Zeljka Zorz
Obama administration reveals cybersecurity plan
The Obama administration has issued a new legislative proposal that contains a number of steps it thinks critical to improving cybersecurity for U.S. citizens, the …
PSN attackers allegedly used Amazon cloud for attack
Attackers (mis)used the Amazon cloud to mount their attack against Sony’s online services and systems, and they did it legally, says Bloomberg. According to an unnamed …
Banking Trojan gang busted by Finnish police
Seventeen people were arrested for having taken part in a criminal scheme that targeted users of Finnish Nordea Bank and resulted in fraudulent transactions in the total …
Security needs to be unified, simplified and proactive
IT security powerhouse Check Point is on a mission to make the management of security products unified and simplified, and nowhere has that message been more clear than at its …
Facebook apps found giving access to user accounts to third parties
A discovery that really should not surprise anyone has been made yesterday by Symantec – it turns out that due to to a flaw in the authentication schemes used before the …
Fake Patch Tuesday alert leads to Zeus infection
The term “Patch Tuesday” has become widely known and is so intimately tied to Microsoft that it is no wonder that malware peddlers are using it to add an aura of …
Fake AV spreading via Yahoo! Answers
From poisoned Google image search results to poisoned answers to legitimate questions on Q&A sites like Yahoo! Answers and public forums, malware peddlers are determined …
Google Chrome sandbox apparently cracked
French security firm VUPEN has announced that its researchers have managed manufacture an exploit able to bypass Google Chrome’s sandbox, ASLR and DEP. It is precisely …
Sony suffers third breach, PSN still down
Sony’s troubles seem to have no end as the company confirms a third breach of their network and fails to set a date for the restoration of services. This last breach …
“Time spent on Twitter” scam spreads virally
Facebook users are already accustomed to practically daily offers of rogue apps that will supposedly show them who views their profile or allow them to use a similar feature …
Files uploaded to file hosting services accessed by malicious individuals
File hosting services such as RapidShare, FileFactory, Easyshare and others have a number of flaws that make it possible for unauthorized people to access and download files …
Poisoned Google image searches becoming a problem
If you are a regular user of Google’s search engine you might have noticed that poisoned search results have practically become a common occurrence. Google has, of …