Zeljka Zorz
Digital fingerprints to identify hackers
How can you retaliate against a cyber attacker if you don’t know who he is? As we have witnessed lately, attribution of an attack is quickly becoming one of the biggest …
Hackers prey on Google workers’ friends
It has been discovered that the hackers who mounted the attacks on Google, Adobe and other companies recently breached, have targeted friends of employees that had access to …
US oil industry targeted by cyber attacks
It seems that the high profile breaches of Google and Adobe have been just the latest target in the Chinese march through US networks. ExxonMobil, Marathon Oil and …
The dangers of selling online
Buying online can get you scammed, for sure – but what about selling? You may think that you wouldn’t give up the item without seeing hard cash in your hand or the …
Deep packet inspection – illegal or not?
Virgin Media’s plan to monitor traffic on its networks to assess the percentage and nature of illegal file-sharing may be soon hitting a roadblock, since Privacy …
Using spam to beat spam
How to make a full-proof spam filter that will not block any of the legitimate email? A team at the International Computer Science Institute in Berkeley, California, and the …
Blippy, a great service for phishers?
Blippy, a new service that lets you twitter (blipper?) your recent purchases made with a credit card of your choice, could be a valuable tool for cyber criminals, warns …
Johnny Depp is not dead – but you might be infected
The fake news of the death of one of the most popular actors of today has been used by hackers to infect you with Trojans. According to Sophos’ Graham Cluley, the rumor …
80% of U.S. government domains still without DNSSEC
Eighty percent of all U.S. federal agencies didn’t succeed in deploying DNSSEC on their Web sites by the end of 2009, as demanded by the U.S.’s government mandate …
Tor Project infrastructure breached, users advised to upgrade
Tor users have been advised to upgrade to Tor 0.2.1.22 or 0.2.2.7-alpha, following a security breach that left two of the seven directory authorities compromised (moria1 and …
Unknown virus brings down UK university network
The network of UK’s University of Exeter was hit on Monday by what they claim “is a completely new virus and we are the only organisation in the world to …
More privacy rights violations in China
In a move that has been interpreted as yet another violation of privacy rights, the Chinese government has announced a campaign against pornography that will include automatic …