Zeljka Zorz
Bizarre tale behind conviction for botnet initiated DDoS attack
In a curious twist of fate, a man who refused to continue his collaboration with a group who’s goal was to unmask pedophiles because he was concerned that their methods …
Examining the Stuxnet worm
Digging into the Stuxnet worm reveals all kinds of interesting information. Maybe you’ve heard that the worm propagates by exploiting the Windows .lnk file vulnerability …
“Girl killed herself” Facebook scam returns
If the title of the “Girl killed herself, after her dad posted This to her Wall” Facebook page sounds somewhat familiar, it is because almost two months ago the …
Cisco patches DoS flaws in IOS
Cisco has released a bundle of security updates for the IOS (the software used on Cisco Systems routers and current network switches) and the Unified Communications Manager …
Microsoft offers free AV to small businesses
In a well-calculated but also very positive move, Microsoft has announced that – beginning in early October – it will be offering its Microsoft Security Essentials …
The cookie that won’t go away
A proof-of-concept JavaScript API that manufactures persistent cookies and stores them in several types of storage mechanisms has been developed by security hacker Samy …
Theories about Stuxnet’s goal and authors abound
The quality of its code, the stolen certificates used to digitally sign it, the specifically targeted configuration, the four 0-day Windows vulnerabilities it exploits to …
Trojan stealing private key certificates
As you may have already noticed, malware peddlers have realized that their wares have a greater chance of being loaded by the targeted system if they are digitally signed. The …
A standardized format for cybercrime reporting
“Cybercrime is emerging as a very concrete threat. Considering the anonymity of cyberspace, it may in fact be one of the most dangerous criminal threats ever,” …
Trojan posing as installer wants your money
A Trojan masquerading as an installer for well-known applications such as DivX, μTorrent, LimeWire, Avast! Antivirus and others has been popping up on users’ …
XSS Twitter flaw used to expose users to potentially malicious sites
Earlier this morning, Sophos begin to warn people about a new Twitter XSS flaw that is being used by malicious individuals to redirect users to third-party websites without …
Win free tickets for GRC 2010 in Lisbon
At the end of October, an event named GRC 2010 is to be held in Lisbon, Portugal, and it proposes to bring to its participants the main challenges that managers involved in …
Featured news
Resources
Don't miss
- Villain: Open-source framework for managing and enhancing reverse shells
- Securing the invisible: Supply chain security trends
- Why cyber resilience must be part of every organization’s DNA
- 44% of the zero-days exploited in 2024 were in enterprise solutions
- CISA warns about actively exploited Broadcom, Commvault vulnerabilities