Zeljka Zorz
Professional Penetration Testing, Second Edition
Are you interested in a career in penetration testing, and don't know where to start? Here is a book that gathers all the relevant information in one place, and gives a good …
SMS Trojan goes after digital wallets
Not satisfied with the money earned via mobile Trojans sending out text messages to premium numbers, cyber crooks have begun adding other money-stealing functionalities to the …
German police finds 18M stolen and misused account logins
Police in northwestern German city of Verden have discovered a collection of 18 million stolen email addresses and corresponding passwords that are being actively used to send …
CryptoDefense developers “forget” decryption key on victims’ computer
A new piece of ransomware is targeting gullible users, but its developers have made a critical mistake that should allow users to decrypt the affected files without paying the …
Barrett Brown signs (sealed) plea agreement
Barrett Brown, the American journalist that – among other things – is accused of crimes related to the Stratfor hack, has reached a plea agreement with US …
Record year for Facebook bug hunters
With nearly 15,000 submissions – 687 of which were valid and eligible for awards – 2013 has been a record year for Facebook’s bug bounty program. Add to this …
Yahoo encrypts traffic between data centers, plans for encrypted Messenger
Newly appointed Yahoo CISO Alex Stamos has announced on Wednesday that the company has begun fully encrypting all the traffic moving between its data centers. The move was …
Details for 30 Oracle Java Cloud Service flaws revealed
Polish security start-up Security Explorations has publicly released technical details and Proof-of-Concept code for 30 security vulnerabilities they found in Oracle Java …
Network Security Through Data Analysis
One of the most crucial tasks of a network administrator is to keep the network secure - or as secure as possible. In order to do this, they must know of which components the …
Cybercrooks target IoT devices to mine Bitcoins
The results of a recent investigation by SANS ISC CTO Johannes Ullrich are in: cybercriminals have been targeting a variety of Internet-of-Things devices and infecting them …
Coinbase denies security breach, defends spamming-friendly features
Popular Bitcoin exchange and online wallet service Coinbase has denied that it had suffered a breach and claims that the list of some 2,000 Coinbase user names and emails …
Tinder users targeted by spamming bots
Spammers are taking advantage of the popularity of the Tinder dating app to promote a game via bots posing as attractive women. For a week now users have been complaining of …
Featured news
Resources
Don't miss
- A new way to think about zero trust for workloads
- Heisenberg: Open-source software supply chain health check tool
- Securing real-time payments without slowing them down
- Unpatched Windows vulnerability continues to be exploited by APTs (CVE-2025-9491)
- CISA and partners take action as Microsoft Exchange security risks mount