Zeljka Zorz
Chrome unique IDs removed after first update
Google decided to appease privacy advocates by making the “unique ID” feature “disappear” when the Chrome browser checks for updates for the first time …
Facebook removes “stalker” apps
A short-lived resurgence of “stalker” applications was promptly squashed by Facebook a few days ago when many users received notifications or wall posts from their …
Mac OS X ransomware – just a matter of time?
For years now, IT experts have been predicting the advent of threats to Mac users that would mirror those faced by the Windows-using crowd. While Mac malware does exist, and …
Vast online data leak in South Korea
South Korean retailer Shinsegae and 24 other companies have been breached and private data on 20 million customers has been stolen, forcing the Ministry of Public …
The rise of amateur-run botnets
It used to be that cyber criminals were people with a highly technical skill set, but this is not the norm anymore. This fact became obvious some two weeks ago when news of …
News of Corey Haim’s funeral lead to fake AV
Corey Haim’s death is old news by now, but fans of the prematurely deceased teen idol are still on the lookout for information concerning his death. Those interested in …
The threat landscape is changing, AV fails to adjust
A recent testing conducted by NSS Labs presented us with some deplorable results: of the seven antivirus products tested two weeks after the IE bug used for breaching Google …
Playstation emulator installs malware
Playing again the games you used to amuse yourself with for hours some years ago could bring a smile to your face, but it could also get your computer infected. Searching for …
Exploit for IE 0-day flaw published, patch still unavailable
An Israeli hacker has created an exploit for the IE zero-day flaw that Microsoft warned about on Tuesday, and the code is already being inserted into the Metasploit Framework. …
Targeted attacks exploiting PDF bugs are soaring
Adobe is having a hard time fighting its bad reputation when it comes to products riddled with vulnerabilities. Adobe Reader exploits seem the weapon of choice of many a cyber …
Basic security measures do wonders
Deep down inside, we all wish for a unique solution that will protect our machine or our network completely forever and ever, preferably one that can be activated with a …
Twitter tackles phishing problem
In a bid to obstruct the phishing onslaught that has lately been targeting its users, Twitter has announced that it will rout the submitted direct messages through a new URL …
Featured news
Resources
Don't miss
- Chinese cyber spies are using Ivanti EPMM flaws to breach EU, US organizations
- TikTok videos + ClickFix tactic = Malware infection
- DanaBot botnet disrupted, QakBot leader indicted
- Is privacy becoming a luxury? A candid look at consumer data use
- Unpatched Windows Server vulnerability allows full domain compromise