Zeljka Zorz
Whitehat hacker’s laptop, cellphones seized and searched
The well-known whitehat hacker and security researcher that goes by the handle Moxie Marlinspike has recently experienced firsthand the electronical device search that …
Fake documents sold on Facebook
I never thought I would see a page like this on Facebook, but I guess I shouldn’t be too surprised: “We offer only original high-quality fake passports, …
New Google service could be a godsend to scammers
The Instant Previews service that Google launched last week allows users to click on the magnifying glass icon next to a result’s title or on its background in order to …
Curiosity fuels Chatroulette and Facebook scam
Another scam taking advantage of the curiosity of users is spreading on Facebook. This time, the lure is a supposedly embarrassing and disgusting chance meeting between father …
Malware pushers lure victims with leaked Harry Potter movie screener
News that a partial DVD screener of Harry Potter and the Deathly Hollows: Part 1 has been leaked just days before the film’s scheduled worldwide premiere, has made …
Well crafted PayPal phishing e-mail doing rounds
A well crafted e-mail purportedly coming from the “PayPal Review Department” has been hitting inboxes lately. In it, potential victims are notified that due to …
OpenSSL remote code execution patched
New, patched versions of the OpenSSL server have been released on Tuesday in order to close down a hole that could allow attackers to execute a DoS attack and remote arbitrary …
News about royal engagement leads to malware
Taking advantage of the long awaited news of the engagement of Prince William of England to his long-time girlfriend Kate Middleton, malware pushers have hopped immediately on …
Stuxnet analysis points to a specific target
Some two months since the discovery of the Stuxnet worm made headlines and started speculations on who is behind it, Symantec‘s researchers have unearthed another piece …
Two thirds of Internet users have fallen victim to cybercrime
When reading about instances of cybercrime, we often get caught in the numbers and think about the details of a particular attack or exploitation of a technology, and actually …
50 ISPs harbor half of all infected machines worldwide
As the classic method of combating botnets by taking down command and control centers has proven pretty much ineffective in the long run, there has been lots of talk lately …
Holiday spam e-mail runs start off
Spammers peddling fake pills, replica watches, jewelry and bags are gearing up for the approaching holidays. According to Trend Micro researchers, using the upcoming Black …
Featured news
Resources
Don't miss
- Salesforce investigates new incident echoing Salesloft Drift compromise
- Security gap in Perplexity’s Comet browser exposed users to system-level attacks
- MacOS DigitStealer malware poses as DynamicLake, targets Apple Silicon M2/M3 devices
- Is your password manager truly GDPR compliant?
- 7-Zip vulnerability is being actively exploited, NHS England warns (CVE-2025-11001)