Zeljka Zorz
Children as adversaries in technologically-enhanced homes
You might sometimes consider your child an adversary when he or she prevents you from sleeping enough hours or having a sit-down meal without interruptions, but Microsoft …
Passwords of 1.8M Ubuntu Forums users compromised in hack
Ubuntuforums.org, the home of a variety of support forums dedicated to users of this popular Linux distribution, has been hacked over the weekend and defaced to show an image …
Apple developer center hacked by security researcher?
The mystery of why Apple’s Developer Center has been inaccessible for users since last Thursday has apparently been solved, as UK-based security researcher Ibrahim Balic …
Hijacking connected cars with a $25 tool
A presentation by two Spanish researchers scheduled to take place later this month at the Black Hat conference in Las Vegas will apparently prove that hijacking modern cars …
Huawei’s Chinese connection continues to be source of suspicion
A day after it was announced that the UK government will investigate the employees at the Huawei’s Cyber Security Evaluation Center located in Banbury, Oxfordshire, …
The future of electronic payment: Smartphone authentication and facial recognition
Withdrawing cash from an ATMs by using a debit or credit card or paying with it at a point-of-sale may soon become a thing of the past, as several manufacturers have presented …
Apps exploiting Android “Master Key” bug offered on Google Play
Researchers from security firm Bitdefender have unearthed two relatively popular apps on Google Play that leverage the infamous Android “Master Key” bug, but …
Android backup sends unencrypted Wi-Fi passwords to Google
The recent revelations on how Internet giants such as Google, Yahoo, Apple and others are compelled by the US government to give its agencies access to user data have …
Researchers find, Google fixes Glass hijack flaw
Google Glass is scheduled to be made widely available to regular consumers by the end of this year, so the Internet giant has still time to fix the most obvious security flaws …
Microsoft helped NSA get around its encryption
It has been a bad month for US Internet giants, but things got even worse for Microsoft as the latest batch of NSA documents leaked by Edward Snowden revealed that the company …
Unusual Facebook spam campaign delivers malicious Macros
A bizarre spam / malware delivery campaign is currently targeting Facebook users. It starts with the offer to see a video of a girl performing a salacious act – and this …
Bug bounties are cheaper than hiring full-time bug hunters
Software companies that have instituted bug bounties are on the right track, a recently published report by researchers of the University of California, Berkeley computer …
Featured news
Resources
Don't miss
- Why a new AI tool could change how we test insider threat defenses
- Why satellite cybersecurity threats matter to everyone
- Kopia: Open-source encrypted backup tool for Windows, macOS, Linux
- Review: Adversarial AI Attacks, Mitigations, and Defense Strategies
- China-linked Murky Panda targets and moves laterally through cloud services