Zeljka Zorz
Fake AV with online support service
In the latest Symantec report on rogue AV software, covering a period of one year (July 2008-June 2009), there have been some 43 million installation attempts from over 250 …
Hackers steal $50,000, bank refuses to assume responsibility
Fan Bao and his wife Cathy Huang from Highland Park, California, were shocked when they were notified of two fraudulent money orders that were set to transfer money in the …
Lawful wiretap interfaces accessible to cyber criminals?
The lawful intercept architecture in Cisco Systems’ networking products has been examined and found wanting by Tom Cross, manager of IBM’s X-Force research team. …
Chip and PIN system on banking cards seriously flawed
A team of Cambridge computer researchers has discovered a flaw in the chip and PIN system used on most – if not all – credit and debit cards around the world. The …
Fake AV’s double attack
Fake AV is regularly at the top of the lists of peddled malware, and part of the reason it’s because it is spread in a many different ways: spam, compromised websites, …
Simulated cyber attack will test US Government response
An article in The Atlantic with the title “U.S. To Be Hit By Massive Cyber Attack On Feb. 16. Asterisk.” has set some readers to panic mode because they assumed it …
Hacking games: Key to finding cybersecurity talent
To catch a thief, you must think like a thief – the best way to defend an asset is to get inside the head of the attacker and predict his actions. That’s the …
ZBOT/Zeus makers mock AV companies
The ZBOT/Zeus banking Trojan has been a well-known fixture of the threat landscape these last years, and can thank its developers for the constant changes that keep it from …
32% of computers with AV protection are infected
A SurfRight report shows statistics that give credibility to the lately popular opinion that one anti-virus solution is no longer enough to be sure your computer isn’t …
Botnet turf war on the horizon
It seems that one of the predictions for 2010 from Websense’s report is likely to come true: bots will be able to detect and actively uninstall competitor bots. SpyEye …
Operation Aurora malware investigated
Operation Aurora has become a name that is instantly recognized by everyone involved in cyber security. Speculation still abounds regarding the people and/or nation behind it, …
Government sites crumple under Operation Titstorm’s DDoS attack
Following the announced Internet censorship plans of the Australian government, which will likely include Internet filtering and the banning of some forms of pornography, the …
Featured news
Resources
Don't miss
- Chinese cyber spies are using Ivanti EPMM flaws to breach EU, US organizations
- TikTok videos + ClickFix tactic = Malware infection
- DanaBot botnet disrupted, QakBot leader indicted
- Is privacy becoming a luxury? A candid look at consumer data use
- Unpatched Windows Server vulnerability allows full domain compromise