Zeljka Zorz
Infamous Canadian Pharmacy spam affiliate program shuts down
When it comes to spam, we’re all used to rising numbers – and the rising annoyance. But it seems that there could finally a reason to rejoice: it looks like …
A phishing e-mail to learn from
A phishing attempt that makes even people who are very good at spotting them pause for a moment and take a good look is a perfect example on which to learn. Ravi Dehar of …
A closer look at Knox for Mac
Knox (v. 2.0.5) is a Mac application that will allow you to create password-protected and encrypted vaults on your computer or to turn an external drive into one in order to …
Web-voting option suspended due to a system flaw
The option of casting your vote through the new D.C.’s Digital Vote by Mail system has been suspended because of a vulnerability that allowed a public tester of the …
Alleged leader of carding gang arrested
A Ukranian national suspected of being the leader of a gang involved in counterfeiting payment cards has been taken into custody by the Russian police. The arrest has been …
Cryptome hacked, founder e-mail account ransacked
Cryptome.org, the well-known whisteblowing site, was hacked during this past weekend, and all of its content (approximately 7GB of data) was deleted by the hacker who then …
Fake browser updates deliver fake AV or exploit kit
Not that long ago, Microsoft was warning users about rogue AV peddlers using compromised websites and fake browser warnings to urge them to download an …
Security exercise for information infrastructure protection
“Cyber Europe 2010” – the first pan European CIIP (Critical Information Infrastructure Protection) exercise that will test the efficiency of communication …
Arrests of money mules follow ZeuS gang takedowns
Last week’s arrests and indictments of two gangs (one based in the U.K. and one in the U.S.) that used the ZeuS Trojan to syphon huge amounts of money from private and …
XSS flaws found on three security firms’ websites
A group of white-hat hackers has discovered various XSS vulnerabilities on websites belonging to three well-known security companies, and have reported it to the firms …
Seven Deadliest Wireless Technologies Attacks
Part of Syngress' "The Seven Deadliest Attack Series", this book introduces the reader to the anatomy of attacks aimed at wireless technologies and devices that use …
Plane-tracking phone app is a boon for terrorists?
An application for the iPhone and Android-running devices that allows users to establish the exact location of an airplane by simply pointing it in its direction while it …
Featured news
Resources
Don't miss
- Product showcase: Ledger Flex secure crypto wallet
- Villain: Open-source framework for managing and enhancing reverse shells
- Securing the invisible: Supply chain security trends
- Why cyber resilience must be part of every organization’s DNA
- 44% of the zero-days exploited in 2024 were in enterprise solutions