Zeljka Zorz
Anonymous and affiliates attack Israeli websites
As announced, hacker groups affiliated with Anonymous have joined in the attacks on Israeli web properties. By launching “Operation Israel”, the hacktivist …
Spear-phishing emails targeting energy companies
Information over-sharing can lead to cleverly executed and dangerous spear-phishing campaigns, warns the US Department of Homeland Security and the ICS-CERT. According to an …
WordPress.com adds 2-factor authentication option
WordPress users can finally secure their account(s) with two step authentication. The optional feature has been rolled out on Friday and is accessible to all users. To set it …
iMessage encryption stumps US federal agents
A recent investigation conducted by US Drug Enforcement Administration agents has been temporarily derailed after they failed to decrypt messages the targets exchanged via …
Two Japanese web portals hacked, user financial info compromised
Personal and financial information belonging to users of two big Japanese web portals has been compromised earlier this week, Computerworld reports. On Tuesday evening, Yahoo …
Carberp Trojan developers arrested in Ukraine
The mastermind behind the Carberp Trojan and the developers that helped created it have apparently been arrested in Ukraine in a joint action by the Security Service of …
Flashback malware author unmasked?
An estimated 38,000 users is still infected with the Flashback Trojan, the first malware targeting Mac users that didn’t have to get their permission to be downloaded, …
Wide variety of malware lurking in Skype messages
A new malware-spreading campaign is targeting Skype users, warns Dancho Danchev. The attack is mounted via malware-infected users whose compromised Skype account is set to …
My very own personal privacy training
I remember a time – and it wasn’t even that long ago – when the government, companies and organizations weren’t this hell-bent on collecting citizen, …
Thousands of compromised Apache servers direct users to malware
What do the recent compromises of a number of LA Times websites and the blog of hard disk drive manufacturer Seagate have in common? According to several security researchers, …
Banking Trojan disguised as innocuous Word and WinHelp files
Part of the job of a malware author is to constantly think up new ways of outsmarting researchers and bypassing automatic detection methods used by antivirus and other …
The War Z taken offline following forum, database hack
Players of The War Z, a first-person zombie survival game, have been notified of a breach of the developer’s (Hammerpoint Interactive) forum and game databases and the …
Featured news
Resources
Don't miss
- China-linked Murky Panda targets and moves laterally through cloud services
- Five ways OSINT helps financial institutions to fight money laundering
- DevOps in the cloud and what is putting your data at risk
- Russian threat actors using old Cisco bug to target critical infrastructure orgs
- AWS Trusted Advisor flaw allowed public S3 buckets to go unflagged