Zeljka Zorz
Privacy icons summarize privacy policies
A group of students from Yale University have shared their final project for their Control, Privacy, and Technology course which offers the novel idea of using icons to brief …
Survey scammers impersonate Apple via SMS
As the number of smartphone users increases with each passing day, survey scammers have turned some of their attention to targeting users directly via SMS messages containing …
Securing mobile apps in the enterprise
The mobile app has become the endpoint. With the advent of consumerization and BYOD, the number of managed devices began shrinking and that of unmanaged devices continues to …
Cyber attackers target US natural gas pipeline companies
Unknown attackers are actively targeting natural gas pipeline sector companies in the US with spear phishing emails, the US Department of Homeland Security’s Industrial …
Sandbox added to Flash Player running on Firefox
As announced by Peleus Uhley, a senior security researcher within its Secure Software Engineering team, Adobe has outfitted the latest (beta) version of Adobe Flash Player …
FBI wants social networks and IM services to be wiretap-friendly
Worried that technology advances will leave its agents incapable of conducting surveillance of online communications of potential criminals, the FBI is quietly lobbying top …
Is a German criminal behind the latest ransomware campaign?
Ransomware distribution campaigns are coming fast one after the other and its usually difficult – if not downright impossible – to discover anything about the …
Adobe patches Flash Player hole exploited in the wild
Adobe has released a security update for Flash Player for Windows, Macintosh, Linux and Android that address the object confusion vulnerability (CVE-2012-0779) that is …
Phishers mimic OpenID to steal credentials
New spam email campaigns are taking advantage of the users’ vague familiarity with the OpenID authentication method to phish their login credentials for a number of …
Walmart gift card scam targets smartphone users
Online survey scams are most often propagated through social network and sharing websites, but occasionally users are “assaulted” directly through their …
1,000+ WordPress sites compromised through automatic update feature
More than 1,000 WordPress blogs have been modified to redirect visitors to sites serving malware, affiliate and pay-per-click redirectors, and low quality PPC search result …
New hacking group hits government websites, leaks stolen data
A hacker group that named itself “The Unknowns” has recently boasted on Pastebin of having compromised a number of government, business and educational websites, …
Featured news
Resources
Don't miss
- How military leadership prepares veterans for cybersecurity success
- Fighting fraud with AI: The new identity security playbook
- Brute-force attacks hammer Fortinet devices worldwide
- For $40, you can buy stolen police and government email accounts
- Vulnerabilities in MSP-friendly RMM solution exploited in the wild (CVE-2025-8875, CVE-2025-8876)