Zeljka Zorz
Google and NSA team up to fend off future attacks
Google and the NSA reached an agreement that will see the security agency helping with the investigation of the latest attack of the Internet giant that supposedly carried out …
A closer look at File Encryption XP 1.5
File Encryption XP is a file and folder encryption program that uses the Blowfish algorithm with a 384-bit key. The files are completely self-contained which means that, if …
Police push for fast access to ISP data
According to the answers given by a 100 police investigators, they are not very satisfied with the speed with which they are able to access company documents during …
Hackers make millions through stolen carbon credits
Anything worth anything is worth something to somebody. And carbon credits are not just something small – these days, they’re worth millions. It is no wonder, …
Life of a Chinese hacker
Majia is in his early twenties, and is a college graduate with a degree in engineering. During the day, he works at a government agency. But at night, he is free to follow his …
Keeping World of Warcraft accounts safe
Blizzard Entertainment is taking seriously the string of account hijacking that had as a target its World of Warcraft users in the last few years. It is only normal, since the …
Off-Twitter phishing attack explained
The mystery of the off-Twitter phishing attack, due to which some account passwords have been reset by the service, has been solved. Del Harvey, Director and leader of …
1,400 personal records stolen from Columbia College
Three notebook computers were stolen two weeks ago from an office at the Columbia College, containing personal information, including social security numbers, of 1,400 of …
Black hat hackers on demand
Everybody knows that malicious hacking is illegal, but there are services out there that seem not very concerned with the fact. Some of them have been operating for 3 years …
Five months to detect a breach
When it comes to cyber attacks and breaches, the hospitality industry has been the most heavily targeted industry in 2009. This surprising information is among the findings …
Google applicants targeted by phony job application response
People who have applied for a position at Google are in danger of being duped by a malicious email purporting to come from Google, thanking the recipients for sending in their …
Inside Cyber Warfare: Mapping the Cyber Underworld
The latest attacks and intrusions on networks of US companies and the speculation about their origins have surely made cyber war a distinctly possible reality in the minds of …