Zeljka Zorz
Fake Flash update leads to malicious add-ons
Fake Flash update notifications are old news, but users still fall for the trick. In the latest example unearthed by Zscaler’s Julien Sobrier, one such notification …
App retrieving contactless credit card details pulled from Google Play
The Near Field Communication (NFC) protocol – supported and present on the latest smartphones – can be misused to steal data, say Symantec researchers. They tested …
Bogus BancorpSouth emails lead to exploit kit
Fake security related notices ostensibly coming from BancorpSouth, a bank holding company operating mainly in the South of the United States, have been hitting users’ …
Trojan infection triggers massive printing jobs
If your printers start printing garbage characters until they run out of paper, it’s a sure sign your network has been hit by the Milicenso Trojan. According to Symantec …
PayPal sets up bug bounty program
Joining the likes of Google, Facebook, Mozilla and others, PayPal has announced that it will be offering money for information about security bugs that affect their site …
AutoCAD worm steals blueprints, sends them to China
Duqu and Flame are not the only pieces of malware interested in grabbing AutoCAD files, says ESET researcher Righard Zwienenberg. A sudden spike on ESET’s LiveGrid Early …
Windows 8 will be harder to exploit
A lot of things have already been revealed about the security features of the upcoming Windows 8: there will be a picture password sign in option; a built-in antivirus …
LinkedIn hit with class action suit following password leak
It seems that LinkedIn can’t catch a break these days. Following the discovery that its mobile app for iOS devices is sending potentially confidential information to the …
Hackers leak customer data after firm refuses to pay ransom
Hacking collective “Rex Mundi” has leaked a batch of personal and financial information belonging to individuals who have applied for loans with online loan …
Compromised website serving “state-sponsored” 0-day exploit
The still unpatched Microsoft XML Core Services vulnerability (CVE-2012-1889) that allows attackers to gain the same user rights as the logged on user and execute malicious …
Google detects 9500 malicious sites per day
Five years after it was first introduced, Google’s Safe Browsing program continues to provide an invaluable service to the 600 million Chrome, Firefox, and Safari users, …
Julian Assange asking for asylum in Ecuador
WikiLeaks founder Julian Assange has applied for political asylum at the Ecuadorian embassy in London on Tuesday, reports Wired. After having its final extradition appeal …
Featured news
Resources
Don't miss
- Southwest Airlines CISO on tackling cyber risks in the aviation industry
- Insider risk management needs a human strategy
- Cerbos: Open-source, scalable authorization solution
- Patch Tuesday: Microsoft fixes 5 actively exploited zero-days
- Zero-day exploited to compromise Fortinet FortiVoice systems (CVE-2025-32756)