Zeljka Zorz
Record year for Facebook bug hunters
With nearly 15,000 submissions – 687 of which were valid and eligible for awards – 2013 has been a record year for Facebook’s bug bounty program. Add to this …
Yahoo encrypts traffic between data centers, plans for encrypted Messenger
Newly appointed Yahoo CISO Alex Stamos has announced on Wednesday that the company has begun fully encrypting all the traffic moving between its data centers. The move was …
Details for 30 Oracle Java Cloud Service flaws revealed
Polish security start-up Security Explorations has publicly released technical details and Proof-of-Concept code for 30 security vulnerabilities they found in Oracle Java …
Network Security Through Data Analysis
One of the most crucial tasks of a network administrator is to keep the network secure - or as secure as possible. In order to do this, they must know of which components the …
Cybercrooks target IoT devices to mine Bitcoins
The results of a recent investigation by SANS ISC CTO Johannes Ullrich are in: cybercriminals have been targeting a variety of Internet-of-Things devices and infecting them …
Coinbase denies security breach, defends spamming-friendly features
Popular Bitcoin exchange and online wallet service Coinbase has denied that it had suffered a breach and claims that the list of some 2,000 Coinbase user names and emails …
Tinder users targeted by spamming bots
Spammers are taking advantage of the popularity of the Tinder dating app to promote a game via bots posing as attractive women. For a week now users have been complaining of …
Passwords, messages of 158k+ Boxee.tv users leaked
The forum database of Web TV service Boxee.tv has been ransacked and the attacker made off with – and has subsequently made available for download – a dump …
Fake Bitdefender Antivirus Plus 2015 offers lead to malware and scams
Scammers are taking advantage of Bitdefender’s good reputation and are luring victims in with promises of free downloads of “Bitdefender Antivirus Plus …
NSA and GCHQ spied on German satcomms, world governments’ leaders
Another week, another explosive revelation coming from Edward Snowden’s archive of NSA documents. This time they reveal the widespread compromise of several German …
Additional NSA-backed code found in RSA crypto products
A group of professors and researchers from several universities in the US and the Netherlands have tested the exploitability of various implementations of the infamous …
Mylar: A system that protects data against server-side snooping
A group of researchers from the Massachusetts Institute of Technology and Meteor Development Group have created a system for building Web services that woud protect data …
Featured news
Resources
Don't miss
- Product showcase: Secure digital and physical access with the Swissbit iShield Key 2
- Trojanized KeePass opens doors for ransomware attackers
- Closing security gaps in multi-cloud and SaaS environments
- Containers are just processes: The illusion of namespace security
- Why legal must lead on AI governance before it’s too late