Zeljka Zorz
Ohio State University database hacked
A database containing Social Security numbers, addresses and dates of birth of everyone who’s ever had an Ohio State University e-mail address (@osu.edu) has been …
Mozilla expands its bug bounty program
Back in 2004, the Mozilla Foundation instituted a bug bounty program that rewarded users who reported critical security vulnerabilities on the Foundation’s software with …
Twitter spam campaign leads to computer-hijacking rogue AV
Malicious shortened goo.gl links and compromised accounts are once again used to lure users to pages that will ultimately harm their computer. A message saying “a very …
Malicious .rtf file exploits MS Office flaw
A stack-based buffer overflow vulnerability in Microsoft Office has recently been spotted being exploited in the wild by attackers aiming at getting control of targeted …
Gawker breach triggers password-changing requests from Yahoo, Twitter
The compromise of Gawker’s database containing some 1.3 million user login credentials and the realization that a lot of users – despite constantly being advised …
Bank of America sues ex-employees for stealing confidential data
Four former employees of the Bank of America stand accused of illegally copying a confidential database belonging to the bank’s U.S. Trust and taking it with them to the …
Acunetix Web Vulnerability Scanner 7
A manual search for vulnerabilities would simply take too much time, so penetration testers usually use an automated web vulnerability scanner to do the preliminary work for …
McDonald’s data breach just the tip of the iceberg
A couple of days ago, the database containing the names, mobile phone numbers, and postal addresses and/or e-mail addresses of McDonald’s customers was discovered to …
FBI put backdoors in OpenBSD IPSEC stack?
Some serious allegations have been raised yesterday as Theo de Raadt, founder and leader of the OpenBSD and OpenSSH projects, has made public a private e-mail he received from …
Database breach that could endanger lives
A database breach that could result in more than just identity theft is the result of a compromise of the online database of the Mesa County Sheriff’s Department …
New Trojan hijacks shortcuts to ensure its execution
A new information-stealing Trojan that seems to be Chinese in origin has been detected by Avira’ researchers. It is designed to steal usernames and passwords associated …
Fake Hallmark greeting card carries malware
A spam campaign consisting of e-mails posing as Hallmark Christmas cards and containing a malicious attachment has been detected by MX Lab researchers: Coming from a spoofed …
Featured news
Resources
Don't miss
- When trusted AI connections turn hostile
- Identifying risky candidates: Practical steps for security leaders
- Humanoid robot found vulnerable to Bluetooth hack, data leaks to China
- F5 data breach: “Nation-state attackers” stole BIG-IP source code, vulnerability info
- Microsoft patches three zero-days actively exploited by attackers