Zeljka Zorz
Sign of the times: Social engineering contest at Defcon
It is a well known fact that Defcon regularly organizes capture-the-flag-style contests that see hackers pitted against each other in an effort to protect their own systems …
Fake Facebook account deactivation email
Sunbelt reports that in a spam run that may at first glance appear to be a phishing attempt aimed at getting your login credentials, mailboxes around the world have been …
U.S. intelligence analyst arrested for passing on classified items to Wikileaks
A 22-year old Army intelligence analyst from Maryland has been arrested by U.S. Federal officials two weeks ago after he boasted about providing Wikileaks with combat videos …
Critical Adobe Flash, Reader 0-day flaw exploited in the wild
A zero-day flaw affecting 10.0.x and 9.0.x versions of Adobe Flash Player – including the current version, which is 10.0.45.2 – has been spotted being exploited in …
Rootkits on Android smartphones
As our mobile phones get “smarter” and our personal and professional lives get increasingly mobile, the possibility of these devices getting compromised and the …
Facebook fights rogue apps with verification program
In view of all the rogue applications that have lately targeted Facebook users, the announcement that the social network will require developers to verify their Facebook …
U.S. Senators keep trying to give “cyber emergency” powers to federal government
Not so long ago, a simulated cyber attack showed the unpreparedness of the United States to deal effectively with such an occurrence. When the officials “playing” …
Europe finds search data retention policies inadequate
The Article 29 Data Protection Working Party (an independent European Commission advisory body) has lately been much in the news, owning to their interest towards protecting …
Samsung smartphone shipped with malware-infected memory card
The latest mass-market product that has been found being shipped to customers while containing malware is the Samsung S8500 Wave phone with the Samsung bada mobile platform. …
Payment processing security trends in the catering industry
The catering industry has for some time now emerged as one of the businesses most affected by security breaches and card and identity theft. In reply to the increased threat, …
Users of Habbo Hotel virtual world hit by thieves
If you’re not an online gamer or a user of virtual worlds, it is easy to make light of the occasional news of account hijacking or thefts of virtual goods or money. …
Critical iPhone security issue leaves your contents exposed
Most iPhone users are confident that using a passcode to secure their devices means that even if they lost them or they get stolen, their data will be protected from prying …
Featured news
Resources
Don't miss
- Vulnerable firmware for Gigabyte motherboards could allow bootkit installation
- AsyncRAT evolves as ESET tracks its most popular malware forks
- Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech
- Securing vehicles as they become platforms for code and data
- How service providers can turn cybersecurity into a scalable MRR engine