Zeljka Zorz
The F-BOMB: A tiny $50 spying computer for DARPA
Everyone loves a cheap but effective solution, and DARPA – the US Department of Defense’s agency for developing new military technologies – is no exception. …
Students used keyloggers on school computers, changed grades
Three Californian 16-year-olds have been arrested for having allegedly broken into their high school, stolen keys and tests, installed keyloggers onto teachers’ …
Bogus “browser update” pages deliver malware
Fake “browser update” pages are currently being used to deliver malware and redirect users to survey pages, warns GFI. Their malware researchers have recently …
FBI in the market for app to monitor social networks
The US FBI is looking into the possibility of using an “Open Source and social media alert, mapping, and analysis application” for increasing its situational …
Facebook scammers leverage the Amazon Cloud
Survey scams have been targeting Facebook users for longer that they would wish. The goal of all of them has always been to make users fill out survey, but the lures and …
Perplexing malware served on social welfare site
Legitimate compromised sites usually serve malware that directly or indirectly makes money for its peddlers, but ever now and then an exception to that rule arises. …
A peek into the Sykipot campaigns
The group(s) behind the massive and consistent campaigns targeting US defense contractors with the Sykipot Trojan continue their attacks unabated, reports Symantec. Its …
Malicious MIDI files lead to rootkit malware
A Windows Media remote code execution flaw that has been patched in the last Patch Tuesday is being exploited by attackers in the wild to deliver malware to the targets’ …
PoC exploits for Linux privilege escalation bug published
The publication of proof-of-concept exploit code for a recently spotted privilege escalation flaw (CVE-2012-0056 ) in the Linux kernel has left Linux vendors scrambling to …
Compromised Tumblr accounts sporting fake Starbucks gift cards
It is a well known fact that compromised legitimate websites are often used by cyber crooks to drive traffic towards their scammy sites. The latest example of this practice …
Symantec advises customers to stop using pcAnywhere
In a perhaps not wholly unexpected move, Symantec has advised the customers of its pcAnywhere remote control application to stop using it until patches for a slew of …
Critical flaws in Symantec’s pcAnywhere patched
After having been notified by Symantec about the theft of the software’s old source code and the increased security risk that incident entails for them, users of the …
Featured news
Resources
Don't miss
- Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
 - Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military
 - A new way to think about zero trust for workloads
 - Heisenberg: Open-source software supply chain health check tool
 - Securing real-time payments without slowing them down