Zeljka Zorz
iPhone data harvesting from non-jailbroken devices
Nicholas Seriot, a HES software engineer and iPhone developer and trainer held a presentation 2 days ago in Geneva. The subject of the talk was iPhone privacy. He demonstrated …
Feds sued for withholding social network surveillance info
The Electronic Frontier Foundation, an international non-profit organization that is dedicated to the preservation of civil liberties related to the use of the Internet and …
Handing your encryption key to authorities: US vs. UK law
Two years ago, a US federal judge decreed that a criminal defendant can’t be coerced into giving up the encryption key to his encrypted hard drive because that would …
Wall Street Journal website vulnerable to SQL injection
A Romanian security researcher that goes by the handle “Unu” has made public his latest conquest. He managed to gain access to databases of the The Wall Street …
Facebook privacy changes
Facebook CEO Mark Zuckerberg addressed Facebook users via an open letter today, and announced a few changes aimed at improving the privacy settings and allow users more …
Privacy in the spotlight: 8 million reasons
There is an all-around media frenzy going on about the 8 million GPS location requests that Sprint Nextel received and automatically granted through a web portal to law …
Espionage 2.5.4
Espionage is a discreet tool that integrates seamlessly with Apple's Finder, and its main "reason of being" is to protect individual folders and applications by encrypting its …
Spam ring leader fined $16 million
Lance Atkinson, the Australia-based New Zealander that has been found guilty of organizing a spam ring along with American accomplice Jody Smith, has been fined with more that …
FreeBSD bug grants root access to unprivileged users
A FreeBSD exploit that grants OS root access to unprivileged users was published yesterday on the Full Disclosure mailing list by Nikolaos Rangos, a German researcher that has …
Scam victim psychology: What makes you vulnerable?
“Understanding scam victims: seven principles for systems security” is a paper by Frank Stajano, an associate professor with the Computer Laboratory of the …
Clientless SSL VPN products break browser security mechanisms
Clientless SSL VPN products from multiple vendors put users at risk of a variety of web-based attacks because they “break fundamental browser security mechanisms”. …
Bit.ly steps up security
Bit.ly, one of the most popular URL shortening services, announced it will be integrating three new security-related services by the end of the year: 1. Websense’s …