Zeljka Zorz
Yahoo Mail accounts compromised in coordinated attack
Unknown attackers have attempted to access a number of Yahoo Mail accounts, the company warned on Thursday, and urged users to change their passwords even if they …
GitHub sets up bug bounty program
GitHub is the latest service to announce that they have started a security bug bounty program. “The idea is simple: hackers and security researchers find and report …
Beware of bogus Google “Suspicious sign-in prevented” emails
A very convincing phishing attempt aimed at harvesting users’ Google account credentials has been spotted by a security researcher (click on the screenshot to enlarge …
How to recover deleted or corrupted digital currency
The popularity of Bitcoin and other digital / cryptographic currency cannot be denied. Different users like using it for different reasons, but many agree that the question of …
“Honey Encryption” overwhelms attackers with fake results
Former RSA chief scientist Ari Juels is working on an innovative approach at encryption that could make cyber crooks’ like a lot more difficult. This new encryption …
New details about Target breach come to light
As data dumps of cards stolen in the Target breach continue to be sold on underground cybercrime forums, and the stolen information is being used to perform unauthorised …
Angry Birds website defaced by “anti-NSA” hacker
The official website of the popular Angry Birds game by Finnish company Rovio has been briefly defaced on Tuesday night, and has been made to sport the following image: The …
VPN bypass attack possible also on Android KitKat
Security researchers at Ben Gurion University in Israel are on a roll when it comes to discovering Android security flaws, and they revealed the existence of a critical flaw …
Java-based malware hits Windows, Mac and Linux
Kaspersky Lab researchers have recently analysed a piece of malware that works well on all three of the most popular computer operating systems – the only thing that it …
Android bootkit infects 350,000 devices
The first ever Android Trojan with bootkit capabilities has been discovered and analysed by Dr.Web researchers, who warn that the malware is already operating on some 350,000 …
Feds cloned TorMail server with future investigations in mind
TorMail users engaged in illegal activities might have felt more than a twinge of anxiety when it was confirmed last summer that the FBI took control of Freedom …
Fully functional trojanized FileZilla client steals FTP logins
Trojanized versions of the hugely popular FileZilla FTP client are being offered to unsuspecting users via hacked websites with fake content. “Malware installer GUI is …
Featured news
Resources
Don't miss
- CTM360 maps out real-time phishing infrastructure targeting corporate banking worldwide
- Malicious RVTools installer found on official site, researcher warns
- AI hallucinations and their risk to cybersecurity operations
- Why EU encryption policy needs technical and civil society input
- Hanko: Open-source authentication and user management