Zeljka Zorz
Hackers can tamper with medical drug pumps, leading to fatal outcomes
Researcher Billy Rios has discovered serious vulnerabilities in several types of drug infusion pumps manufactured by US-based company Hospira – vulnerabilities that can …
On Windows 10, apps can actively defend users from malware
“With Windows 10, Microsoft will be adding a new layer of protection against dynamic script-based malware and non-traditional avenues of cyberattack: the Antimalware …
Users care about their privacy, but feel powerless to protect it
Users are resigned to the loss of privacy, but not because they feel they are getting good value for their data, but because they believe marketers will eventually get it …
iOS 9 will use 6-digit passcodes for enhanced protection
Among the improvements that Apple announced for iOS 9 on Monday, there are some security enhancements as well.The most important one is the switch from 4-digit to 6-digit …
IoT is full of gaping security holes, says Shodan creator
John Matherly’s Shodan, a search engine that finds Internet-connected devices, can be used for many things: gauging the impact of policies and network security efforts …
Antiquated environment and bad security practices aided OPM hackers
By now, you’ve all heard about the massive breach at the US Office of Personnel Management’s (OPM), and that the attackers have accessed (and likely made off with) …
MalumPoS can be customized to target different systems
“A new Point-of-Sale RAM scraper is being offered for sale, and is currently designed to collect data from a very specific type of PoS systems: those running on Oracle …
Personal info of 4 million US government workers compromised in OPM breach
Approximately 4 million US federal employees, both current and former, will start receiving a breach notification alerting them that their personal information has potentially …
Discovering connections between attackers
In the last few years, Pedram Hayati, founder of Australian IT company Security Dimension, has been developing a custom honeypot intelligence system called Smart Honeypot. …
Microsoft will add SSH support to PowerShell
Third time’s the charm for Microsoft’s PowerShell team, as they will – after two previous attempts unsuccessful due to leadership and culture – finally …
Dyre banking Trojan infections more than doubled
“Cybercriminal interest in online banking continues to grow, and crooks wielding the Dyre/Dyreza banking Trojan continue spewing out spam emails delivering a new variant …
How to raise users’ expectations about security and privacy?
Users do not seem to care much about privacy and security. When buying a new smartphone, for example, they rarely ask about security updates and how long the device will be …
Featured news
Resources
Don't miss
- AWS launches new cloud security features
- Chaining two LPEs to get “root”: Most Linux distros vulnerable (CVE-2025-6018, CVE-2025-6019)
- Kernel-level container insights: Utilizing eBPF with Cilium, Tetragon, and SBOMs for security
- AI is changing cybersecurity roles, and entry-level jobs are at risk
- From cleaners to creepers: The risk of mobile privilege escalation