Zeljka Zorz
Malvertisers abused Yahoos ad network for days
“A large-scale malvertising attack abusing Yahoos ad network has been hitting visitors of the Internet giant’s many popular and heavy-traffic sites for nearly a …
Hackers actively exploiting OS X zero-day to root machines, deliver adware
“Attackers are actively exploiting a zero-day privilege escalation vulnerability affecting the latest version of Apple’s OS. The bug’s existence has been …
Macs can be permanently compromised via firmware worm
“Security researchers Xeno Kovah and Trammell Hudson have discovered several flaws in the firmware installed on Apple computers, and have created a worm that can …
Chrome extensions easily disabled without user interaction
Independent researcher Mathias Karlsson has discovered a vulnerability that can be exploited to disable Chrome extensions without user interaction.Apparently, the bug has …
Health records of 5.5 million US patients accessed in MIE breach
The Indiana Attorney General’s Office has launched an investigating into the recent breach suffered by Medical Informatics Engineering (MIE) and its subsidiary …
Hacker steals Bitdefender customer info, blackmails company
A hacker has managed to access a database containing usernames and passwords of customers of Romanian AV maker Bitdefender, and has tried to blackmail the company into paying …
Hospitals advised to stop using vulnerable computerized drug pumps
The US Food and Drug Administration has issued a safety communication warning healthcare facilities using the Hospira Symbiq Infusion System – a computerized pump made …
Fake “Windows 10 Free Upgrade” emails deliver ransomware
“It didn’t take long for malware peddlers to take advantage of the huge interest users have shown into Windows 10. The newest version of the popular software was …
US will revise Wassenaar pact changes
US Commerce Department’s Bureau of Industry and Security (BIS) will rethink the Wassenaar pact changes regarding “cybersecurity items” that it proposed and made …
Researchers devise passive attacks for identifying Tor hidden services
A group of MIT researchers have devised two attacks that could identify, with a high degree of certainty (88%), an anonymous hidden service or client.Hidden services are …
New Android bug can put devices into a coma
In the wake of the explosive discovery of the Android Stagefright vulnerability, Trend Micro researchers have revealed the existence of another, similar one that can make …
Researchers hack Linux-powered sniper rifle
When talking about the Internet of Things – “things” with an embedded computing system able to interoperate within the Internet infrastructure – we …
Featured news
Resources
Don't miss
- State-backed phishing attacks targeting military officials and journalists on Signal
- Poland’s energy control systems were breached through exposed VPN access
- CISA orders US federal agencies to replace unsupported edge devices
- Ransomware attackers are exploiting critical SmarterMail vulnerability (CVE-2026-24423)
- February 2026 Patch Tuesday forecast: Lots of OOB love this month