Zeljka Zorz
New IE 0-day exploit code found in the wild
Exploit code for a previously unknown Internet Explorer zero-day vulnerability that would allow an attacker to perform a remote code execution and install malware on the …
Bank customers get malicious e-mails with stolen private data
The customers of a number of Brazilian banks are currently being targeted with e-mails made to look like official communication from the banks in question, but are actually …
Hole in iPhone PayPal app allows account hijacking
PayPal customers that use the payment company’s iPhone application to effectuate payments should update it as soon as possible, because a vulnerability that can be …
Fake Twitter warnings lure users to potentially malicious site
Twitter users are often targeted with various fake messages purportedly coming from the microblogging service, and these e-mails usually try to trick the users into clicking …
Popular online services graded on SSL implementation
It seems that Firesheep has succeeded where similar tools have failed in the past: the issue of full end-to-end encryption for all websites – especially the most popular …
Perverted Facebook hacker targeted women
The recent arrest of a 23-year-old California man that has allegedly hacked e-mail accounts of more than 170 women and posted sexually explicit pictures found within them to …
Google Android vulnerabilities
A shocking number of high-risk security flaws in Google’s Android smartphone OS have recently been discovered by security firm Coverity. “We found 88 high-risk …
Fake USAA e-mails phishing for card information
E-mails purportedly sent by the United States Automobile Association (USAA) have been hitting inboxes in the last few days, M86 researchers warn. In it, the recipients are …
Human rights organization targeted with cyber attack
The website of Survival International – a human rights organization that campaigns for the rights of indigenous tribal peoples – has been knocked offline last week …
Dissecting the Hack: The F0rb1dd3n Network (Revised Edition)
This book approaches the subject of hacking in an interesting way. Part fiction, part reference manual, its target audience are people who want to or should know more about …
The aftermath of the Bredolab botnet shutdown
The war against botnets will be long and hard – there is no doubt about it. For one thing, command and control centers can be replaced and the targeted botnet …
Fake AV pushers poison US election search results
The US midterm elections are taking place today, and scareware pushers aren’t sitting with their hands crossed – they have poisoned related search results: Search …
Featured news
Resources
Don't miss
- Google agrees to pay $135 million over Android data harvesting claims
- SolarWinds fixes critical Web Help Desk RCE vulnerabilities, upgrade ASAP!
- Open-source malware zeroes in on developer environments
- Hottest cybersecurity open-source tools of the month: January 2026
- A practical take on cyber resilience for CISOs