Zeljka Zorz
Court declares NSA’s domestic phone metadata collection program illegal
It took nearly two years, but three judges of a federal appeals court in New York have unanimously ruled that the bulk collection of telephone metadata associated with phone …
To what extent companies digitally track our daily lives?
Do you know how digitally collected information uncovers things about you which you would rather remained private? We’re already living in the age of Big Data, and are …
GPU-based malware is real, say developers of PoC rootkit and keylogger
“Two yet unfinished coding projects by a group of developers that call themselves Team Jellyfish have received unexpected attention due to an Ars Technica article …
Casino installs new POS equipment while investigating potential data breach
A few days after Las Vegas’ Hard Rock casino revealed that it has been hit by carders, another US casino has started an internal investigation aimed at finding out …
Millions of WordPress sites risk hijacking due to flaw in default theme
Guess what? Unless your site is hosted by one of 11 specific web hosts, it’s time to patch your WordPress installation again! Netsparker researchers have recently …
Researchers create searchable database of intelligence operators
The researchers behind Transparency Toolkit, a venture whose goal is to develop source software to collect and analyze publicly available data on surveillance and human rights …
Lenovo makes new critical security mistakes
After the Superfish debacle earlier this year, Lenovo’s security practices have once again been found lacking as researchers have discovered several vulnerabilities in …
Year-old flaw in popular WordPress plugin still actively exploited
Sucuri Security researchers have discovered yet another malicious campaign redirecting users to sites hosting exploits. As per usual, the attackers are mostly leveraging …
Netflix open sources FIDO, its automated incident response tool
Netflix has open sourced FIDO (Fully Integrated Defense Operation), a system for automatically analyzing security events and responding to security incidents that the company …
As Uber account compromises continue, company says they weren’t breached
Transport service company Uber has had its fair share of problems through the years, but lately instances of hacked accounts and fraudulently booked trips seem to have …
Company invokes DMCA to block researcher from disclosing flaws in its product
Electronic lock maker CyberLock has attempted to prevent IOActive from releasing information about a host of security flaws they discovered in its product of the same …
Windows 10 spells the end of Patch Tuesday
Microsoft is ready to abandon the longstanding patching schedule that saw patches and security updates being delivered on the second Tuesday of every month. With the advent of …
Featured news
Resources
Don't miss
- Popular code formatting sites are exposing credentials and other secrets
- Fake “Windows Update” screens fuels new wave of ClickFix attacks
- Microsoft cracks down on malicious meeting invites
- How an AI meltdown could reset enterprise expectations
- The breaches everyone gets hit by (and how to stop them)