Zeljka Zorz
5 handy WordPress security plug-ins
WordPress is one of today’s most popular publishing platforms. Like any other system, it needs security. What follows is a list of 5 practical plug-ins that extend its …
DHS to open new cyber operations center
During a roundtable at RSA Conference Europe last week, Philip Reitinger, U.S. Department of Homeland Security (DHS) Deputy Under Secretary for the National Protection and …
Careless spammer reveals tricks of the trade
I guess it had to happen sooner or later. After looking at who knows how many spam-and-scam occurrences, Patrick Fitzgerald of Symantec has struck gold while investigating the …
A closer look at Acunetix Web Vulnerability Scanner 6.5
Web applications are accessible 24 hours a day, 7 days a week and control valuable data since they often have direct access to backend data such as customer databases. SSL and …
UK’s own “three-strikes” anti-piracy law announced
Following the decision of the European Parliament that enables European member states to approve laws that force ISPs to disconnect individuals from the Internet, the UK is …
Spear phishing scammers target Taiwan officials
TrendLabs reports that they have discovered several instances of “spear phishing”. Spear phishing is a specific type of phishing fraud that involves customizable …
China raising a cyber army?
Coming as a confirmation of the assertions made in the report prepared by the Center for Strategic and International Studies, another independent report released by the …
Phishing trends according to the Anti-Phishing Working Group
The Anti-Phishing Working Group issued the results of a survey they conducted in the first half of 2009, in which they sifted through data they collected and some provided by …
Gawker and Gizmodo visitors preyed on by malicious ads
It was only last month that the New York Times was tricked into featuring on their website a malvertisement that took over the visitors’ browser and tried to make them …
Serious cyber attacks on the horizon
A report prepared recently by James A. Lewis, of the Center for Strategic and International Studies, used the recent cyber attacks that targeted the US and South Korea as a …
Suspected European cyber pirates denied Internet access without court order
The verdict is in: Europeans can be cut off the Internet for persistent file-sharing, and it can be done without a court order. According to ISPreview, the decision comes as a …
Beautiful Security: Leading Security Experts Explain How They Think
In Beautiful Security, a bevy of experts describe how they look at a particular aspect of information security. They offer the knowledge they have acquired through many years …