Zeljka Zorz
Spammers using new URL obfuscation technique
Spammers and scammers are always on the lookout for new tricks to use to bypass URL filters and deliver the links to unsuspecting victims, and lately they have discovered that …
Twitter “wrong credential combination” phishing scheme
If you have followed a link on a Twitter message from a contact that says “You have to be the first to see these new pictures!! LINK” and entered you username and …
Are computer “health certificates” the answer for the botnet problem?
Back in March, at the RSA Conference in San Francisco, Corporate Vice President for Trustworthy Computing at Microsoft Scott Charney proposed to the audience and to the world …
Infamous Canadian Pharmacy spam affiliate program shuts down
When it comes to spam, we’re all used to rising numbers – and the rising annoyance. But it seems that there could finally a reason to rejoice: it looks like …
A phishing e-mail to learn from
A phishing attempt that makes even people who are very good at spotting them pause for a moment and take a good look is a perfect example on which to learn. Ravi Dehar of …
A closer look at Knox for Mac
Knox (v. 2.0.5) is a Mac application that will allow you to create password-protected and encrypted vaults on your computer or to turn an external drive into one in order to …
Web-voting option suspended due to a system flaw
The option of casting your vote through the new D.C.’s Digital Vote by Mail system has been suspended because of a vulnerability that allowed a public tester of the …
Alleged leader of carding gang arrested
A Ukranian national suspected of being the leader of a gang involved in counterfeiting payment cards has been taken into custody by the Russian police. The arrest has been …
Cryptome hacked, founder e-mail account ransacked
Cryptome.org, the well-known whisteblowing site, was hacked during this past weekend, and all of its content (approximately 7GB of data) was deleted by the hacker who then …
Fake browser updates deliver fake AV or exploit kit
Not that long ago, Microsoft was warning users about rogue AV peddlers using compromised websites and fake browser warnings to urge them to download an …
Security exercise for information infrastructure protection
“Cyber Europe 2010” – the first pan European CIIP (Critical Information Infrastructure Protection) exercise that will test the efficiency of communication …
Arrests of money mules follow ZeuS gang takedowns
Last week’s arrests and indictments of two gangs (one based in the U.K. and one in the U.S.) that used the ZeuS Trojan to syphon huge amounts of money from private and …
Featured news
Resources
Don't miss
- OpenNHP: Cryptography-driven zero trust protocol
- The API security crisis and why businesses are at risk
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer
- Man charged with stealing $65 million by exploting DeFI protocols vulnerabilities