Zeljka Zorz
YouTube used to peddle a Facebook password stealer
As chance would have it, today is the day when we shine the spotlight on YouTube being used to peddle malicious software. First, we had the showcasing of the capabilities of a …
The longevity of computer worms
Viruses, Trojans, worms. They all enjoy a (sometimes brief, sometimes long) period within which the are at the peak of their game – so to speak – but that period …
YouTube used to showcase DDoS software
Legitimate businesses use all that the Internet offers to make their sales go up. And even though the use of social media tools can affect office productivity and be an entry …
Eminem death video leads to malware
The death of a world-famous celebrity is always top news, and it’s regularly exploited by cyber criminals to spread their malicious payloads. I would venture to guess …
iPad phishing scams still going strong
iPad’s instant popularity is – by now – the stuff of legends, and the possibility of receiving it as a reward for being a BETA tester, participating in a …
Carder forum hack reveals information that can be used to track down members
It’s every forum for itself in the cut-throat market of carder forums, and a security breach affecting one of them means more market share for the rest. It is, …
.org becomes first generic TLD protected by DNSSEC
Knowing full well that DNSSEC won’t be the silver bullet that will solve the massive problem that is cyber security, but will at least provide protection against …
Phishing requires more effort than you might think
When it comes to setting up phishing pages, there are some phishers that make the extra effort. Take those behind the fake Orkut login pages, for example. Symantec has been …
Social networking “Bill of Rights” released
A little over a month ago, the Electronic Frontier Foundation offered their suggestions about what a social networking “bill of rights” should contain. Last week …
Network Security Auditing
This book is part of the Cisco Press Networking Technology Series, and is aimed at teaching security and network professionals the assessment, prevention, detection, reaction …
Twilight app turns mobile phones into zombies
While not the first one who has thought of demonstrating the ability of using an application to create a botnet of Android-running mobile devices, researcher Jon …
How much is Facebook data worth?
Facebook has over 400 million active users. Can you even imagine how much freely given, highly accurate user data is stored on each of those accounts? The marketing industry …