Zeljka Zorz
Snowden social-engineered co-workers to share their passwords
The revelations stemming from the documents exfiltrated by former NSA contractor Edward Snowden have changed the way we look at many things, but the details that have been …
Cryptolocker surge directly tied with Blackhole downfall
The recent emergence of Cryptolocker as one of the most widespread, visible and deadly threats is directly tied to the arrest of “Paunch”, the creator of the …
Bitcoin wallet service hacked, 4,100 Bitcoins stolen
A daring hack and heist targeting online Bitcoin wallet service Inputs.io has resulted in the theft of 4,100 Bitcoins (currently over $1.3 million) and has left some of the …
Cyber threats organisations will deal with in 2014
The threat landscape is constantly evolving, and it’s an enterprise’s job and duty to keep up with the changes and do the best it can to protect its data, …
Silk Road 2.0 goes online
As announced by well-known Silk Road user named “The Godfather”, who has been doing business on the infamous underground market for the last few years, another …
Microsoft and Facebook start Internet-wide bug bounty program
Dubbed The Internet Bug Bounty, it is sponsored by the two Internet giants and is aimed at anyone who discovers vulnerabilities in a series of open source programming …
Another Android “master key” bug revealed
The existence of another “master key” bug that can be used to push malware onto Android users has been publicly disclosed by Jay Freeman (a.k.a Saurik), the …
Svpeng Android banking Trojan goes phishing
The Android banking Trojan known as Svpeng has been improved by its creators and is now capable to perform phishing attacks as well as stealing money directly from a …
TrueCrypt to go through a crowdfunded, public security audit
After all the revelations about NSA’s spying efforts, and especially after the disclosure of details about its Bullrun program aimed at subverting encryption standards …
Malware peddlers testing new infection techniques
An ongoing malicious spam campaign impersonating UPS has shown that malware peddlers are experimenting with different approaches for infecting hapless users, and additional …
Apple releases cleverly framed report on government data requests
Apple has released what will be the first of many biannual reports on government information requests it receives, and has included a statement saying that “Apple has …
Can a Swiss cloud give users complete privacy?
Telecom provider Swisscom has announced its plans to set up a “Swiss cloud” that would give both Swiss and later foreign users some peace of mind regarding whether …
Featured news
Resources
Don't miss
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground
- Open source has a malware problem, and it’s getting worse