Zeljka Zorz
McAfee Virus Scan Enterprise opens Linux machines to remote attackers
Security researcher Andrew Fasano has discovered a multitude of vulnerabilities in McAfee Virus Scan Enterprise product for Linux – vulnerabilities that can be chained …
Zcash mining software covertly installed on victims’ machines
Software “mining” the recently established Zcash (ZEC) cryptocurrency is being foisted upon unsuspecting users, Kaspersky Lab warns. The actual software is not …
New AirDroid releases fix major security issues
Popular AirDroid remote management tool for Android can now be used without worrying about malicious updates and data theft, its developers claim. What was the problem? Mobile …
Critical flaw opens Netgear routers to hijacking
Several Netgear router models can be easily hijacked by remote, unauthenticated attackers, CERT/CC has warned on Friday. The vulnerability that allows this takeover can be …
OpenVPN to get two separate security audits
VPN service Private Internet Access (PIA) announced that they have contracted noted and well-reputed cryptographer Dr. Matthew Green to perform a security audit of OpenVPN. …
Hackers stole technical trade secrets from German steelmaker
German-based ThyssenKrupp, one of the world’s largest steel producers, has announced that it has been the target of a cyber attack. The company said that the attack was …
Cybersecurity advice for the nuclear industry
Less complexity, an active defense, transformative research, and institutionalized cybersecurity should be nuclear industry’s key priorities to stem the rising tide of …
Announced: Independent OpenVPN security audit
VPN service Private Internet Access (PIA) has just announced that they have contracted noted and well-reputed cryptographer Dr. Matthew Green to perform a security audit of …
Cybersecurity gamification: A shortcut to learning
Cybersecurity awareness trainings are usually a boring affair, so imagine my colleagues’ surprise when I exited the room in which I participated in a demonstration of …
Popular smart toys violate children’s privacy rights?
My Friend Cayla and i-Que, two extremely popular “smart” toys manufactured by Los Angeles-based Genesis Toys, do not safeguard basic consumer (and …
80 Sony IP camera models come with backdoors
80 different models of Sony IPELA Engine IP Cameras have multiple backdoors that can be misused by attackers to take control of the device, disrupt its functionality, add it …
Nintendo offers up to $20,000 for bug info
Video game giant Nintendo has set up a bug bounty program through HackerOne’s platform, and is asking researchers to find and flag vulnerabilities in the Nintendo 3DS …
Featured news
Resources
Don't miss
- Ivanti EPMM exploitation: Researchers warn of “sleeper” webshells
- Microsoft begins Secure Boot certificate update for Windows devices
- Microsoft Patch Tuesday: 6 exploited zero-days fixed in February 2026
- That “summarize with AI” button might be manipulating you
- Groupe Rocher CISO on strengthening a modern retail cybersecurity strategy