Zeljka Zorz
Google petitions for a EU security and privacy committee
As one of the reasons behind its practice of keeping users’ IP addresses and search histories Google mentions their use as tools for combating attacks such as the one …
Virus signature checksum risks
The notion of virus signatures is very easy for laymen to grasp if they stick to this analogy: anti-virus solutions detecting malware trying to pass itself as an innocuous …
Foursome fleeing from cyber fraud charges arrested in Mexico
Fleeing to Mexico to avoid prosecution for conspiracy to commit wire and mail fraud, four Texans were arrested last Friday in Cancun. Web Host Industry Review reports that …
Is data stored “in the cloud” protected by the Fourth Amendment?
The implementation of cloud computing by companies and individuals is rising slowly, but steadily. There will always be people who are ready to bear the risk of a new way of …
D-Link routers vulnerability allows hackers to reconfigure admin settings
Recently, SourceSec Security Research announced on its blog that they have discovered a vulnerability in D-Link routers that allows outsiders and insiders to access and edit …
South Korea preparing for cyber war
South Korea is determined not to be caught off guard again when it comes to cyber attacks directed against her. Mimicking the US defensive steps, the South Korea Ministry of …
Phishing attacks escalate, DIY cybercrime kits to blame
It used to be that cybercrime was almost exclusively perpetrated by individuals and groups who had in-depth knowledge about the techniques, mechanisms and technologies on …
Online cybercriminal DarkMarket closed, founder arrested
Who would have thought that Renukanth Subramaniam, a 33-year old former pizza bar worker and dispatch courier, was the founder and one of the site operators of DarkMarket, the …
Twitter message leads to police arrest
“It is the world we live in,” was the sentence that Paul Chambers was hearing all over again during his interrogation by UK law enforcement regarding his imprudent …
Threats 2.0: A glimpse into the near future
Collaboration and socializing, flexible and movable content, interoperability – these are all things that made Web 2.0 the answer to our needs. New technologies to …
Software testing firm says no to responsible disclosure
One of the most debated issues in the world of computer security will soon experience a moment of clarity that will prove one of the sides right. But which? Evgeny Legerov, …
Twitter plans to tighten security
Twitter announced it plans to hire 27 new people on jobs ranging from executive assistant to data analyst, software engineer to interaction designer. For a company as small as …
Featured news
Resources
Don't miss
- Exploits for unauthenticated FortiWeb RCE are public, so patch quickly! (CVE-2025-25257)
- FAPI 2.0: How the OpenID Foundation is enabling scalable interoperability in global healthcare
- pqcscan: Open-source post-quantum cryptography scanner
- Bitdefender PHASR: Proactive hardening demo overview
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)