Zeljka Zorz
Low-tech approach to ATM heist
ATM thieves in San Francisco have adopted an unusual and very low-tech way of getting their hands on some money. According to The SF Examiner, they simply glue down the …
Phishing HTML attachments bypass browser detection
In the constant war that goes on between online crooks and scammers and security professionals, adaptability is a quality greatly prized by all. All of them are tied together …
Japanese “miracle survival” Youtube scam clips
Online scams taking advantage of the ongoing Japanese tragedy are popping up daily. The latest one spotted is perpetuated on YouTube, where users go to search for videos that …
Twitter spambots advertise “Radiation health” e-book
The earthquake/tsunami/nuclear reactor explosion situation in Japan is currently being exploited by cyber scammers in a great variety of ways, but among the things that I …
Etsy privacy changes leave a lot to be desired
The Internet was all abuzz yesterday about Etsy’s privacy snafu that made its buyer’s full names and purchase histories available for everyone to see. Anyone who …
Twitter gives user always-on HTTPS option
Little by little, Twitter is heading towards a full HTTPS experience for its users by adding a user setting that, when selected, makes all the activities on your Twitter …
Etsy privacy blunder makes buyers’ purchases public
Etsy, the popular online market for small scale artisans and crafters, might be on the right track for a future privacy lawsuit following last week’s unveiling of its …
Former NSA and CIA Director advocates cyber threat transparency
The former NSA and CIA Director Gen. Michael Hayden could possibly be the last person you would expect to be advocating government transparency. However, his commentary in the …
Anonymous leaks incriminating Bank of America e-mails
The big news today is that Anonymous – the hacktivist group known for its DDoS attacks and support for WikiLeaks – has rendered public a collection of e-mails it …
Highly targeted attacks exploiting Windows MHTML vulnerability
A recent surge in attacks against a variety of sites that exploit a MHTML XSS vulnerability publicly disclosed in January – and which still hasn’t been patched by …
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks
The management of identities and online authentication are two problems to which so far only Public Key Infrastructure (PKI) has managed to give a secure and scalable answer …
Anti-phishing tool detects fraudulent sites by analyzing their elements
A Hong Kong City University professor that concentrates his effort on ways for combating phishing has recently made public a piece of software that proactively detects …
Featured news
Sponsored
Don't miss
- Applying DevSecOps principles to machine learning workloads
- Overcoming GenAI challenges in healthcare cybersecurity
- 25 cybersecurity AI stats you should know
- Hackers backdoored Cisco ASA devices via two zero-days (CVE-2024-20353, CVE-2024-20359)
- PoC for critical Progress Flowmon vulnerability released (CVE-2024-2389)