Zeljka Zorz
Apps with dangerous permissions pulled from Chrome Web Store
Do you trust Google to review and ban potentially malicious applications from its online stores? The Android Market has already been found offering “trojanized” …
Fake Epsilon breach warning tricks users
Among the most annoying things you can find online are pages that pretend to offer or try to push a service in order to make money by simply referring the user to another …
35 million Google Profiles collected into private database
If you are one of those individuals that made their own Google Profile, chances are that you knew and agreed to the fact that the information you included in it will be …
The resurrection of the Mariposa botnet
When the news that the Spanish police arrested the three individuals suspected of running the Mariposa botnet was made public back in March 2010, it was generally thought that …
New Mac Defender variant doesn’t need your admin password
There is a new variant of the Mac Defender rogue AV out there, and this one doesn’t require users to enter the administrator password in order to install the program, …
Program defeats audio CAPTCHAs, researchers learn how to improve it
A group of researchers from Stanford University’s Security Laboratory has managed to build a computer program able to solve audio CAPTCHAs, reported the University on …
Comodo Brazil breached, sensitive data leaked
The recent spate of attacks against Sony’s various assets has probably made a lot of companies thank their lucky stars that they aren’t the ones who have been …
Apple acknowledges Mac Defender existence, gives removal instructions
It took a while for Apple to react properly to the onslaught of Mac Defender and similar fake AV aimed at Mac users, but they finally did it. Only days after the revelation of …
Sony online store hacked and user information published
It seems that hacking Sony’s assets has become a communal game in the hacker underground. Since the PSN hack, hardly a week went by without a hacker notifying the public …
Hotmail flaw allows attackers to exfiltrate emails
The analysis of a recent targeted attack against webmail users has led Trend Micro researchers to discover a vulnerability in Microsoft’s Hotmail webmail service that …
Fake VirusTotal site serves malware
VirusTotal – the popular free file checking website – has been spoofed by malware peddlers, warns Kaspersky Lab. A simple visit to the site triggers the download …
LinkedIn security flaws allow account hijacking
LinkedIn users are in danger of having their their account hijacked when accessing it over insecure Wi-Fi networks or public computers, says independent security researcher …
Featured news
Resources
Don't miss
- What a future without CVEs means for cyber defense
- What it really takes to build a resilient cyber program
- How cybercriminals exploit psychological triggers in social engineering attacks
- Key tips to stay safe from deepfake and AI threats
- UK retailers under cyber attack: Co-op member data compromised