Zeljka Zorz
Google settles Safari user tracking case, will pay $17 million
A settlement has been reached to end the lawsuit filed by 37 US states and the District of Columbia against Google because the Internet giant has been found bypassing …
1.2% of apps on Google Play are repackaged to deliver ads, collect info
Not a month goes by without security researchers finding new malicious apps on Google Play. According to BitDefender, more than one percent of 420,000+ analyzed apps offered …
Google broadens Patch Rewards Program
Google has announced the expansion of its recently unveiled Patch Reward Program, which urges security researchers to submit patches for third-party open source software …
Bogus PS4 and Xbox One giveaways popping up
Just in time for the upcoming holidays and gift-giving, Sony has released PlayStation 4 last week and Microsoft is set to release Xbox One next week. But online scammers are …
Facebook scammers impersonate missing persons org to harvest “likes”
Creating a Facebook page, making it popular and followed by many by using a number of approaches, then finally selling it to the highest bidder that’s interested in …
vBulletin.com hacked, hackers trying to sell info on 0-day used
The developers of popular Internet forum software vBulletin have announced late on Friday that their network has been attacked and successfully breached, and that the hackers …
Netflix users in danger of unknowingly picking up malware
Users of Silverlight, Microsoft’s answer to Adobe Flash, are in danger of having malware installed on their computers and being none the wiser, as an exploit for a …
Anonymous hacker sentenced to 10 years in prison
Jeremy Hammond (aka “Anarchaos”), the Anonymous hacker that earlier this year pleaded guilty to conspiracy and hacking charges regarding the much publicized breach …
Safari, Chrome and Samsung Galaxy S4 taken down in Mobile Pwn2Own
Results from the second annual Mobile Pwn2Own competition ending today at PacSec Applied Security Conference in Tokyo, Japan, are in: the successful compromises include …
Spam campaign doubles on threats
Some malware peddlers might be moving on from using the Blackhole exploit kit to deliver malicious code, but others are still not ready to give up on it, as proven by a spam …
Compromised Adobe accounts include military and government users
The Adobe hack is truly gargantuan, what with all the stolen source code of a number of extremely popular software and the exfiltrated database containing user email …
Microsoft announces retiring of SHA-1
Along with the standard security advisories released on this month’s Patch Tuesday, Microsoft has also released a few that announce the company’s intention to …
Featured news
Resources
Don't miss
- CTM360 maps out real-time phishing infrastructure targeting corporate banking worldwide
- Malicious RVTools installer found on official site, researcher warns
- AI hallucinations and their risk to cybersecurity operations
- Why EU encryption policy needs technical and civil society input
- Hanko: Open-source authentication and user management