Zeljka Zorz
Pinterest swaps T-shirts for money rewards in bug bounty program
After having migrated their online properties to HTTPS and having sorted out the main problems that arose from the move, Pinterest is ready to pay researchers for information …
Windows 10 will let you log in with your face and fingerprint
Windows 10 will be out this summer, available in 111 languages and in 190 countries around the world. In an effort to boost their (legal) numbers in China, Microsoft will …
Google aims to make Play Store safer, sets up human app review team
The time has come for Google to add some more hoops for Android app developers to jumpt through in order to get their offering accepted to the Google Play store. The first …
Personal, healthcare info of over 11M Premera customers compromised
US healthcare provider Premera Blue Cross has suffered a data breach that resulted in a potential compromise of personal, financial and health-related information of as many …
Payments via Facebook Messenger soon to be a reality
A few months from now, US-based users of Facebook’s Messenger app will be able to send and receive money via it for free, the company has announced on Tuesday. The …
Many Android and iOS apps still vulnerable to FREAK attacks
Your browser may no longer be vulnerable to FREAK attacks, but what about the mobile apps you use? According to FireEye researchers, who have tested the most popular apps both …
Search for vulnerable servers unearths weak, thousands-times repeated RSA keys
A group of researchers from the Information Security Group from Royal Holloway, University of London, wanted to see how many TLS servers still supported the weak, export-grade …
D-Link patches critical flaws in wireless range extender, Wi-Fi cameras firmware
D-Link has released new firmware for its DAP-1320 wireless range extender and the DCS-93xL family of Wi-Fi cameras in order to patch two critical vulnerabilities that can lead …
Deanonymizing Tor users with Raptor attacks
A group of researchers from Princeton University and ETH Zurich have found yet another way to deanonymize Tor users. “There are essentially two ways for an adversary to …
The Andromeda botnet is ballooning once again
Cybercriminals are, once again, trying to swell the number of computers compromised by the Andromeda backdoor. This will allow them to control the machines and download …
How Snowden’s revelations affected Americans’ communication habits and online activities
Nearly two years after news outlets started reporting on previously publicly unknown surveillance and data collection practices by the US NSA and its counterparts around the …
Exploit kits in 2015: What can we expect?
Since 2006, when the earliest exploit kit (WebAttacker) was made available in the crimeware market, these hack toolkits have become one of the preferred ways for cybercrooks …
Featured news
Resources
Don't miss
- SoundCloud breached, hit by DoS attacks
- The messy data trails of telehealth are becoming a security nightmare
- What Cloudflare’s 2025 internet review says about attacks, outages, and traffic shifts
- Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529)
- Kali Linux 2025.4: New tools and “quality-of-life” improvements