Zeljka Zorz
Trojan masquerades as iPhone jailbreaking software
An email campaigned targeting iPhone users who might want to jailbreak their device has been detected by BitDefender. Only a couple of days after U.S. federal regulators …
100 million Facebook pages published on torrent site
A compilation of Facebook pages (and personal information) of 100 million users of the popular social network is available for download on a torrent site, courtesy of hacker …
Cell-phone call interception demonstration at Defcon might not be a sure thing
Ethical hacker Chris Paget is scheduled to give a talk on cellphone insecurity at Defcon this Saturday, during which he means to demonstrate the possibility of interception of …
Designing Network Security, 2nd Edition
Designing Network Security is a book that will teach you how to secure your corporate network infrastructure. Starting with security fundamentals, you'll learn how to define a …
Fake AV masquerading as Firefox/Flash update
The well known “fake scanning page” that pops up a warning about your computer being infected has been switched with a fake Firefox “Just Updated” page …
Critical vulnerability in Apple QuickTime
A highly critical vulnerability (as dubbed by security researchers from Secunia) affects the latest version of Apple QuickTime Player for Windows. “The vulnerability is …
Mariposa malware author arrested in Slovenia
A 23-year old Slovenian hacker that goes by the handle “Iserdo” has been arrested for developing the code that allowed the three alleged Spanish Mariposa botnet …
Author of cloud-based phishing kit harvests collected credentials from phishers using it
People who embark on a life of crime are usually attracted by the promise of little effort and big money, and the hacker whose phishing kit was discovered to be collecting …
A closer look at Panda Cloud Antivirus Free Edition
Panda Cloud Antivirus (v.1.1.2) consists of a lightweight antivirus agent that is connected in real-time to PandaLabs’ online Collective Intelligence servers for a …
ZeuS, Sality, Chymine and Vobfus jump on the LNK vulnerability bandwagon
Stuxnet was only the beginning. The successful exploitation of the (still unpatched) Windows LNK flaw has prompted other malware attackers to try to achieve the same results. …
Facebook launches Safety page
Facebook recently passed the 500,000 user milestone, and the time has come to introduce a new addition to the already existing Facebook initiatives designed to keep users …
Fake ImageShack emails lead to Zbot variant
Emails pretending to be registration notifications from the popular free image hosting website ImageShack are hitting inboxes, and are trying to get the users to follow a link …
Featured news
Resources
Don't miss
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer
- Man charged with stealing $65 million by exploting DeFI protocols vulnerabilities
- Why logs aren’t enough: Enhancing SIEM with AI-driven NDR
- Aim for crypto-agility, prepare for the long haul