Zeljka Zorz
A “private” banking Trojan competes with ZeuS
The recent surge of brand new banking Trojans continues to give us more things to worry about. The latest one is named “Feodo”, and it has been around for months …
Facebook works on solution to stop inadvertent user ID sharing
The recent discovery that various third-party application on Facebook were sending users’ ID numbers and/or names to advertising agencies every time the users click on …
Fake MS Security Essentials peddles rogue AV products
I was wondering when will rogue AV peddlers start using the name of a real AV product, and now I have my answer. F-Secure has detected one called Microsoft Security Essentials …
Fake Stuxnet removal tool wreaks havoc
The Stuxtnet Trojan hit the headlines pretty hard, and people around the world feared that their system was compromised, too. Among the legitimate Stuxnet removal tools that …
Sensitive prisoner data found discarded in dumpster
When a homeless couple went searching for recyclable things in a gas station dumpster in California last week, they probably didn’t expect to find files containing …
Pentagon to aid DHS in case of cyber attack on domestic soil
It is a well know fact that the U.S. Department of Defense is forbidden to deploy military units within the nation’s boarders for law enforcement purposes. The only …
A closer look at SafeWallet for Mac
SafeWallet (v.1.0) is a password manager in which you can store all your passwords and all your private information that you want to have handy but accessible only to you …
The rise of the insider threat
The bank insider threat is on the rise. Patrick Romain, head of solutions in Barclays Information Security Group, calls it a “power threat” – obviously …
Spam and virus trends according to Google
Postini – the spam engine that powers Google’s e-mail security and archiving services – handles some 3 billion e-mails per day, so it’s fair to say …
WoW players continually targeted by phishers
WoW players are continually targeted by phishers, since account credentials can be easily sold. There are many variants of phishing e-mails and in-game messages, and it pays …
Fake “Reported Attack Page!” warnings leading to fake AVs
Peddlers of the rogue AV solution named Security Tool have demonstrated a predilection for masquerading their solution as a Firefox update, and it’s obviously a …
Thief returns stolen laptop contents to owner
A surprising case of theft has been recorded in Sweden – a thief stole a laptop belonging to a university professor, but “returned” its contents to the …
Featured news
Resources
Don't miss
- OpenNHP: Cryptography-driven zero trust protocol
- The API security crisis and why businesses are at risk
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer
- Man charged with stealing $65 million by exploting DeFI protocols vulnerabilities