Zeljka Zorz
SMS Trojan masquerading as valentine-sending mobile application
It’s Valentine’s Day, and for all of you who are getting ready to send a valentine to the special people in your life, Microsoft has a warning: be careful what …
Fake scanned documents lead to Zeus infection
A new spam e-mail campaign is currently underway, and takes the form of a document scanned and sent by a Xerox WorkCentre Pro scanner: The attachment is a specially crafted …
Researcher offers free voice and text encryption app to Egyptians
The explosive situation in Egypt has mobilized many repression-hating individuals in the world to try to do something to support the country’s citizens in their efforts …
Nigerian scammers impersonate FBI agents
The so-called “Nigerian scams” have been a staple for online scammers for a while now, most of whom are located in Nigeria – ergo the name. Attempts might …
Chinese hackers behind espionage attacks hitting Western oil firms?
Hackers have targeted five international oil companies and have extracted sensitive corporate information about oil- and gas-field operations, project financing and bidding, …
2-step authentication finally available to Google’s non-paying customers
Google’s corporate users have had the option of using two-factor (two-step) authentication for nearly five months now, and the time has finally come for non-paying …
HBGary breach revelations and repercussions
A few days ago, the Internet group Anonymous downed security firm HBGary’s website and breached its networks, downloading a serious amount of confidential information …
Credit score checking app triggers Trojan download
The main reason people get scammed and/or their computer infected online is because they can’t contain their curiosity, and that is precisely the thing on which the …
iPhones and iPads reveal passwords regardless of passcode protection
Losing your iPhone or iPad equals having your passwords compromised – even if the device is protected with a passcode. The results of an experiment conducted by Jens …
400,000 e-mail addresses stolen in Irish job website breach
Names and e-mail addresses of some 400,000 job seekers have been harvested by hackers who have breached the RecruitIreland.com site and its systems. The site has been taken …
Unregulated mobile app markets are a godsend to malware developers
It’s basic economics – as the number of sold smartphones continues to rise worldwide, so will the number of threats targeting the users of these devices. One of …
List of top e-threats points to computer use trends
BitDefender issued its monthly top 10 list of e-threats, which offers some insight into security and computer use trends. The list (for January) is as follows: 1. …
Featured news
Resources
Don't miss
- What makes a security program mature and how to get there faster
- EntraGoat: Vulnerable Microsoft Entra ID infrastructure to simulate identity security misconfigurations
- Win-DDoS: Attackers can turn public domain controllers into DDoS agents
- How Brandolini’s law informs our everyday infosec reality
- From legacy to SaaS: Why complexity is the enemy of enterprise security