Zeljka Zorz
John McAfee releases secure messaging app
John McAfee (and, alternatively, his name) has long been a fixture in the security market. And, finally, after a considerable hiatus and crazy happenings, the man is back with …
EFF invites users to test online tracking blocker
The Electronic Frontier Foundation is on a mission: give users a tool that will help them disallow/block trackers contained within the Web pages they visit. They have been …
Android “Police Locker” ransomware set to attack
Android users might soon become victims of “Police Locker” ransomware, if they haven’t already, warns the researcher behind the Malware don’t need …
Researchers share details about recent IE 0-day exploit and its delivery
Given that Microsoft has closed the Internet Explorer 0-day vulnerability that was exploited to compromise US-based defense and financial firms, the Sourcefire vulnerability …
Researchers debunk severity of OAuth “Covert Redirect” bug
Late last week, a Ph.D. student at the Nanyang Technological University in Singapore made the information security world pause for a moment by claiming that he had found a …
Facebook unveils Anonymous Login
At the F8 developers conference on Wednesday, Facebook announced that users will soon be offered the choice to login to third-party apps anonymously. “People tell us …
Beware of “free Malwarebytes Anti-Malware 2.0” offers
As soon as the release of a new version of Malwarebytes’ popular AV solution has been announced, cyber crooks and scammers began exploiting the news. Hosted on random …
US bank customers targeted with vishing messages
Customers of a number of US banks have recently been hit by Voice over IP phishing (vishing) attacks orchestrated by eastern European cyber crooks, warns John LaCour, founder …
Microsoft updates IE against latest 0-day, updates also XP
Microsoft has issued an out of band security update to patch the zero day vulnerability that affects all versions of Internet Explorer and is being actively exploited in the …
Researcher says traffic control systems can be hacked
Hacking control systems that regulate traffic lights in United States’ big, gridlocked cities is not only possible in action films, but in reality as well, says Cesar …
New Android Trojan spreads like a worm
A new SMS Trojan with worm-like spreading capabilities has been spotted targeting Russian Android users. Dubbed “Samsapo,” the malware can also extract information …
AOL breach confirmed, bigger than initially thought
Recent spam emails apparently sent from AOL email addresses and hawking diet products are a direct consequence of a breach of the company’s networks and systems, AOL has …
Featured news
Resources
Don't miss
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground