Zeljka Zorz
Phishers trick gamers with adult cam show offer
A rather clever phishing scheme targeting Italian gamers has recently been spotted by Symantec researchers. The scammy page, hosted on a free web hosting site, was made to …
Apple, Facebook and others named in privacy lawsuit
Thirteen individuals have filed a lawsuit against a number of app makers including Path, Facebook, Instagram, Yelp and Rovio, accusing them of uploading the information stored …
US govt and military email addresses offered for sale
Cyber crooks are very well aware that information is a very lucrative commodity and that every type of information has potential buyers. Take email addresses, for example. …
Europeans targeted with new ransomware
In the last couple of years, malware that hijacks the users’ machines and demands money to “unblock” it has become an often encountered threat. Messages …
Fake LinkedIn emails serve malware
Emails purportedly coming from business-related social network LinkedIn have been hitting inboxes in the last couple of days, ostensibly reminding recipients of invitations …
Working exploit for MS12-020 RDP flaw found
The vulnerability in Microsoft’s Remote Desktop Protocol (RDP) implementation (MS12-020) – a patch for which has been released by during the last Patch Tuesday …
Android banking Trojan steals both authenticating factors
The Zeus and SpyEye banking Trojans have recently been fitted with a new module that targets Android users that use their device as an added authentication method when …
Fake Google Play site serves Android malware
Online scammers are known for their adaptability, so it should not come as a surprise that the recent name change of Google’s official Android Market – now dubbed …
A decade of vulnerabilities and predictions for 2012
Since 2001, Spanish security firm S21sec has been been compiling a database of vulnerabilities detected by themselves and those reported by a great number of sources which …
TRICARE data theft was targeted?
When sensitive data of nearly 5 million TRICARE patients was compromised last September due to the theft of backup tapes from an employee’s car, the company quickly …
Android pattern lock stumps FBI forensic experts
Who would have thought that pattern screen locks on Android phones actually provide such an effective barrier to unauthorized access that even the FBI is forced ask Google for …
The Basics of Digital Forensics
Computers, mobile devices and the Internet have become an integral part of our daily lives. They are helpful tools, but they are also sources of information that one would not …
Featured news
Resources
Don't miss
- How military leadership prepares veterans for cybersecurity success
- Fighting fraud with AI: The new identity security playbook
- Brute-force attacks hammer Fortinet devices worldwide
- For $40, you can buy stolen police and government email accounts
- Vulnerabilities in MSP-friendly RMM solution exploited in the wild (CVE-2025-8875, CVE-2025-8876)