Zeljka Zorz
Companies sever ties with HBGary
The HBGary breach and the publication of internal company documents – including the potentially damning proposal developed by HBGary, Palantir Technologies and Berico …
SMS Trojan masquerading as valentine-sending mobile application
It’s Valentine’s Day, and for all of you who are getting ready to send a valentine to the special people in your life, Microsoft has a warning: be careful what …
Fake scanned documents lead to Zeus infection
A new spam e-mail campaign is currently underway, and takes the form of a document scanned and sent by a Xerox WorkCentre Pro scanner: The attachment is a specially crafted …
Researcher offers free voice and text encryption app to Egyptians
The explosive situation in Egypt has mobilized many repression-hating individuals in the world to try to do something to support the country’s citizens in their efforts …
Nigerian scammers impersonate FBI agents
The so-called “Nigerian scams” have been a staple for online scammers for a while now, most of whom are located in Nigeria – ergo the name. Attempts might …
Chinese hackers behind espionage attacks hitting Western oil firms?
Hackers have targeted five international oil companies and have extracted sensitive corporate information about oil- and gas-field operations, project financing and bidding, …
2-step authentication finally available to Google’s non-paying customers
Google’s corporate users have had the option of using two-factor (two-step) authentication for nearly five months now, and the time has finally come for non-paying …
HBGary breach revelations and repercussions
A few days ago, the Internet group Anonymous downed security firm HBGary’s website and breached its networks, downloading a serious amount of confidential information …
Credit score checking app triggers Trojan download
The main reason people get scammed and/or their computer infected online is because they can’t contain their curiosity, and that is precisely the thing on which the …
iPhones and iPads reveal passwords regardless of passcode protection
Losing your iPhone or iPad equals having your passwords compromised – even if the device is protected with a passcode. The results of an experiment conducted by Jens …
400,000 e-mail addresses stolen in Irish job website breach
Names and e-mail addresses of some 400,000 job seekers have been harvested by hackers who have breached the RecruitIreland.com site and its systems. The site has been taken …
Unregulated mobile app markets are a godsend to malware developers
It’s basic economics – as the number of sold smartphones continues to rise worldwide, so will the number of threats targeting the users of these devices. One of …
Featured news
Resources
Don't miss
- TeamPCP strikes again: Backdoored Telnyx PyPI package delivers malware
- CISA sounds alarm on Langflow RCE, Trivy supply chain compromise after rapid exploitation
- Top product launches at RSAC 2026
- Researchers release tool to detect stealthy BPFDoor implants in critical infrastructure networks
- AI SOC vendors are selling a future that production deployments haven’t reached yet