Zeljka Zorz
Carders use custom built POS malware to hit US retailers
Crypto-ransomware might be the most prominent type of malware these days, but that doesn’t mean that criminals have stopped using other kinds. According to FireEye …
New alerts for Gmail users targeted by state-sponsored attackers
Since 2012, Google has been warning Gmail users when they have been targeted by state-sponsored attackers, but now the alert will be even more visible (and therefore less …
Petya ransomware encrypts files, disks, locks users out of computers
A new type of ransomware does not only encrypt the victims’ files, but also their disk’s Master File Table (MFT), and it replaces the boot drive’s existing …
Printers all over the US “hacked” to spew anti-Semitic fliers
Andrew “Weev” Auernheimer, one of the two men who were prosecuted and convicted for harvesting e-mails and authentication IDs of 114,000 early-adopters of Apple’s iPad from …
US govt has unlocked San Bernardino gunman’s iPhone
The US Department of Justice has found a way to get into the iPhone 5C owned by Syed Farook, one of the San Bernardino shooters. With a short status report filed with the …
Facebook testing new features to prevent user harassment
Facebook is testing three new features that should help prevent or at least minimize harassment of users on its platform. The first will alert users if someone tries to …
OS X zero day bug allows hackers to bypass system integrity protection
An OS X zero day vulnerability could allow attackers to bypass System Integrity Protection, Apple’s newest protection feature, and to escalate their privileges, simplifying …
Emergency Java update plugs system compromise hole
Oracle has issued an emergency security update for Java to plug a critical flaw (CVE-2016-0636) that could be exploited by luring users to visit a web page hosting the …
RCE flaw affects DVRs sold by over 70 different vendors
RSA security researcher Rotem Kerner has discovered a remote code execution vulnerability that affects digital video recorders (DVRs) sold by more than 70 different vendors …
Cheap radio attack can be used to unlock and steal 24 car models
A group of researchers from ADAC, the largest automobile club in Germany and Europe, have demonstrated how the keyless “comfort locking” system used by most …
How to block malicious macros for good?
Microsoft is finally doing something about the increasing threat of malicious macros: it has added a new feature in Office 2016 that will block macros from loading in certain …
Tor Project exploring ways to keep its software and users safe
In view of the recent legal battle between the FBI and Apple regarding phone encryption, and this article revealing that there have been many instances where the US Department …
Featured news
Resources
Don't miss
- Microsoft reveals actively exploited Office zero-day, provides emergency fix (CVE-2026-21509)
- When open science meets real-world cybersecurity
- Poland repels data-wiping malware attack on energy systems
- Inside Microsoft’s veteran-to-tech workforce pipeline
- Brakeman: Open-source vulnerability scanner for Ruby on Rails applications