Zeljka Zorz
Five months to detect a breach
When it comes to cyber attacks and breaches, the hospitality industry has been the most heavily targeted industry in 2009. This surprising information is among the findings …
Google applicants targeted by phony job application response
People who have applied for a position at Google are in danger of being duped by a malicious email purporting to come from Google, thanking the recipients for sending in their …
Inside Cyber Warfare: Mapping the Cyber Underworld
The latest attacks and intrusions on networks of US companies and the speculation about their origins have surely made cyber war a distinctly possible reality in the minds of …
Twitter users asked to reset their passwords after phishing attack
Many Twitter users have been locked out of their accounts today, following a suspected phishing attack. They received a message stating: “Due to concern that your …
Beware of Chinese bearing gifts
UK businessmen have been warned by the British security service against using “gifts” such as memory sticks or cameras given to them when attending exhibitions or …
A closer look at Gili USB Stick Encryption 2.0
USB flash drives are the most popular way to move data from one PC to another. They are easy to use, convenient, affordable, but at the same time they pose a security risk and …
Facebook tops the list of risky social networking sites
Social networks may represent one of the most common infection and data loss vectors today, but it’s patently obvious that they are here to stay. Looking at them from a …
Cloud computing not as safe as they want you to think
Cloud computing has been touted as the perfect solution for our increasingly mobile life-style – everything we need is always online and always accessible. The …
Congressional web sites defaced
Visitors of websites of some Congressional representatives and of a few committees were greeted on Wednesday evening by a short message with colorful language. The websites …
IE vulnerability offers your files to hackers
Jorge Luis Alvarez Medina, a security consultant working for Core Security, has discovered a string of vulnerabilities in Internet Explorer that make it possible for an …
Report warned about Google-like attacks
Could the attack on Google have been prevented or, at least, mitigated? The question arose when the existence of a report titled “Report on the Capability of the …
Facebook users alarmed by “Unnamed” application
A cleverly orchestrated campaign taking advantage of a “Unnamed app” that can be found in the Application Settings of some people’s Facebook account has been …
Featured news
Sponsored
Don't miss
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)