Zeljka Zorz
Google doesn’t want to share its encryption keys
Two years ago, the wish to have control over communication systems and the lack of technical resources of Indian intelligence agencies has led to a particular request targeted …
Vendor creates malware to sell its anti-malware product
Chinese antivirus software companies seem to have a unusual strategy for keeping its services and products in demand – secretly developing threats themselves and …
FarmVille players lured with fake “farm cash” offer from Zynga
The latest Facebook scam takes advantage of the popularity of Zynga’s FarmVille game and lures users into allowing an application access to their accounts with promises …
Bradley Manning offered plea bargain
WikiLeaks’ founder Julian Assange has been released a few minutes before 6 pm (GTM) on Tuesday, after the High Court in London confirmed the decision that he is to be …
NSA considers its networks compromised
Debora Plunkett, head of the NSA’s Information Assurance Directorate, has confirmed what many security experts suspected to be true: no computer network can be …
Dell, AMD executives accused of selling confidential information
Market research companies usually pay experts from various industries to give their opinion and provide information about future trends in those industries, and they sell that …
Ohio State University database hacked
A database containing Social Security numbers, addresses and dates of birth of everyone who’s ever had an Ohio State University e-mail address (@osu.edu) has been …
Mozilla expands its bug bounty program
Back in 2004, the Mozilla Foundation instituted a bug bounty program that rewarded users who reported critical security vulnerabilities on the Foundation’s software with …
Twitter spam campaign leads to computer-hijacking rogue AV
Malicious shortened goo.gl links and compromised accounts are once again used to lure users to pages that will ultimately harm their computer. A message saying “a very …
Malicious .rtf file exploits MS Office flaw
A stack-based buffer overflow vulnerability in Microsoft Office has recently been spotted being exploited in the wild by attackers aiming at getting control of targeted …
Gawker breach triggers password-changing requests from Yahoo, Twitter
The compromise of Gawker’s database containing some 1.3 million user login credentials and the realization that a lot of users – despite constantly being advised …
Bank of America sues ex-employees for stealing confidential data
Four former employees of the Bank of America stand accused of illegally copying a confidential database belonging to the bank’s U.S. Trust and taking it with them to the …
Featured news
Resources
Don't miss
- Webinar: Beyond the Quadrant: An Analyst’s Guide to Evaluating Email Security in 2026
- CISO Assistant: Open-source cybersecurity management and GRC
- Firmware scanning time, cost, and where teams run EMBA
- How AI image tools can be tricked into making political propaganda
- Product showcase: Orbot – Tor VPN for iOS