Zeljka Zorz
Data harvested from Facebook used in boiler room scams
You may think you are being particularly prudent by not putting all of your personal information on your social network account, and you are right to think so. But what if you …
A closer look at USB Secure 1.3.0
USB Secure helps you password protect USB drives, thumb drives, memory cards, external drives and flash drives. It supports plug and play and runs automatically once a USB …
Researcher hacks security encryption chip found on millions of PCs
The Trusted Platform Module (TPM), a secure chip that stores cryptographic keys and when activated adds an extra layer of protection through encryption, has been until now …
Phishing site spoofing secure login page
A phishing site masquerading as the secure login page of CenturyLink, the fourth largest local exchange telephone carrier in the US in terms of access lines, has been …
Zero-day vulnerabilities on the market
Zero-day vulnerabilities have become prized possessions to attackers and defenders alike. As the recent China-Google attack demonstrated, they are the basis on which most of …
Sensitive information retrieved from P2P networks
Security researchers Larry Pesce and Mick Douglas demonstrated on Friday – at this year’s ShmooCon security conference in Washington, D.C – the amazing …
Biggest Chinese hacker training site taken down
Black Hawk Safety Net, the biggest Chinese hacker training site, has been shut down by the police. The tally is: three people arrested; nine Web servers, five computers and …
Can you trust Chinese computer equipment?
Steven J. Vaughan-Nichols, a blogger for IT World, raised the question, but before answering it, let’s take a look at the current backdrop that should affect the …
Infected Firefox add-ons pulled off official site
Two infected Firefox add-ons managed to avoid detection and were put online, available to download, on Firefox’s official add-on download site. The one thing that …
Social networks are a danger zone
It seems that everybody is on some kind of social network these days. Checking out what our friends are doing has become part of daily routine. In today’s world, they …
Google and NSA team up to fend off future attacks
Google and the NSA reached an agreement that will see the security agency helping with the investigation of the latest attack of the Internet giant that supposedly carried out …
A closer look at File Encryption XP 1.5
File Encryption XP is a file and folder encryption program that uses the Blowfish algorithm with a 384-bit key. The files are completely self-contained which means that, if …