Zeljka Zorz
Q&A: SOURCE Barcelona
Stacy Thayer is the Founder and Executive Director of SOURCE Conferences. Prior to founding SOURCE Conferences, Stacy was employed for a Fortune 500 company, where she worked …
Bad news for BlackBerry users in the Middle East
What seems to be a power play between RIM, one of the biggest manufacturers of smartphones in the world and the TRA, the telecommunications regulation body in the United Arab …
Movie files run in QuickTime Player trigger malware download
Specifically crafted .mov files trigger the download of malware masquerading as a codec update and an installation file for another player when run in the latest (7.6.6) …
Android wallpaper app stealing user data and sending it to China
The revelation that an application for Android that is being sold on Google’s Android Market is sending out information regarding your phone (SIM card number, subscriber …
Apple improves App Store security
Following the recent hacking of its App Store, Apple instituted a new security measure that should prevent hijackers of accounts from purchasing anything from the store. The …
ATMs hacked and spitting up money at Black Hat
Delivering on his promise, security researcher Barnaby Jack has managed to make two unpatched ATMs from two major vendors spit out cash during his demonstration at the Black …
Trojan masquerades as iPhone jailbreaking software
An email campaigned targeting iPhone users who might want to jailbreak their device has been detected by BitDefender. Only a couple of days after U.S. federal regulators …
100 million Facebook pages published on torrent site
A compilation of Facebook pages (and personal information) of 100 million users of the popular social network is available for download on a torrent site, courtesy of hacker …
Cell-phone call interception demonstration at Defcon might not be a sure thing
Ethical hacker Chris Paget is scheduled to give a talk on cellphone insecurity at Defcon this Saturday, during which he means to demonstrate the possibility of interception of …
Designing Network Security, 2nd Edition
Designing Network Security is a book that will teach you how to secure your corporate network infrastructure. Starting with security fundamentals, you'll learn how to define a …
Fake AV masquerading as Firefox/Flash update
The well known “fake scanning page” that pops up a warning about your computer being infected has been switched with a fake Firefox “Just Updated” page …
Critical vulnerability in Apple QuickTime
A highly critical vulnerability (as dubbed by security researchers from Secunia) affects the latest version of Apple QuickTime Player for Windows. “The vulnerability is …