Zeljka Zorz
Synology NAS users hit with Cryptolocker variant
You know that your products are getting to be very popular when cybercriminals target users with a customized version of the Cryptolocker ransomware. The products in question …
Thousands of Mozilla developers’ emails, passwords exposed
Email addresses and encrypted passwords of tens of thousands of Mozilla developers were accidentally exposed and might have been harvested by malicious individuals, Stormy …
Retailers warned of attacks using hard-to-spot PoS malware
Retailers, beware: cyber crooks are increasingly targeting remote desktop applications by brute-forcing passwords, and are using that access to plant hard-to-detect PoS …
CIA chief admits agency employees hacked Senate computers
CIA Director John Brennan has confirmed that five CIA employees have, indeed, “improperly accessed” computers of Senate staffers and the computer network that was …
Targeted Cyber Attacks
Targeted cyber attacks against individuals, organizations, businesses, groups, and critical services happen every day around the globe. This book aims to tell you how …
Microsoft releases EMET 5.0
Microsoft has released version 5.0 of its Enhanced Mitigation Experience Toolkit (EMET), a free utility that uses a number of security mitigation techniques to prevent the …
Malicious USB device firmware the next big infection vector?
Researchers from German security consultancy SR Labs have created a whole new class of attacks that can compromise computer systems via ubiquitous and widely used …
Security contest rewards builders of secure systems
More often than not, computer security competitions come in the form of Capture The Flag (CTF) contests, and the emphasis is on breaking systems. This approach helps defenders …
BitTorrent’s decentralized chat app keeps content, metadata safe
BitTorrent, the company that develops the eponymous peer-to-peer protocol and two popular clients that use it, has announced the release of Bleep, an online communication …
0-days found in Symantec Endpoint Protection
While testing of the systems and networks of a financial services company, a team of penetration testers from Offensive Security have unearthed a number of vulnerabilities, …
IoT devices are filled with security flaws, researchers warn
We are living in an increasingly interconnected world, and the so-called Internet of Things is our (inescapable) future. But how safe will we, our possessions and our …
Free iPhone app for encrypted phone calls released
There is finally a free alternative for all iOS users who are looking to encrypt their voice calls: the app is called Signal, and has been developed by the Open Whisper …