Zeljka Zorz
Attack detectors on CPUs expose backdoors
How can you be sure that the CPU on your computer hasn’t been tampered with and is not stealthily collecting your data for someone else to use? Adam Waksman and Simha …
Counterfeit consumer electronics
Most people believe that if you want to be sure that you got an original product, you must buy it from a reputable retailer – especially if that product is an electronic …
Laptop theft exposes data on 207,000 army reservists
Personal data on 207,000 U.S. army reservists has recently been stolen along with three laptops from the offices of a government contractor (Serco Inc.). The U.S. Army Reserve …
Facebook’s changes clash with Europeans’ expectations of privacy
Europeans are well-known for their high privacy expectations and demands. Another proof of that is a letter that the Article 29 Working Party (an independent European …
Unsolicited fake CVs distributing malware
The global recession has brought a shortage of jobs, but job seekers are not the only ones who are targeted by malicious emails and scams. TrendLabs has recently spotted an …
FacebookDigits phishing scam
Facebook users have lately been targeted lately by a clever phishing scam. The phishing website, whose looks evoke those of the social network, is trying to convince potential …
WordPress users under attack
WordPress-based websites have once again become the target of attacks. This time around, the hacked websites are hosted by various ISPs: DreamHost, GoDaddy, Media Temple and …
Filename-changing worm wiggling on P2P networks
Worms using P2P networks to propagate have one big problem: they are usually masquerading as software, key generators, or cracks, but have hard-coded file names, which means …
A closer look at LastPass
LastPass (v. 1.68.2) is a multi-platform, multi-browser password manager and form filler. You can use it on Windows, Mac OS or Linux; with IE, Firefox, Safari or Chrome. I …
The KHOBE attack: Are all AV solutions vulnerable?
Dubbed an “8.0 earthquake for Windows desktop security software” by its creators, the KHOBE (Kernel Hook Bypassing Engine) or the argument-switch attack has been …
Security hole in Yelp Instant Personalization
A never-ending string of privacy glitches and bugs has struck Facebook since the implementation of its highly controversial Instant Personalization feature. This latest …
Twitter gain-more-followers scam
It seems that many Twitter users are desperate for additional followers, and they are willing to take offered shortcuts to achieve that goal. Enter the bogus …
Featured news
Resources
Don't miss
- Building the missing layers for an internet of agents
- What security leaders should watch for when companies buy or sell a business
- Malicious Rust packages targeted Web3 developers
- Max-severity vulnerability in React, Node.js patched, update ASAP (CVE-2025-55182)
- Smart grids are trying to modernize and attackers are treating it like an invitation