Zeljka Zorz
Threats 2.0: A glimpse into the near future
Collaboration and socializing, flexible and movable content, interoperability – these are all things that made Web 2.0 the answer to our needs. New technologies to …
Software testing firm says no to responsible disclosure
One of the most debated issues in the world of computer security will soon experience a moment of clarity that will prove one of the sides right. But which? Evgeny Legerov, …
Twitter plans to tighten security
Twitter announced it plans to hire 27 new people on jobs ranging from executive assistant to data analyst, software engineer to interaction designer. For a company as small as …
Secret DNA database in danger of breach
The Children’s University hospital in Temple Street, Dublin, has been the target of a theft of two computer servers back in 2007. They contained medical records of …
Fake Amazon email ships malware
The image of an open Amazon delivery box has a prominent place in the latest spam campaign that aims to trick users into downloading an alleged order update coming from the …
Rogue Android banking applications
Following a couple of announcements made in December by the likes of Travis Credit Union and First Tech Credit Union, a big brouhaha was raised about some mobile banking …
IRS spam campaign delivers malware
The end-of-year holidays have come and gone, and holiday scams are for the moment put on hold as tax season is approaching. TrendLabs warn about the latest spamming campaign …
Job seekers targeted by online scams
It’s hard times for job seekers around the world, made even harder by the fact that they have been heavily targeted by those who don’t have qualms about taking …
Privacy rights under attack
I think we can all agree about the fact that privacy has become an increasingly fluid concept with the advent of social networks. Yes, you can choose what you post, but your …
Your files held for ransom
F-Secure alerts about the latest scheme that tries to make you buy rogue software to “repair” your “corrupted” files. It starts when you get infected …
Can a router hack expose your physical location?
Remember the Samy worm? The author of the first major worm that took advantage of cross-site scripting to propagate itself all across MySpace has found and exploited another …
Hacking: The Next Generation
We have all been witnessing new kinds of attacks emerging thanks to new technologies and ways of using our computers and networks. The use of social media, an increasingly …