Zeljka Zorz
Proposed Wassenaar pact changes will harm cyber defenders instead of attackers
The comment period for the proposed amendments to the Wassenaar Arrangement regarding “cybersecurity items” has ended, and the overwhelming majority of the 150+ …
Microsoft plugs another Windows zero-day with emergency patch
Microsoft has released an emergency update that plugs a critical zero-day vulnerability (CVE-2015-2426) that affects all supported versions of Windows and could allow …
Free tools for detecting Hacking Team malware in your systems
“Worried that you might have been targeted with Hacking Team spyware, but don’t know how to find out for sure? IT security firm Rook Security has released Milano, …
Hackers hit UCLA Health, access medical files of 4.5 million patients
UCLA Health, the administrative structure which governs the University of California, Los Angeles (UCLA) hospitals, has suffered a data breach, and personal and medical …
Ashley Madison hacked, info of 37 million users stolen
Popular online cheating site Ashley Madison has been hacked, and personal information and financial records of 37 million of its users has apparently been compromised by the …
UK High Court declares emergency surveillance bill unlawful
On Friday, the UK High Court has declared Data Retention and Investigatory Powers Act (DRIPA) unlawful.DRIPA is an emergency legislation signed into law in July 2014, and its …
Google Safe Browsing to start blocking sites with ads leading to unwanted software
Ad networks that don’t vet carefully what ads they serve will be the next “victims” of Google’s Safe Browsing service.Since August 2014, Google has …
School monitoring software’s hard-coded encryption key exposed
Impero Software is the creator and seller of “Impero Education Pro”, a piece of software that’s used in many UK schools to monitor school computers for …
Hacking Team used fake app hosted on Google Play to install its spyware on Android devices
“The massive Hacking Team data leak includes the source code of a fake Android news app and instructions on how to use it, Trend Micro researchers have found. The app, …
Is this the death knell for the RC4 encryption algorithm?
It has been known for quite some time that the RC4 cryptographic cypher – used in popular Internet protocols such as TLS and HTTPS – is vulnerable to attack, but …
Researchers prove HTML5 can be used to hide malware
“A group of Italian researchers have come up with new obfuscation techniques that can be used to dupe malware detection systems and allow malicious actors to execute …
New GamaPoS malware targets US companies
“After dedicating their efforts to swelling the number of computers roped into their malicious net, the masters of the Andromeda botnet are putting it to use by …
Featured news
Resources
Don't miss
- Inside Microsoft’s veteran-to-tech workforce pipeline
- Brakeman: Open-source vulnerability scanner for Ruby on Rails applications
- Incident response lessons learned the hard way
- Okta users under attack: Modern phishing kits are turbocharging vishing attacks
- One-time SMS links that never expire can expose personal data for years