Zeljka Zorz
Malware pushers lure victims with leaked Harry Potter movie screener
News that a partial DVD screener of Harry Potter and the Deathly Hollows: Part 1 has been leaked just days before the film’s scheduled worldwide premiere, has made …
Well crafted PayPal phishing e-mail doing rounds
A well crafted e-mail purportedly coming from the “PayPal Review Department” has been hitting inboxes lately. In it, potential victims are notified that due to …
OpenSSL remote code execution patched
New, patched versions of the OpenSSL server have been released on Tuesday in order to close down a hole that could allow attackers to execute a DoS attack and remote arbitrary …
News about royal engagement leads to malware
Taking advantage of the long awaited news of the engagement of Prince William of England to his long-time girlfriend Kate Middleton, malware pushers have hopped immediately on …
Stuxnet analysis points to a specific target
Some two months since the discovery of the Stuxnet worm made headlines and started speculations on who is behind it, Symantec‘s researchers have unearthed another piece …
Two thirds of Internet users have fallen victim to cybercrime
When reading about instances of cybercrime, we often get caught in the numbers and think about the details of a particular attack or exploitation of a technology, and actually …
50 ISPs harbor half of all infected machines worldwide
As the classic method of combating botnets by taking down command and control centers has proven pretty much ineffective in the long run, there has been lots of talk lately …
Holiday spam e-mail runs start off
Spammers peddling fake pills, replica watches, jewelry and bags are gearing up for the approaching holidays. According to Trend Micro researchers, using the upcoming Black …
Proof-of-concept Android app reveals platform’s security bug
Angry Birds is an extremely popular mobile game that can be played on Apple, Android and Nokia mobile devices – indeed, it has been downloaded by millions of users. So, …
Will ears replace fingerprints as a form of ID?
Fingerprint checks and iris scans may be the most popular ways of biometric identification for the time being, but it looks like they might soon be joined – if not …
Lethic Trojan is back, uses same stolen digital certificate as Stuxnet
Some two months ago, the world found out about the Stuxnet – the worm that used the Windows .lnk file vulnerability in order to spread through removable drives of …
Palin e-mail hacker sentenced
After a number of delays, former University of Tennessee student David Kernel has finally received his sentence for compromising Sarah Palin’s Yahoo! e-mail account back …
Featured news
Resources
Don't miss
- ScreenConnect admins targeted with spoofed login alerts
- Fake macOS help sites push Shamos infostealer via ClickFix technique
- Why a new AI tool could change how we test insider threat defenses
- Why satellite cybersecurity threats matter to everyone
- Kopia: Open-source encrypted backup tool for Windows, macOS, Linux