Zeljka Zorz
NSA collects 200 million text messages a day
As the world awaits US President Obama’s official announcement of his plans for an NSA reform, The Guardian disclosed details of yet another NSA bulk data collection …
Bruce Schneier briefs US Congress on the NSA
Well known cryptographer and computer security expert Bruce Schneier has been called in to brief six members of the US Congress. The group, consisting of Representatives Zoe …
Researchers share more details about the Target POS malware
A handful of security companies have been researching the Target breach, and the information they unearthed is slowly trickling out to satisfy the public’s curiosity as …
Symantec seeks to patent technology for spotting malicious torrents
In most people’s minds, the concept of torrents is generally associated with pirated content. Despite this, everyone should know that BitTorrent is a file transfer / …
Malware used in Target breach sold on underground forums
Target continues to be rather tight-lipped about the circumstances of the massive user data theft and the breach of their networks that made it possible, but the few details …
Microsoft extends support for Win XP’s security solutions to mid-2015
Despite having announced earlier this month that they would stop providing signature updates for Security Essentials for Windows XP in April 8, 2014 – the same date when …
Starbucks iOS app stores passwords in clear text
A security researcher has discovered that Starbuck’s iOS mobile application stores users’ usernames, email address and passwords in clear text, and has tried to …
Scammers bypass protection mechanism, offer trojanized Minecraft Android app
Russian Android users who are looking to download the popular Minecraft game app from third-party app markets should be very careful, F-Secure researchers told PC Magazine, as …
User financial info compromised in US Fund for Unicef breach
The US Fund for Unicef, a non-profit NGO headquartered in New York, has notified the Office of the New Hampshire Attorney General that it had suffered a breach in November …
US Federal Court deals a blow to net neutrality
With a verdict of 3-to-0, judges of the US Court of Appeals for the District of Columbia Circuit have decided to strike down the Federal Communications Commission’s Open …
Target hackers shopping around for data decryption services?
The target breach and the massive amount of user information compromised in its wake is understandably worrying customers. But what are the odds of it being actually used by …
Equation determines the optimal moment for a cyber attack
Two researchers have developed a mathematical model for discovering the optimal moment to deploy specific cyber weapons in their arsenal. In a research paper recently …
Featured news
Resources
Don't miss
- Okta users under attack: Modern phishing kits are turbocharging vishing attacks
- One-time SMS links that never expire can expose personal data for years
- More employees get AI tools, fewer rely on them at work
- Energy sector orgs targeted with AiTM phishing campaign
- Exposed training apps are showing up in active cloud attacks