Zeljka Zorz
Trojan stealing private key certificates
As you may have already noticed, malware peddlers have realized that their wares have a greater chance of being loaded by the targeted system if they are digitally signed. The …
A standardized format for cybercrime reporting
“Cybercrime is emerging as a very concrete threat. Considering the anonymity of cyberspace, it may in fact be one of the most dangerous criminal threats ever,” …
Trojan posing as installer wants your money
A Trojan masquerading as an installer for well-known applications such as DivX, μTorrent, LimeWire, Avast! Antivirus and others has been popping up on users’ …
XSS Twitter flaw used to expose users to potentially malicious sites
Earlier this morning, Sophos begin to warn people about a new Twitter XSS flaw that is being used by malicious individuals to redirect users to third-party websites without …
Win free tickets for GRC 2010 in Lisbon
At the end of October, an event named GRC 2010 is to be held in Lisbon, Portugal, and it proposes to bring to its participants the main challenges that managers involved in …
Fake “universal” iPhone jailbreaking exploit contains Trojan
When Apple released iOS 4.0.2 which, among other things, patched the vulnerabilities that allowed iPhone owners to jailbreak their device, these users were faced with the …
4chan users take MPAA, RIAA websites down with DDoS attacks
The websites of the Motion Picture Association of America (MPAA) and Indian tech firm Aiplex Software were crashed by DDoS attacks yesterday. The architects and executors of …
Google rolls out 2-factor authentication for Gmail and Apps
In view of the ever increasing number of successful phishing attacks that leave users with compromised accounts, Google has announced the introduction of two-step verification …
Cybercriminals steal Interpol Chief’s identity to access info on fugitives
Ronald Noble, Interpol’s Secretary General, has revealed that cybercriminals have opened two fake Facebook accounts using his name and used them to gather sensitive …
Smartphone security risks and best practices research
ENISA is looking into smartphones and determining best practices for their use while researching the risks. Several manufacturers have been involved: RIM, Google, Microsoft, …
How do we defend the Internet of the future?
As the Internet evolves, it will offer a vast array of possibilities such as new types of health services, personalized and mixed reality entertainment, and more. With new …
Inside backup and storage: The expert’s view
How much data do we create? How do we secure it? Store it? Retrieve it? When professional community Wikibon recently translated the amount of digital information that is …
Featured news
Resources
Don't miss
- The roles and challenges in moving to quantum-safe cryptography
- Product showcase: Blokada for Android gives users control over network traffic
- Passwords are still breaking compliance programs
- Pharma’s most underestimated cyber risk isn’t a breach
- AI security risks are also cultural and developmental