Zeljka Zorz
Social networking “Bill of Rights” released
A little over a month ago, the Electronic Frontier Foundation offered their suggestions about what a social networking “bill of rights” should contain. Last week …
Network Security Auditing
This book is part of the Cisco Press Networking Technology Series, and is aimed at teaching security and network professionals the assessment, prevention, detection, reaction …
Twilight app turns mobile phones into zombies
While not the first one who has thought of demonstrating the ability of using an application to create a botnet of Android-running mobile devices, researcher Jon …
How much is Facebook data worth?
Facebook has over 400 million active users. Can you even imagine how much freely given, highly accurate user data is stored on each of those accounts? The marketing industry …
Technical-support-by-phone scams
So, it turns out that your computer doesn’t even have to be infected for you to become a target for people who offer to disinfect it – and charge you, of course! …
A closer look at AVG LinkScanner for Mac
AVG LinkScanner for Mac (v. 9.0) checks each Web page in real time before it opens on your Mac. It supports Firefox and Safari. It runs silently in the background, and if the …
Flaw in VPN systems nullifies its promise of privacy
Worried about your goings-on being monitored on the Internet, you have resorted to using VPN. But, is your privacy really assured? According to researchers, the answer is …
Lenovo’s download portal found serving Bredolab Trojan
Lenovo’s driver download portal was discovered to be compromised and was found serving malware this weekend. A hidden iframe inserted in the page was redirecting users …
When Twitter resets your password
Recently, Twitter issued the following tweet on their @safety account: If you follow the link, you will be given information about the Twitter modus operandi when it comes to …
HTML files redirect users to malicious sites, evade mail server antivirus
Facebook, Twitter and Skype are Internet behemoths, counting hundreds of millions users each, so it is not surprising that many malicious email campaigns masquerade as …
Zbot Trojan delivery via fake Pentagon emails
Attention-piquing malicious spam emails purportedly coming from the DHS, the Pentagon or the Transportation Security Administration have recently been spotted by Sophos. With …
Next-generation Trojan plunders East European bank accounts
Russian and Ukrainian banks have been lately trying to stop the onslaught of BlackEnergy 2, a Trojan that manages to bypass the Java application that the customers use to …