Zeljka Zorz
New Mac spyware signed with legitimate Apple Developer ID
A new piece of malware designed to spy on Mac users has been unearthed by security researcher and hacker Jacob Appelbaum at the Oslo Freedom Conference held this week in …
Ransomware adds password stealing to its arsenal
Slowly but surely, more and more users are becoming acquainted with the existence of ransomware and when faced with one, they opt not to pay the requested “fine” …
Four LulzSec hackers handed prison sentences
Four LulzSec members have been sentenced today at Southwark Crown Court for taking part in the 2011 attacks against a series of high-profile websites and publishing user …
Thoughts on the need for anonymity
The other day I was reading a post on BoingBoing about Anonymous getting involved in publicizing the Steubenville and Halifax rape cases, and about a protest rally they …
The New Yorker launches anonymous dead-drop tool
Popular U.S. magazine The New Yorker has made available for its potential sources an anonymous dead-drop tool that allows them to send and receive messages and files to the …
Researchers reveal OpUSA attackers’ MO
Anonymous’ highly publicized Operation USA has not been the resounding success they expected it to be. Sure, the number of sites sporting a page containing messages from …
Info-stealing Dorkbot worm spreading on Facebook
The Dorkbot worm, which first appeared in 2011 and has since been spreading via removable drives, IM programs and social networks, is currently targeting Facebook users. The …
Private messages of Bloomberg clients end up online
Mere days after Bloomberg News admitted that its journalists could access some client information via the company’s financial terminals, it has been revealed that the …
Is Microsoft reading your Skype communications?
The question of whether Skype – a Microsoft subsidiary since May 2011 – allows U.S. intelligence and law enforcement agencies to access the communications …
Password meters actually work
Password strength meters work, but only when users are choosing or changing passwords for “important” accounts, a group of researchers has found. They also …
Researcher refuses to help Saudi telco to spy on people
You would think that a Saudi Arabian telecom firm interested in monitoring its users’ mobile communications would not be asking a well-known pro-privacy researcher such …
U.S. govt secretly obtains AP phone records
A letter received by the Associated Press’ general counsel has revealed that the DOJ has successfully subpoenaed two months’ worth of telephone toll records for …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations