Zeljka Zorz
SSCP Video Mentor
Yet another title in the Pearson's series for interactive learning that targets users set on obtaining security certifications, SSCP Video Mentor is a combination of DVD and …
FBI fails to decrypt suspect’s hard drives – after 12 months of trying
After 12 months of failed attempts to crack the encryption that protects information held on 5 hard drives that belong to a Brazilian banker suspected of money laundering, the …
Cisco’s access point migration mode leaves networks vulnerable
A feature of Cisco’s Aironet 1200 Series Access Point can be abused by hackers to gain access to a company network, claim researchers from Core Security Technologies. …
A closer look at East-Tec Eraser 2010
East-Tec Eraser 2010 (v. 9.7) protects your privacy, identity and confidential information while removing all evidence of your computer and online activity. It erases your …
New site for Google’s encrypted search
When Google unveiled the option of encrypted use of its search engine, people were mostly satisfied. But schools and other educational institutions had a problem with this new …
Cyber criminals steal almost $400,000 using a Trojan
A few months ago, a small escrow firm from California was targeted by cyber criminals that managed to transfer almost $400,000 from the firm’s bank account to a number …
YouTube used to peddle a Facebook password stealer
As chance would have it, today is the day when we shine the spotlight on YouTube being used to peddle malicious software. First, we had the showcasing of the capabilities of a …
The longevity of computer worms
Viruses, Trojans, worms. They all enjoy a (sometimes brief, sometimes long) period within which the are at the peak of their game – so to speak – but that period …
YouTube used to showcase DDoS software
Legitimate businesses use all that the Internet offers to make their sales go up. And even though the use of social media tools can affect office productivity and be an entry …
Eminem death video leads to malware
The death of a world-famous celebrity is always top news, and it’s regularly exploited by cyber criminals to spread their malicious payloads. I would venture to guess …
iPad phishing scams still going strong
iPad’s instant popularity is – by now – the stuff of legends, and the possibility of receiving it as a reward for being a BETA tester, participating in a …
Carder forum hack reveals information that can be used to track down members
It’s every forum for itself in the cut-throat market of carder forums, and a security breach affecting one of them means more market share for the rest. It is, …
Featured news
Resources
Don't miss
- OpenNHP: Cryptography-driven zero trust protocol
- The API security crisis and why businesses are at risk
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer
- Man charged with stealing $65 million by exploting DeFI protocols vulnerabilities