Zeljka Zorz

Malvertising campaign compromises routers instead of computers
The DNSChanger exploit kit is back and more effective than ever, and is being used in a widespread malvertising attack whose goal is to compromise small/home office routers. …

Evernote employees will be able to read notes only if users allow it
Evernote has recently announced that, starting on January 23, 2017, Evernote users’ unencrypted notes will be accessible to some Evernote employees. The change to the …

One billion users affected in newly revealed Yahoo hack
Yahoo has revealed that it’s been the victim of another hack and massive data breach that resulted in the compromise of information of a billion users! What happened? …

Google publishes eight national security letters
Have you ever wondered what a national security letter (NSL) received by Google looks like? Well, wonder no more, as the Internet giant has published eight of them. Along with …

Joomla vulnerability can be exploited to hijack sites, so patch now!
If you’re running a website on Joomla, you should update to the newly released 3.6.5 version as soon as possible – or risk your site being hijacked. The newest …

ENISA says crypto backdoors are a bad idea
“History has shown that technology beats legislation, and criminals are best placed to capitalise on this opportunity,” the European Network and Information …

Corporate Office 365 users hit with clever phishing attack
Corporate Office 365 users are being targeted by phishers using a clever new trick to bypass email filters and the default security protections of the Microsoft service. The …

Netgear pushes out beta firmware for vulnerable router models
Netgear has confirmed that eight of its router models are vulnerable to device hijacking due to a vulnerability that can be easily exploited by remote, unauthenticated …

More Android-powered devices found with Trojans in their firmware
Doctor Web researchers have discovered two types of downloader Trojans that have been incorporated in the firmware of a number of Android-powered devices. Both Trojans are …

McAfee Virus Scan Enterprise opens Linux machines to remote attackers
Security researcher Andrew Fasano has discovered a multitude of vulnerabilities in McAfee Virus Scan Enterprise product for Linux – vulnerabilities that can be chained …

Zcash mining software covertly installed on victims’ machines
Software “mining” the recently established Zcash (ZEC) cryptocurrency is being foisted upon unsuspecting users, Kaspersky Lab warns. The actual software is not …

New AirDroid releases fix major security issues
Popular AirDroid remote management tool for Android can now be used without worrying about malicious updates and data theft, its developers claim. What was the problem? Mobile …
Featured news
Resources
Don't miss
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations
- How Kim Crawley challenges big tech in “Digital Safety in a Dangerous World”
- Google strengthens secure enterprise access from BYOD Android devices