Zeljka Zorz
WikiLeaks booted from Amazon, Assange to be arrested soon
While a “hacktivist” that goes by the handle of The Jester has claimed responsibility for the DDoS attack aimed at the WikiLeaks’ page via his Twitter …
ProFTPD.org main FTP server compromised
A warning has been issued by the developers of ProFTPD, the popular FTP server software, about a compromise of the main distribution server of the software project that …
Phishers exploit Facebook features
Phishing e-mails supposedly coming from the Facebook Security Team with account deactivation warnings have been hitting inboxes around the world. The targeted users are led to …
Chrome sandboxes Flash Player
It’s good news for Windows users – Chrome developers have added a Flash Player sandbox to the development channel of the browser, adding to the already present …
Exploit kit with integrated AV checker
The latest version of the relatively new “Siberia Exploits Kit” has an interesting feature that must make it pretty popular among criminals – a built in AV …
WikiLeaks and Assange under attack
While WikiLeaks’ site is still being bombarded with requests at a speed of 10 gigabits per second – making access to it very difficult and at moments even …
Amazon profiles abused by spammers and malware pushers
Experience has proven that if a site enables users to contribute content, this feature will be abused by those who want to push their own agenda – usually spammers. This …
Facebook’s recurring nuisance – the recycled scam
Every now and then, a new Facebook scam pops up that takes advantage of the users’ curiosity and lures them in by promising to allow them to view who has visited their …
Malicious Kodak Galleries used for serving Trojan
A variant of a highly specialized Trojan has appeared on fake sites mimicking Kodak Gallery pages, where potential victims are urged to download software that would supposedly …
Ransomware abounds
Ransomware is any malware that manages to make a computer system or any of the files on it inaccessible to the user and asks him or her to pay up if they want to regain …
Behavior of Safari on the iPhone could benefit scammers
A behavior of the Safari browser on the iPhone could be used by phishers and scammers to fool users into believing they have landed on a legitimate site, says Nitesh Dhanjani. …
Fake Trojan Removal Kit runs ThinkPoint rogue
When looking for an anti-malware solution, it pays to be extra careful. Take the example of the “Trojan Removal Kit”. It is offered on fake security scan pages …