Zeljka Zorz
Hijacking ships and planes with cheap GPS spoofers and laptops
After demonstrating a successful GPS spoofing attack against a drone (UAV – unmanned aerial vehicle) last June, Cockrell School of Engineering Assistant Professor Todd …
Apple Dev Center partially back online, still no details about the hack
Parts of the Apple Developer Center are back online after a week long outage caused by an unnamed intruder that has “attempted to secure” personal information of …
Pinterest joins Twitter in supporting Do No Track
Pinterest, the popular pinboard-style photo-sharing website, has announced a couple of big changes, and among them is the Do Not Track (DNT) feature. “We want you to …
The future of phishing: Credit card redirection
Cyber crooks will go at great lengths to get their hand on users’ credit and debit card information. Usually they try to trick them with spoofed emails that lead to …
Stanford University suffers another data breach
Stanford University has suffered another IT breach, and while its scope is yet to be determined, all users of the university’s computer system are advised to change the …
US SEC data leak shows lax data access practices
When a former employee of the US Securities and Exchange Commission left the organization for a job with another federal agency, he “inadvertently and unknowingly” …
Feds to web firms: Hand over encryption keys and user passwords
The US government and its intelligence and law-enforcement agencies have apparently been trying to get Internet firms to hand over both their users’ account passwords …
TOR-based botnets on the rise
Keeping their botnet’s C&C centers online is crucial for bot herders, so that they can keep taking advantage of the computers they zombified. But given that cyber …
US lawmakers shoot down legislation for limiting NSA spying
An amendment to the Department of Defense Appropriations Act of 2014 that would curtail funding for NSA’s collection of electronic communication data in cases where the …
DHS to set up “cybersecurity shop” for govt agencies
The US Department of Homeland Security has been tasked with setting up a centralized shopping hub to which all the other US federal, state and local agencies us to get the …
Malicious apps exploiting Android “Master Key” bug found
Malicious apps misusing on of the two recently discovered Android “Master Key” bugs to successfully pose as legitimate ones have been discovered on third-party …
Introduction to Cyber-Warfare
If you're looking to learn about cyber warfare, but don't know where to start, you might prefer picking up a book instead of searching for information dispersed on the …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations