Zeljka Zorz
More privacy rights violations in China
In a move that has been interpreted as yet another violation of privacy rights, the Chinese government has announced a campaign against pornography that will include automatic …
Banking Trojan coming at you from all sides
Using the very effective tactic of multiple attack vectors, the makers of the Zbot banking Trojan are ensuring a high enough infection rate for them to make profit. A recent …
Pharma spam on forums near you
Forever searching for new ways to accost naive shoppers, fake and/or illegal on-line pharmacy sites have lately taken to forcing their ads on unsuspecting forum visitors. …
SASFIS Trojan treads lightly
The SASFIS Trojan variants may be not as famous and well-known as BREDOLAB’s or Zeus/Zbot’s, but they still pose a considerable danger to users and networks around …
Fear of stealth hackers
One of the biggest fears that software companies have is that someday hackers will manage to steal the source code of their products and modify it so that they can secretly …
Hiding from Google
Worried about Google tracking your online activity? Not satisfied with Tor’s speed? A (partial) solution to your problem has been set up by Moxie Marlinspike, a hacker …
Networks Solutions breached, hundreds of sites defaced
Network Solutions, the well-known U.S. hosting provider and domain registrar that manages over 6.6 million domain names, confirmed on Tuesday that their servers have been …
Google petitions for a EU security and privacy committee
As one of the reasons behind its practice of keeping users’ IP addresses and search histories Google mentions their use as tools for combating attacks such as the one …
Virus signature checksum risks
The notion of virus signatures is very easy for laymen to grasp if they stick to this analogy: anti-virus solutions detecting malware trying to pass itself as an innocuous …
Foursome fleeing from cyber fraud charges arrested in Mexico
Fleeing to Mexico to avoid prosecution for conspiracy to commit wire and mail fraud, four Texans were arrested last Friday in Cancun. Web Host Industry Review reports that …
Is data stored “in the cloud” protected by the Fourth Amendment?
The implementation of cloud computing by companies and individuals is rising slowly, but steadily. There will always be people who are ready to bear the risk of a new way of …
D-Link routers vulnerability allows hackers to reconfigure admin settings
Recently, SourceSec Security Research announced on its blog that they have discovered a vulnerability in D-Link routers that allows outsiders and insiders to access and edit …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations