Zeljka Zorz
Facebook introduces one-time passwords
For all those who simply must access Facebook from a public computer, the social network introduced the option of receiving a one-time password to be used instead of their …
Long-awaited jailbreaking tool released
Greenpois0n, the jailbreaking tool whose release was eagerly awaited by the jaibreaking community, and the wait for which was even misused by malware peddlers, was finally …
A foolproof drive-by-download blocking tool?
A seemingly foolproof tool for blocking drive-by-download attacks has been developed by a group of researchers at the Georgia Institute of Technology and California-based SRI …
CISSP Study Guide
The title of the book is self-explanatory - this is a study guide for all of you out there who aspire to become a Certified Information Systems Security Professional. …
Google’s Gmail security checklist
Every now and then, Google adds tools and issues warnings that are meant to help its users feel and stay safe while using their offerings – the recent warning to Gmail …
Rogue Facebook app takes over accounts
A flurry of statuses saying “OMG! Im never going to send another text message again after seeing this!” and “OMG! Im not txtin again now that I have seen …
Future malware will steal behavioral and relationship patterns
Whenever something of tangible value exist, there will always be those who will try to steal it, says a group of international researchers that recently published a paper on …
Trojan overrides Firefox password-saving behavior
A curious new information-stealing Trojan that patches a core Firefox file in order to override the browser’s behavior has been discovered by Webroot researchers. Every …
Spammers using new URL obfuscation technique
Spammers and scammers are always on the lookout for new tricks to use to bypass URL filters and deliver the links to unsuspecting victims, and lately they have discovered that …
Twitter “wrong credential combination” phishing scheme
If you have followed a link on a Twitter message from a contact that says “You have to be the first to see these new pictures!! LINK” and entered you username and …
Are computer “health certificates” the answer for the botnet problem?
Back in March, at the RSA Conference in San Francisco, Corporate Vice President for Trustworthy Computing at Microsoft Scott Charney proposed to the audience and to the world …
Infamous Canadian Pharmacy spam affiliate program shuts down
When it comes to spam, we’re all used to rising numbers – and the rising annoyance. But it seems that there could finally a reason to rejoice: it looks like …
Featured news
Resources
Don't miss
- Open-source benchmark EVMbench tests how well AI agents handle smart contract exploits
- Public mobile networks are being weaponized for combat drone operations
- Attackers keep finding the same gaps in security programs
- China-linked hackers exploited Dell zero-day since 2024 (CVE-2026-22769)
- The era of the Digital Parasite: Why stealth has replaced ransomware