Zeljka Zorz
Facebook bug compromises top pages
A customer of Sendible, an online marketing service for promoting and tracking brands through the use of social media, e-mail and SMS messaging, has inadvertently discovered a …
Facebook “love button” app links to malware
If you spot a Facebook post or a message that advertises an application that will let you “unlock” a “love” (
A closer look at NetShade for Mac
NetShade (v.4.0.1) makes your presence on the web anonymous by routing your connection through a proxy server and acting as the middle-man in your connection. The proxy server …
Orkut users under phishing attack
Orkut users have lately been targeted with a clever scheme that redirects them to phishing pages without them having to do anything except visit a compromised account. Using …
Hotmail gets full-session HTTPS
Firesheep‘s developers can be satisfied. Not only has Microsoft started contemplating SSL for Bing but – as of yesterday – has provided its Hotmail users …
A viable answer to the botnet problem?
As the recent case of the Bredolab botnet takedown has shown yet again, going after C&Cs is ultimately a failed tactic for shutting botnets down. Obviously, it is time to …
Latest IE 0-day exploit finds its way into Eleonore toolkit
Microsoft will likely be forced to issue an out-of-band-patch for the zero-day vulnerability affecting Internet Explorer that has been discovered being exploited in the wild …
Toy robots can guard your home
Worried about burglars ransacking your house? Buy yourself some toy robots! It is what Robert Oschler, a Florida-based programmer, did. He bought a Rovio – a Wi-Fi …
Seven Deadliest Network Attacks
Part of Syngress' "The Seven Deadliest Attack Series", this book introduces the reader to the anatomy of attacks aimed at networks: DoS, MiTM, war dialing, penetration …
Microsoft Kinect may be eavesdropping on you
Released only five days ago, Microsoft’s Kinect seems poised to start a revolution in gaming. And if you are one of the lucky people who already managed to get their …
G20 summit related malicious spam campaign
Spammers are taking advantage of the oddest things. The lately detected spam messages concerning the upcoming G-20 summit in Korea is an example of such a specifically …
Microsoft offers Security Essentials via Windows Update, Trend Micro objects
Trend Micro is crying foul over the latest Microsoft move that sees its U.S. customers being offered to install the company’s free Security Essentials solution through …
Featured news
Resources
Don't miss
- Russian hackers are exploiting recently patched Microsoft Office vulnerability (CVE-2026-21509)
- Notepad++ supply chain attack: Researchers reveal details, IoCs, targets
- Why boards must prioritize non-human identity governance
- Open-source attacks move through normal development workflows
- Product showcase: 2FAS Auth – Free, open-source 2FA for iOS