Zeljka Zorz
Scientists create algorithm for tracking down sources of online attacks
One of the problems when it comes to catching online criminals of any kind is the fact that it is often extremely difficult to pinpoint the origins of internet attacks – …
Bogus “MS Cyber-Crime Department” warnings lead to phishing
Emails purportedly sent by the Microsoft Cyber-Crime Department warning all Internet users that their email account may be deleted from the “world email server” …
Nationwide phishing emails hit inboxes
Customers of Nationwide Building Society, a British mutual financial institution and the largest building society in the world, are being targeted with phishing emails …
Blizzard confirms hack, urges users to change passwords
Blizzard’s CEO Mike Morhaime has confirmed in a letter that the company’s internal network has been breached this week. The “unauthorized and illegal …
Nepalese government websites serving backdoor
Two websites belonging to the Nepalese government have been injected with malicious code that tries to take advantage of a Java vulnerability (CVE-2012-0507) in order to …
Defense contractor targeted with “sexy” spam carrying malware
Targeted spam campaigns take many forms and take advantage a variety of natural human responses and feelings such as curiosity, fear, or lust. This last one spotted bet on the …
Microsoft confirms IE10 will have “Do Not Track” on by default
When Microsoft released the preview of Internet Explorer 10 at the beginning of June and announced that in Windows 8 the browser will be sending a “Do Not Track” …
eBay’s security efforts lead to massive fraud drop and 3K arrests
eBay, the notable online auction and shopping mammoth website and the company that runs it, has taken the fraud threat seriously and has managed to cut it by 90 percent in the …
Android malware masquerading as legitimate AV apps
If you’re an Android user, you probably couldn’t help but notice the hundreds of articles about the proliferation of malware created specifically for that …
Apple, Amazon change their security policies following epic hack
In the aftermath of the spectacular hack that left former Gizmodo employee Mat Honan without access to his Twitter account, his Gmail, his iCloud account and with his iPhone, …
Beware of “Free Apple Product” SMS messages
Given the all-around popularity of various Apple devices, it’s no wonder scammers often “offer” them as prizes in bogus contests and lotteries. The latest of …
Iran government systems to be taken off the Internet for protection
Remember when Iran expressed its intention of setting up a national Internet disconnected from the World Wide Web in order to keep its citizens safe from Western ideas and …
Featured news
Resources
Don't miss
- How security teams are putting AI to work right now
- Buttercup: Open-source AI-driven system detects and patches vulnerabilities
- Review: Data Engineering for Cybersecurity
- Weak alerting and slipping prevention raise risk levels for CISOs
- How military leadership prepares veterans for cybersecurity success