Zeljka Zorz
Tor usage more than doubles
Roger Dingledine, one of the original developers of Tor and current director of the Tor Project, has noted on the tor-talk mailing list that the number of Tor clients running …
Fake “Secure Document” notice will compromise your email account
Phishers have lately shown a penchant for using the “secure / confidential document / message” lure for making users share their login credentials. The latest …
New protection mechanism prevents mobile cross-app content stealing
A group of researchers from Indiana University and Microsoft Research have recently published a paper detailing the risk of cross-origin attacks on two of the most popular …
Researchers detail attacks for compromising Dropbox user accounts
Dropbox, the popular file hosting service that has managed to amass over 100 million users in the five years since it was launched, has had its fair share of problems: …
NYT, Twitter, HuffPo sites disrupted by Syrian hacker group
Hackers from the Syrian Electronic Army have managed to hijack, deface and / or make unavailable the websites of The New York Times, Huffington Post UK and one of Twitter …
G-20 themed emails deliver spying malware to EU, Canadian officials
The topic of the G-20 summit that is scheduled to be held in Russia next month is being misused by multiple cyber espionage groups some of which have been tracked to China, …
Open source encrypted email service reaches crowdfounding goal
Mailpile, the open-source web-mail client with user-friendly encryption whose developers have been asking for funding on Indiegogo, has surpassed its $100,000 goal three weeks …
How did Snowden steal the NSA documents and cover his tracks?
Many things have been unveiled by the documents leaked by NSA whistleblower Edward Snowden, but the question of how he managed to extract them from the agency’s internal …
Poorly redacted court filing reveals Google contested NSL gag order
A court filing that has been improperly redacted and has recently been made public by the US Department of Justice shows that Google asked a US court to remove the gag order …
Tech companies received millions for PRISM compliance costs
The NSA reimbursed the costs that Google, Facebook, Microsoft and Yahoo incurred for having to meet new certification demands following a FISC ruling about the …
Largest DDoS attack ever disrupts China’s Internet
The China Internet Network Information Center (CNNIC), which maintains the registry for the .cn, China’s country code top-level domain, has notified the public that two …
Leaked info of Federal Reserve employees was stolen during earlier breach
Hacker collective Anonymous has apparently leaked a file which supposedly contains personal details of every employee of the US Federal Reserve Bank – names, job titles, …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations