Zeljka Zorz
Malicious tweets keep coming and changing
There is no end in sight for malicious postings on Facebook and Twitter. And although Facebook has become quite adept at spotting them and blocking the malicious links …
Sign of the times: Social engineering contest at Defcon
It is a well known fact that Defcon regularly organizes capture-the-flag-style contests that see hackers pitted against each other in an effort to protect their own systems …
Fake Facebook account deactivation email
Sunbelt reports that in a spam run that may at first glance appear to be a phishing attempt aimed at getting your login credentials, mailboxes around the world have been …
U.S. intelligence analyst arrested for passing on classified items to Wikileaks
A 22-year old Army intelligence analyst from Maryland has been arrested by U.S. Federal officials two weeks ago after he boasted about providing Wikileaks with combat videos …
Critical Adobe Flash, Reader 0-day flaw exploited in the wild
A zero-day flaw affecting 10.0.x and 9.0.x versions of Adobe Flash Player – including the current version, which is 10.0.45.2 – has been spotted being exploited in …
Rootkits on Android smartphones
As our mobile phones get “smarter” and our personal and professional lives get increasingly mobile, the possibility of these devices getting compromised and the …
Facebook fights rogue apps with verification program
In view of all the rogue applications that have lately targeted Facebook users, the announcement that the social network will require developers to verify their Facebook …
U.S. Senators keep trying to give “cyber emergency” powers to federal government
Not so long ago, a simulated cyber attack showed the unpreparedness of the United States to deal effectively with such an occurrence. When the officials “playing” …
Europe finds search data retention policies inadequate
The Article 29 Data Protection Working Party (an independent European Commission advisory body) has lately been much in the news, owning to their interest towards protecting …
Samsung smartphone shipped with malware-infected memory card
The latest mass-market product that has been found being shipped to customers while containing malware is the Samsung S8500 Wave phone with the Samsung bada mobile platform. …
Payment processing security trends in the catering industry
The catering industry has for some time now emerged as one of the businesses most affected by security breaches and card and identity theft. In reply to the increased threat, …
Users of Habbo Hotel virtual world hit by thieves
If you’re not an online gamer or a user of virtual worlds, it is easy to make light of the occasional news of account hijacking or thefts of virtual goods or money. …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits