Zeljka Zorz
Facebook Lottery scam emails making rounds
Offline crooks have had a lot of success with the bogus lottery winning letter scam, so it should come as no surprise it is often “translated” into an email and …
Personal info of 9 million Israelis stolen, available online
Personal information of some 9 million Israelis (alive and deceased) has been stolen by a contractor working for the country’s Ministry of Labor and Welfare with the …
Anonymous shuts down child porn sites, leaks usernames
Hacktivist group Anonymous has started a new campaign. Dubbed “Operation Darknet”, it aims to battle child pornography and ISPs that knowingly support and allow …
Microsoft YouTube channel hacked
A week after the official Sesame Street YouTube channel got compromised and started offering adult content to children, Microsoft’s official YouTube channel has been …
Scammers asking for donations for bogus Steve Jobs charity
Before his death, Apple CEO Steve Jobs was well known for not giving donations to charities or setting up foundations for various humanitarian causes, so it may come as a …
Skype can be used to tie users to illegal download activity
A team of researchers has proved that it is possible to determine the IP address of a user and tie it with his Internet use, and even correlate this information to his …
Bloody photos of Gaddafi used as bait in malware-laden email run
As predicted, the violent death of Libyan dictator Moammar Gaddafi has been taken advantage of by cyber criminals in order to trick gore-hungry users into downloading malware: …
Nasdaq attackers spied on companies
The systems of the company that operates the Nasdaq Stock Market were breached many times last year, but the actual trading platform was never compromised. A subsequent …
Flash bug allows spying of website visitors through webcam
A slight variation of a previously designed clickjacking attack that used a Adobe Flash vulnerability has once again made it possible for website administrators to …
Which mobile OS is most hit by malware?
As most mobile phone users still don’t have a mobile AV solution installed on their devices, it can be rather hard to gauge just how many of them have been hit by mobile …
Hijacked phishing page warns users about phishing
hen you follow security news daily like I do, it is tough to keep a positive outlook when day after day you hear and read of users falling for basically the same scams simply …
Federal Trojan has more capabilities than previously thought
Ten days ago, the Chaos Computer Club made public a set of worrisome discoveries made by their analysis of the “lawful interception” Trojan used by German law …
Featured news
Resources
Don't miss
- How military leadership prepares veterans for cybersecurity success
- Fighting fraud with AI: The new identity security playbook
- Brute-force attacks hammer Fortinet devices worldwide
- For $40, you can buy stolen police and government email accounts
- Vulnerabilities in MSP-friendly RMM solution exploited in the wild (CVE-2025-8875, CVE-2025-8876)