Zeljka Zorz
114,000 iPad owners’ emails and account IDs exposed
News that vulnerabilities on the AT&T network allowed a group calling itself Goatse Security to harvest emails and AT&T authentication IDs of 114,000 early-adopters …
Drive-by download attack disguised by Canadian Pharmacy website
Red Condor today issued a warning of a new sophisticated email malware threat that spoofs YouTube and uses a redirect on a compromised website to a common Canadian Pharmacy …
WordPress-based, GoDaddy-hosted websites hacked
WordPress users whose websites are hosted on GoDaddy servers have been targeted by fake AV peddlers – again. According to Sucuri Security, the web hosting …
A closer look at My Lockbox PRO
My Lockbox PRO (v. 2.0) enables you to hide, lock and password protect almost any folder on your computer. You can use My Lockbox to hide your private data from prying eyes …
Google patches 11 vulnerabilities in new Chrome, awards $2000 to researcher
Google Chrome 5.0.375.70 has been released to the Stable channel on Linux, Mac, and Windows, and fixes the following security issues: [15766] Cross-origin keystroke …
Twitter’s new service reveals what’s behind shortened links
Hardly a day passes without Twitter users being targeted by spam runs, phishing emails or malicious links that lead the users to malware-ridden websites. When it comes to …
48 flaws patched with new version of Safari
A new version of the Safari browser for Windows and Mac has been released, and with it Apple patched 48 security flaws – most of which were located in the WebKit …
Olympus Stylus Tough camera shipped with malware
Samsung is not the only company that has been lately caught shipping malware-infected consumer electronics – Olympus Japan has admitted that a little over 1700 units of …
Fixing the Internet is…easy?
There’s no need to enumerate the dangers that Internet use poses for our security and privacy – we are, sadly, all too aware of what they are and how much they …
“Hidden Iron Man 2 scene” Facebook scam
Curiosity – that drive to know new things – is a double-edged sword. It fuels our inclination towards exploration and, consequently, learning, but it can also …
Malicious tweets keep coming and changing
There is no end in sight for malicious postings on Facebook and Twitter. And although Facebook has become quite adept at spotting them and blocking the malicious links …
Sign of the times: Social engineering contest at Defcon
It is a well known fact that Defcon regularly organizes capture-the-flag-style contests that see hackers pitted against each other in an effort to protect their own systems …
Featured news
Resources
Don't miss
- OpenNHP: Cryptography-driven zero trust protocol
- The API security crisis and why businesses are at risk
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer
- Man charged with stealing $65 million by exploting DeFI protocols vulnerabilities