Zeljka Zorz
Cryptolocker crooks offer victims a second chance
The criminals behind Cryptolocker, the destructive ransomware that has lately been targeting mostly US and UK PC users, are trying to earn more money by offering users who …
US agency employees let invented woman expert into the network
Once again, and more spectacularly, security researchers have proved that attackers wielding a fake LinkedIn account sporting the image of an attractive woman claiming to be …
Fake LinkedIn profile gathering info for targeted attacks
Social networks are great sources of information for cyber criminals and a great way to enter the potential victims’ circle of trust. An ongoing social engineering …
US Senate committee backs law to continue phone-record collection
A few days after a bill seeking to end the government’s dragnet collection of phone records has been introduced by US Senator Patrick Leahy and Congressman Jim …
Lavabit and Silent Circle to create email impervious to snooping
The founders of recently shut down encrypted email service Lavabit and encrypted communications firm Silent Circle have announced the creation of the Dark Mail Alliance, a …
NSA taps cables connecting Google and Yahoo data centers
The US NSA and its UK counterpart GCHQ have collaborated in tapping the overseas fiber-optic cables used by Google and Yahoo to exchange data stored in their many data centers …
Counterfeit money detector easily hacked to accept fake money
A lot of simple electronic devices that we use every day can be easily hacked, because security has for a long time been at the very bottom of the list of things to care about …
Russia handed malware-laden devices to G20 delegates?
At the G20 summit held near St. Petersburg in September, attending delegates representing the 20 most powerful nations in the world have been handed gifts that included …
Obama orders NSA to stop spying on UN diplomats
There is nothing wrong with spying on foreign national leaders, even when they are allies, said NSA head General Keith Alexander and NI director James Clapper at a hearing …
AmEx users targeted with well-crafted phishing scheme
A rather well-executed phishing campaign is targeting American Express users via fake “Fraud Alert: Irregular Card Activity” emails impersonating the AmEx Fraud …
Syrian hackers hijack Obama’s tweets
The Syrian Electronic Army has apparently managed to modify tweets from Barack Obama’s official Twitter account to include links to a pro-Assad video, as well as …
Photoshop source code stolen, 38M users affected in Adobe hack
Remember the successful attack against Adobe’s networks made public earlier this month? Well, as it turns out, the damage is larger than initially thought. Early results …
Featured news
Resources
Don't miss
- AI hallucinations and their risk to cybersecurity operations
- Why EU encryption policy needs technical and civil society input
- Hanko: Open-source authentication and user management
- Inside MITRE ATT&CK v17: Smarter defenses, sharper threat intel
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)