Zeljka Zorz
Facebook works on solution to stop inadvertent user ID sharing
The recent discovery that various third-party application on Facebook were sending users’ ID numbers and/or names to advertising agencies every time the users click on …
Fake MS Security Essentials peddles rogue AV products
I was wondering when will rogue AV peddlers start using the name of a real AV product, and now I have my answer. F-Secure has detected one called Microsoft Security Essentials …
Fake Stuxnet removal tool wreaks havoc
The Stuxtnet Trojan hit the headlines pretty hard, and people around the world feared that their system was compromised, too. Among the legitimate Stuxnet removal tools that …
Sensitive prisoner data found discarded in dumpster
When a homeless couple went searching for recyclable things in a gas station dumpster in California last week, they probably didn’t expect to find files containing …
Pentagon to aid DHS in case of cyber attack on domestic soil
It is a well know fact that the U.S. Department of Defense is forbidden to deploy military units within the nation’s boarders for law enforcement purposes. The only …
A closer look at SafeWallet for Mac
SafeWallet (v.1.0) is a password manager in which you can store all your passwords and all your private information that you want to have handy but accessible only to you …
The rise of the insider threat
The bank insider threat is on the rise. Patrick Romain, head of solutions in Barclays Information Security Group, calls it a “power threat” – obviously …
Spam and virus trends according to Google
Postini – the spam engine that powers Google’s e-mail security and archiving services – handles some 3 billion e-mails per day, so it’s fair to say …
WoW players continually targeted by phishers
WoW players are continually targeted by phishers, since account credentials can be easily sold. There are many variants of phishing e-mails and in-game messages, and it pays …
Fake “Reported Attack Page!” warnings leading to fake AVs
Peddlers of the rogue AV solution named Security Tool have demonstrated a predilection for masquerading their solution as a Firefox update, and it’s obviously a …
Thief returns stolen laptop contents to owner
A surprising case of theft has been recorded in Sweden – a thief stole a laptop belonging to a university professor, but “returned” its contents to the …
The rise of Java exploits
Sifting through the data collected and analyzed in order to compile the latest Microsoft Security Intelligence Report, senior program manager Holly Stewart came to an …
Featured news
Resources
Don't miss
- CISA confirms exploitation of VMware ESXi flaw by ransomware attackers
- Why a decade-old EnCase driver still works as an EDR killer
- Smart glasses are back, privacy issues included
- Cybersecurity planning keeps moving toward whole-of-society models
- Major vulnerabilities found in Google Looker, putting self-hosted deployments at risk