Zeljka Zorz
U.S. weapons systems designs reportedly stolen by hackers
Hackers – more than likely Chinese – have stolen designs for two dozen U.S. weapons systems during a series of raids, a previously undisclosed section of a report …
Brazilian govt sites found serving malware
Cyber crooks targeting Brazilian users have a well-documented predilection for banking Trojans, but every now and then they opt for other types of malware. Trend Micro …
Liberty Reserve founder arrested, site and service inaccessible
When the website of Liberty Reserve, a Costa Rica-based payment processor popular with cyber criminals, became inaccessible late last week, speculation about what caused were …
Scanner identifies malware strains, could be future of AV
When it comes to spotting malware, signature-based detection, heuristics and cloud-based recognition and information sharing used by many antivirus solutions today work well …
Zeus variants are back with a vengeance
After analyzing the feedback from the company’s Smart Protection Network, Trend Micro researchers have noted an upswing in attempted Zeus / Zbot Trojan infections. After …
Google set to upgrade its SSL certs
As a fine example of proactive security, Google has announced that it will be upgrading its SSL certificates to 2048-bit keys by the end of 2013. “We will begin …
Facebook phishers target Fan Pages owners
Phishing emails claiming to come from “Facebook Security” are once again hitting users’ inboxes, and this time they are aiming for the big fish: pages that …
Google researcher reveals another Windows 0-day
Tavis Ormandy – the Google researcher known for discovering a slew of Windows, Java and Flash Player vulnerabilities and zero-days and his combative attitude regarding …
DHS employees’ info possibly compromised due to system flaw
U.S. Department of Homeland Security employees have begun receiving notifications about a vulnerability that has inadvertently made their personal information potentially …
The dangers of downloading software from unofficial sites
Because malware peddlers often bundle their malicious wares with legitimate software, downloading anything from unofficial download sites is a bit like playing Russian …
Twitter finally offers 2-factor authentication
Following a slew of high-profile compromises of accounts belonging to media outlets such as AP and satirical news site The Onion, Twitter has finally implemented two-factor …
Microsoft decrypts Skype comms to detect malicious links
The issue addresses last week by The H and their associates at heise Security of whether or not Microsoft checks links contained in encrypted Skype chat sessions and their …
Featured news
Resources
Don't miss
- Why your security team feels stuck
- It’s time to give AI security its own playbook and the people to run it
- Kanvas: Open-source incident response case management tool
- 6 eye-opening books on AI’s rise, risks, and realities
- Check for CitrixBleed 2 exploitation even if you patched quickly! (CVE-2025-5777)