Zeljka Zorz
A look at Interflow, Microsoft’s threat information exchange platform
In the last few years, there has been one constant call from almost all participants in the information security community: the call for cooperation. But that is easier said …
Critical Android code-execution flaw affects all but the latest version
IBM researchers have discovered a critical security vulnerability in Android 4.3 (Jelly Bean) and below which could allow attackers to exfiltrate sensitive information – …
Cops must get a warrant before looking through cellphone content
The nine judges of the US Supreme Court have unanimously ruled that law enforcement officers can’t search the contents of an arrested individual’s cell phone(s) …
Cryptome down, founder blames ISP
Cryptome, the well-known and long-lived online repository for information about freedom of speech, cryptography, spying, and surveillance, is down due to a potentially …
Atypical cloned banking app pops up on Google Play
An unusual instance of a cloned banking app has been spotted on Google Play by Lookout researchers: the app steals only the users’ ID, and leaves alone the password. The …
Drastic decline in vulnerable NTP servers due to Heartbleed?
In light of the escalation of DDoS attacks used as a means of extorting money from online businesses, the news that there has been a significant decrease in vulnerable Network …
Improperly anonymized taxi logs reveal drivers’ identity, movements
Software developer Vijay Pandurangan has demonstrated that sometimes data anonymizing efforts made by governments and businesses are worryingly inadequate, as he managed to …
Capabilities of “lawful interception” mobile malware revealed
Researchers from Russian AV company Kaspersky Labs and the Citizen Lab of the University of Toronto have released details about the mobile surveillance tools provided by …
Havex malware targets ICS/SCADA systems
F-Secure researchers have, for a while now, been monitoring the spreading of the Havex malware family and have been trying to determine who are the attackers that wield it. …
Dropbox-themed phishing is after multiple login credentials
Phishing emails purportedly leading users to a file hosted on Dropbox are targeting Yahoo!, Gmail, Hotmail, and Aol email users, warns Malwarebytes’ Jovi Umawing. …
Google forks OpenSSL: BoringSSL will be used in company products
Google has announced another OpenSSL fork. Dubbed BoringSSL, it will, in time, replace the OpenSSL library in various Google’s projects. “We have used a number of …
Cisco releases source code for experimental block cipher
A team of Cisco software engineers has created a new encryption scheme, and has released it to the public along with the caveat that this new block cypher is not ready for …
Featured news
Resources
Don't miss
- Unpatched Windows Server vulnerability allows full domain compromise
- Signal blocks Microsoft Recall from screenshotting conversations
- The hidden gaps in your asset inventory, and how to close them
- CTM360 report: Ransomware exploits trust more than tech
- Lumma Stealer Malware-as-a-Service operation disrupted