Zeljka Zorz
Fake PIN pad units in US chain store
As soon as we got used to the idea that we have to be very careful when using ATMs because they might be “skimming” devices attached onto them, we have to …
Chrome unique IDs removed after first update
Google decided to appease privacy advocates by making the “unique ID” feature “disappear” when the Chrome browser checks for updates for the first time …
Facebook removes “stalker” apps
A short-lived resurgence of “stalker” applications was promptly squashed by Facebook a few days ago when many users received notifications or wall posts from their …
Mac OS X ransomware – just a matter of time?
For years now, IT experts have been predicting the advent of threats to Mac users that would mirror those faced by the Windows-using crowd. While Mac malware does exist, and …
Vast online data leak in South Korea
South Korean retailer Shinsegae and 24 other companies have been breached and private data on 20 million customers has been stolen, forcing the Ministry of Public …
The rise of amateur-run botnets
It used to be that cyber criminals were people with a highly technical skill set, but this is not the norm anymore. This fact became obvious some two weeks ago when news of …
News of Corey Haim’s funeral lead to fake AV
Corey Haim’s death is old news by now, but fans of the prematurely deceased teen idol are still on the lookout for information concerning his death. Those interested in …
The threat landscape is changing, AV fails to adjust
A recent testing conducted by NSS Labs presented us with some deplorable results: of the seven antivirus products tested two weeks after the IE bug used for breaching Google …
Playstation emulator installs malware
Playing again the games you used to amuse yourself with for hours some years ago could bring a smile to your face, but it could also get your computer infected. Searching for …
Exploit for IE 0-day flaw published, patch still unavailable
An Israeli hacker has created an exploit for the IE zero-day flaw that Microsoft warned about on Tuesday, and the code is already being inserted into the Metasploit Framework. …
Targeted attacks exploiting PDF bugs are soaring
Adobe is having a hard time fighting its bad reputation when it comes to products riddled with vulnerabilities. Adobe Reader exploits seem the weapon of choice of many a cyber …
Basic security measures do wonders
Deep down inside, we all wish for a unique solution that will protect our machine or our network completely forever and ever, preferably one that can be activated with a …