Zeljka Zorz
Facebook users alarmed by “Unnamed” application
A cleverly orchestrated campaign taking advantage of a “Unnamed app” that can be found in the Application Settings of some people’s Facebook account has been …
iPad SEO poisoning campaign leads to malware
Was there any doubt about the fact that cybercriminals would use THE hottest topic on the Internet at the moment to spread their malicious payloads? A SEO poisoning campaign …
E-passport flaw enables owner tracking
E-passports could be used to track their owners – British computer scientists warn. The Register reports that the possibility was revealed by Tom Chothia and Vitaliy …
The state of encryption in Europe
It is a well know fact that IT employees are a special breed. They may be seen as overly paranoid and sometimes very singleminded and demanding about the issue of security and …
Digital fingerprints to identify hackers
How can you retaliate against a cyber attacker if you don’t know who he is? As we have witnessed lately, attribution of an attack is quickly becoming one of the biggest …
Hackers prey on Google workers’ friends
It has been discovered that the hackers who mounted the attacks on Google, Adobe and other companies recently breached, have targeted friends of employees that had access to …
US oil industry targeted by cyber attacks
It seems that the high profile breaches of Google and Adobe have been just the latest target in the Chinese march through US networks. ExxonMobil, Marathon Oil and …
The dangers of selling online
Buying online can get you scammed, for sure – but what about selling? You may think that you wouldn’t give up the item without seeing hard cash in your hand or the …
Deep packet inspection – illegal or not?
Virgin Media’s plan to monitor traffic on its networks to assess the percentage and nature of illegal file-sharing may be soon hitting a roadblock, since Privacy …
Using spam to beat spam
How to make a full-proof spam filter that will not block any of the legitimate email? A team at the International Computer Science Institute in Berkeley, California, and the …
Blippy, a great service for phishers?
Blippy, a new service that lets you twitter (blipper?) your recent purchases made with a credit card of your choice, could be a valuable tool for cyber criminals, warns …
Johnny Depp is not dead – but you might be infected
The fake news of the death of one of the most popular actors of today has been used by hackers to infect you with Trojans. According to Sophos’ Graham Cluley, the rumor …