Zeljka Zorz
Serious Apache vulnerability disclosed
A serious vulnerability in Apache’s HTTP web server that enables the attacker to gain remote access to the server and total control of a database, has been discovered by …
There is a social engineering scheme for everyone
The human factor is the weakest link of the security chain – this statement has been said and written so many times, that is starting to become a cliche’. Even so, …
USB battery charger installs Trojan
The software that shows to which extent the battery is charged through the Energizer DUO USB recharger comes bundled up with a Trojan, says US CERT. The installer file for the …
Zuckerberg hacked into journalists’ email?
The renowned Facebook co-founder has been accused three years ago of stealing the source code and the business plan for the social network from some Harvard colleagues and for …
Fake drug peddlers hijack academic websites
Legal sites are often compromised and used as a stepping stone through which the user is taken to a malicious site. The latest of this kind of schemes has seen a string of …
Is there a solution to the ZeuS problem?
Zeus Trojan has for a while now become almost a synonym for banking malware. Its sneakiness and the ability of its makers to constantly change and adapt it would be admirable, …
Malicious files with fake digital signatures
Signing malicious files with fake signatures that at first glance seem authentic is one of the new methods used by malware writers to add an air of legitimacy to them and …
DHS casting its nets for cybersecurity experts
Glancing about the room at the great number of RSA Conference attendees that came to hear her speak, Secretary of Homeland Security Janet Napolitano announced the …
US cybersecurity plans revealed
“In order to be successful against today’s cybersecurity threats, we must continue to seek out innovative new partnerships — not only within government, but also …
Software crackers can actually hurt you
The economic crisis has dented your budget? You might have not done it before, but now you’re thinking about cracking legitimate software instead of paying the fee. …
Quarantine and taxation to stomp out malware?
Is the quarantine of infected computers and setting up an internet usage tax the way to go about defusing the malware threat? Scott Charney, Corporate Vice President for …
Phishing made easier
Given the proliferation of phishing sites, you may be excused for thinking that phishing schemes are easy to set up. Unfortunately for the common Internet user, phishing has …