Zeljka Zorz
Equation determines the optimal moment for a cyber attack
Two researchers have developed a mathematical model for discovering the optimal moment to deploy specific cyber weapons in their arsenal. In a research paper recently …
Trust but verify: Mozilla execs invite researchers to audit their code
The recent revelations about NSA surveillance efforts, and especially the claims that the agency has been persuading or forcing software developers to put in backdoors into …
Bitcoin cold storage and insurance services sprout
The pros and cons of using and investing in Bitcoin and crypto currency in general are no longer a mystery, and solutions to some of the problems are being presented almost …
Fake Target breach notification leads to phishing and complex scams
The extensive Target breach has resounded far and wide in US media, and its customers should worry about their personal or credit card information being misused. After the …
Neiman Marcus, three other US retailers breached
In the wake of the revelations that US retail giant Target has been targeted by cyber thieves comes the news that American luxury department store Neiman Marcus has also …
Sefnit Trojan endangers users even after removal
Remember when in late August 2013 the Tor anonymity network was hit with a sudden and massive influx of active clients connecting to it? It was later discovered that the spike …
EU committee asks Snowden to testify via video link
With an overwhelming vote of 36-to-2 (plus one abstention), the members of the European Parliament’s Justice and Civil Liberties Committee have decided to extend an …
Fake “Critical browser update” warnings lead to malware
If you have manually updated your browser in the last week or so, think back on how you did it. Did you look for the update yourself, or did you download one after being faced …
Bitcoin-stealing malware delivered via clever email campaign
Users of popular Bitcoin exchanges are being actively targeted by cyber crooks looking to syphon funds out of their digital wallets. When cyber crooks are looking to infect as …
Fake AV served to Dailymotion visitors via malicious ads
The extremely popular video-sharing website Dailymotion (dailymotion.com) has been found serving malicious ads that trigger fake infection warnings and try to make visitors …
Yahoo Mail now has HTTPS on by default
With a short blog post, Yahoo’s SVP of Communication Products Jeff Bonforte has announced that the company has started encrypting all connections between their users and …
NSA employee will remain as co-chair on crypto standards group
NSA employee Kevin Igoe will continue to be one of the two co-chairs of the Crypto Forum Research Group (CFRG), which helps the Internet Engineering Task Force (IETF) review …
Featured news
Resources
Don't miss
- CTM360 maps out real-time phishing infrastructure targeting corporate banking worldwide
- Malicious RVTools installer found on official site, researcher warns
- AI hallucinations and their risk to cybersecurity operations
- Why EU encryption policy needs technical and civil society input
- Hanko: Open-source authentication and user management