Zeljka Zorz
The Basics of Hacking and Penetration Testing
Have you always wondered about how penetration testing is performed, but never had the opportunity to ask a professional about it or to witness him (or her) at work? If that's …
Hacker breached, changed grades in university academic record system
Santa Clara University, a private university run by the Jesuits and located in the Silicon Valley, has issued a statement confirming that it has called the FBI to investigate …
Windows 8 to do away with constant restarts after updating
I don’t know a single Windows user who isn’t annoyed at the number of times the operating system requires a restart, and especially annoyed when the request …
Hiding messages in VoIP packets
A group of researchers from the Institute of Telecommunications of the Warsaw University of Technology have devised a relatively simple way of hiding information within VoIP …
What hides behind the get-rich-working-from-home offers?
Do you ever get tempted to click on one of the myriad of work-from-home, get-paid-huge-money adverts that are littering the Internet? Do you ever wonder if those claims are …
Bogus chat spying Facebook app targets users
No matter how often fake “See who viewed your profile” apps are touted on Facebook, there are always users that fall for the trick and follow the steps required by …
Trojan masquerading as PDF signed with stolen government certificate
Since the discovery of the Stuxnet worm, and especially after the recent string of certification authority compromises, cyber attackers’ practice of using digital …
Mass manipulation through automated social engineering
In the past few years, social engineering has become cyber attackers’ preferred method for gaining access to target systems, and it usually takes the form of a spoofed …
Cyber crooks should get tougher sentences, says PCeU chief
Cyber fraudsters and robbers often receive considerably lighter sentences that their real-world counterparts, says Detective Superintendent Charlie McMurdie, the head of …
Apple OS X sandbox hole allows bypassing of restrictions
Following Apple’s announcement that all applications submitted for inclusion in the App Store will have to have sandboxing implemented starting from March 1, 2012, …
Hacked Sky News Twitter account falsely reports on Murdoch arrest
Hacking Twitter feeds of popular mainstream media outlets is a perfect way of getting your message across to or create panic among a great number of people. It has also lately …
Steam server attackers grabbed passwords, credit card data
As Bethesda Software was preparing to release Skyrim, the latest installment of its mega popular Elder Scrolls series, news that the forum of Steam, the online …
Featured news
Resources
Don't miss
- How global collaboration is hitting cybercriminals where it hurts
- Vet: Open-source software supply chain security tool
- Bankers Association’s attack on cybersecurity transparency
- Attackers breached ConnectWise, compromised customer ScreenConnect instances
- Product showcase: Smarter pentest reporting and exposure management with PlexTrac