Zeljka Zorz
Shell’s employee database breached: 170,000 records compromised
Oil giant Shell was unpleasantly surprised when it received news of a database containing contact information of some 170,000 of their workers having been emailed to seven …
Fake hi5 invitation carries malware
TrendLabs warns about a malicious spam email campaign that supposedly comes from the popular social networking website and contains a message asking recipients to set up an …
Bank sued for not preventing online theft
Mirroring the lawsuit that a couple from California raised against the Bank of America, Comerica Bank is being sued by Experi-Metal Inc. (EMI), a manufacturing firm from …
Security consultant turned hacker sentenced to 13 years in prison
Max Ray Vision, a 37-year-old hacker from San Francisco, has earned himself a 13 year long prison sentence on account of stealing two million credit card numbers from banks, …
Fake AV with online support service
In the latest Symantec report on rogue AV software, covering a period of one year (July 2008-June 2009), there have been some 43 million installation attempts from over 250 …
Hackers steal $50,000, bank refuses to assume responsibility
Fan Bao and his wife Cathy Huang from Highland Park, California, were shocked when they were notified of two fraudulent money orders that were set to transfer money in the …
Lawful wiretap interfaces accessible to cyber criminals?
The lawful intercept architecture in Cisco Systems’ networking products has been examined and found wanting by Tom Cross, manager of IBM’s X-Force research team. …
Chip and PIN system on banking cards seriously flawed
A team of Cambridge computer researchers has discovered a flaw in the chip and PIN system used on most – if not all – credit and debit cards around the world. The …
Fake AV’s double attack
Fake AV is regularly at the top of the lists of peddled malware, and part of the reason it’s because it is spread in a many different ways: spam, compromised websites, …
Simulated cyber attack will test US Government response
An article in The Atlantic with the title “U.S. To Be Hit By Massive Cyber Attack On Feb. 16. Asterisk.” has set some readers to panic mode because they assumed it …
Hacking games: Key to finding cybersecurity talent
To catch a thief, you must think like a thief – the best way to defend an asset is to get inside the head of the attacker and predict his actions. That’s the …
ZBOT/Zeus makers mock AV companies
The ZBOT/Zeus banking Trojan has been a well-known fixture of the threat landscape these last years, and can thank its developers for the constant changes that keep it from …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege