cracked
The Mac App Store debuted yesterday, and it seems that a flaw has been found that allows you to get paid applications for free. Logan of AppInstect published a tutorial on how …
Estonia institutes volunteer cyber army
In 2007, when Estonia’s government, financial and media computer networks were attacked by unknown Russian hackers following the government’s decision of …
Undetectable fake ATM keyboard steals PINs in real time
Thieves and scammers are an inventive bunch, especially when it comes to stealing you money indirectly. And the latest discovery of a fake keyboard that is placed over an …
DHS investigation uncovers cyber fraud ring members
Two Winona State University students are currently being investigated by the Department of Homeland Security and are suspected of having been members of a Vietnamese-based …
Fuzzing tool discovers over 100 vulnerabilities in popular browsers
The public release of cross_fuzz – a cross-document DOM binding fuzzer that is able to detect vulnerabilities in all browsers by examining how they interact with various …
Exploit code for critical MS Office flaw exploit found in the wild
A critical vulnerability in the way Microsoft Office handles RTF which can allow an attacker to remotely execute arbitrary code on the victim’s computer has been by …
Featured news
Resources
Don't miss
- The modern CISO is a cornerstone of organizational success
- Best practices for ensuring a secure browsing environment
- Kata Containers: Open-source container runtime, building lightweight VMs
- Why software is the key to FI risk management
- Hottest cybersecurity open-source tools of the month: December 2024