Zeljka Zorz
Malicious FB Timeline Remover plugins still tricking users
It is a well-known fact that some Facebook users simply can’t stand the (relatively) new Timeline interface and have actively sought for ways to revert their accounts to …
Apple denies handing UDIDs over to FBI
As the issue of the leaked million of Apple device IDs by the AntiSec hacker group and the alleged existence of a list of over 12 million of those and other personal …
Pro-Syrian attackers hacked Al Jazeera’s website
Visitors who tried to get their news from the website of the well-respected independent broadcaster Al Jazeera last night have been faced with an unexpected sight: a page …
Shamoon attacks persist
While it still unknown whether the recent attacks against Saudi Aramco and RasGas were part of the so-called Shamoon attacks, the latter are continuing unabated, says …
FBI denies collecting Apple device IDs
Following yesterday’s claim made by AnitSec hackers that they have gotten ahold of a document containing a list of over 12 million Apple iOS devices – including …
FinFisher commercial spyware toolkit goes mobile
The existence of FinFisher, a commercial spyware toolkit created by UK-based Gamma Group International, has recently grabbed the attention of the general public when two …
Google users targeted with malware-laden “Suspicious sign in” notices
Emails purportedly sent by the Google Accounts Team warning about a prevented “suspicious sign- in” have been spotted targeting Google users. “Someone …
Fake Amazon emails open the way for malware
The CVE-2012-4681 Java zero-day vulnerability might have been patched, but because it was added to the popular Blackhole exploit kit and because most users regularly forego …
Fake AmEx “Security Verification” phishing emails doing rounds
Malicious spam emails impersonating American Express have been hitting inboxes in the last few days, trying to make recipients open the file in the attachment. The email …
Anonymous leaks 1m Apple device UDIDs stolen from FBI
A file containing a million and one record sets containing Apple Unique Device Identifiers (UDIDs) and some other general information about the devices has been made available …
Inmates breached prison system’s network
Inmates at the state prison in Concord, New Hampshire, have managed to connect the computers they use in the prison’s industries program to the prison system’s …
“Win 8 Security System” rogue AV spotted
Windows 8 has not yet been released and cyber crooks are already taking advantage of its name. McAfee researchers have recently spotted a new rogue AV solution dubbed …