Zeljka Zorz
Check how secure, private and open an app is
Surfing through the Net in search of a objective review of an application can be a daunting task, and even when you find one, it usually barely touches the issues of security …
iPad, iPhone “prizes” as lures for Twitter users
Not surprisingly, spam using the Apple iPad as a lure to get users to give up personal or credit card information has began to make rounds of Twitter users. Sunbelt reveals …
ZeuS vs. Zeus Killer
Back at the beginning of February, we wrote about the SpyEye toolkit and its author’s intention of encroaching upon Zeus toolkit’s turf by offering a feature that …
Fake gift card scams on Facebook
Whole Foods Market, a Texas supermarket chain, has been fighting the latest gift card scam that takes advantage of the company well-known brand by offering a $500 gift card to …
How to detect a phishing site, the Google way
Google analyzes millions of pages per day when searching for phishing behavior. This kind of activity is, of course, not done by people but by computers. The computers are …
Global response to Conficker threat: Model for future cyber threat response?
The problem with Conficker is that we still don’t know what it’s for. Yes, an estimated 7 million computers are infected worldwide, but they don’t show signs …
Silent auto-patching for Flash plug-in within Chrome
The exhausting, continuous patching of software will, hopefully, some day come to an end. I seriously doubt it will be because of flawless code, but the possibility of having …
1,800 Office bugs discovered by Microsoft’s “fuzzing botnet”
Distributed Fuzzing Framework is what they call it at Microsoft, and it’s the realization of an idea that originated with one of the software designer engineers of its …
Stalker jailed for planting child porn on a computer
An elaborate scheme to get the husband of a co-worker he was obsessed with locked up in jail, backfired on Ilkka Karttunen, a 48-year from Essex. His plan was to get the …
Hacked Yahoo email accounts in China and Taiwan
Yahoo email accounts of several journalists and human activists have been hacked and their contents likely downloaded in what seems like an organized attack concentrated on …
Breached companies are not entitled to anonymity
Does the recent decision by District Judge Douglas Woodlock – to unseal the identities of two companies (J.C. Penney and Wet Seal) whose customer data has been stolen by …
Researcher exploits PDF file without using a vulnerability
Didier Stevens, security researcher and expert on malicious PDF files, has succeeded in creating a proof-of-concept PDF file that uses the launch action triggered by the …
Featured news
Sponsored
Don't miss
- EU adopts Cyber Resilience Act to secure connected products
- DORA regulation’s nuts and bolts
- Unlocking the power of cryptographic agility in a quantum world
- Actively exploited Firefox zero-day fixed, update ASAP! (CVE-2024-9680)
- Internet Archive data breach, defacement, and DDoS: Users’ data compromised