Zeljka Zorz
Forged checks pass flawed examination process
The recent cases of two Texan women who had their personal information and checking account numbers stolen and used to validate bogus checks, have brought into the spotlight a …
Trojan disguised as a toolbar for Facebook
A Facebook toolbar is just what you need to make your sharing and connecting with friends easier, says in an email supposedly coming from “Facebook.com”: If you …
Fake Amazon “Deal of the Day” emails doing rounds
Fake Amazon newsletters have lately become regular visitors in inboxes around the world, says Trend Micro. With “Amazon.com Deal of the Day” in the subject line, …
A possible solution for banking Trojans?
ZeuS, Spy Eye, Mariposa – these are just some of the many information-stealing Trojans out there. ZeuS is, hands down, the most prominent. Its longevity is assured by …
European privacy concerns regarding U.S. policies
There are a lot of people in Europe who feel that governments and companies should not be able to collect information of individuals so they can use it in ways that violate …
Fake Twitter email continues to plague inboxes, leads to malware
Almost a week ago, Twitter began warning its users about fake Twitter Support emails. Since then, a couple of variants of the email have surfaced, with small differences in …
The Storm botnet strikes again
Once upon a time, the Storm botnet was responsible sending out 20 percent of all spam, but was eventually crippled by the rise of new malicious software removal tools. By the …
Securing the Borderless Network: Security for the Web 2.0 World
The future of the Web is mobile, virtualized, and collaborative. Among all the positive aspects and advantages that these changes will bring, there will also be some problems …
New malicious PDF
A new type of malicious PDF file has recently been spotted in the wild. This one contains an malicious object that was embedded into the file through the use of common the …
Poisoned search results: Our daily reality
The biggest threat to search engines are not their competitors, but poisoned search results. Since the moment when search engines have largely become the starting point for …
A closer look at EXE Password Protector
Eltima’s EXE Password Protector (v. 1.1.6.214) allows you to password-protect any Windows executable file (excluding only system-critical files which influence Windows …
Changes in new ZeuS variants
The ZeuS/Zbot Trojan variants have been around for a long time. It has come to the point where the name is no longer recognized only by security specialist, but by the general …
Featured news
Sponsored
Don't miss
- How much does cloud-based identity expand your attack surface?
- Finding software flaws early in the development process provides ROI
- Zero-day exploitation surged in 2023, Google finds
- NHS Scotland confirms ransomware attackers leaked patients’ data
- Patch actively exploited Microsoft SharePoint bug, CISA orders federal agencies (CVE-2023-24955)