Zeljka Zorz
Android smartphones pre-installed with malware hit the market
Cheap Android-based smartphones pre-installed with spyware are being distributed to European users, experts from German security vendor G Data are warning. The malware is …
GCHQ legally intercepts Google, Facebook users’ communications
A successful legal challenge has forced the UK’s top counter-terrorism official to reveal the (until now) secret government policy that allows the GCHQ to intercept …
Hacker nets over $600k by compromising NAS systems to mine Dogecoin
A single threat actor is responsible for the compromise of a considerable number of Synology NAS systems that were set to mine Dogecoing in secret and have netted him over …
There’s a new banking Trojan in town
A new piece of banking malware is being delivered via tax- and invoice-themed phishing campaigns, Danish security company CSIS is warning. Dubbed “Dyreza,” the …
Java program to reverse Android ransomware damage
University of Sussex student Simon Bell has reverse-engineered the Android Simplocker (Simplelocker) ransomware, and has created a Java program that can be converted into an …
A new defense against kernel-mode exploits
Over the past many years, there’ve been a plethora of security solutions available for Windows-based endpoints, but most of them are helpless against malicious code …
Being a CISO at a higher education institution
In this interview, Matt Santill, CISO of Broward College, talks about the requirements and peculiarities of his job, the technologies the college uses to make its network …
Use your own encryption keys for Amazon S3 storage
Amazon Web Services has some good news for users of S3, its popular online file storage web service: they can now use their own encryption keys to protect their data at rest. …
Microsoft says user content won’t be used for targeted advertising
Microsoft has announced several changes to its Microsoft Services Agreement (MSA), and the most important one is that they have now put in writing that they are not using …
Fake, malicious World Cup-themed apps targeting Android users
The 2014 FIFA World Cup in Brazil start today, and Trend Micro researchers have pointed out yet another thing that fans need to be careful about: fake and malicious versions …
Tool for creating booby-trapped PDFs made public
Freelance security researcher Claes Spett has made available a tool he dubbed “PDF Exploit Generator,” which allows penetration testers – but also malicious …
The state of GRX security
Late last year, documents from Edward Snowden’s NSA trove have revealed that Britain’s GCHQ has mounted a successful attack against Belgacom (the largest telecom …