Zeljka Zorz
Stalker jailed for planting child porn on a computer
An elaborate scheme to get the husband of a co-worker he was obsessed with locked up in jail, backfired on Ilkka Karttunen, a 48-year from Essex. His plan was to get the …
Hacked Yahoo email accounts in China and Taiwan
Yahoo email accounts of several journalists and human activists have been hacked and their contents likely downloaded in what seems like an organized attack concentrated on …
Breached companies are not entitled to anonymity
Does the recent decision by District Judge Douglas Woodlock – to unseal the identities of two companies (J.C. Penney and Wet Seal) whose customer data has been stolen by …
Researcher exploits PDF file without using a vulnerability
Didier Stevens, security researcher and expert on malicious PDF files, has succeeded in creating a proof-of-concept PDF file that uses the launch action triggered by the …
A closer look at Steganos Safe
Steganos Safe creates a password-protected virtual safe to store your photos, music, documents, and more. It also shreds unwanted files permanently and defeats data recovery …
Malware spread fueled by fear of money loss
Cyber crooks have learned long ago that potential targets respond well to scare tactics, and this the kind of social engineering approach that two recent spam campaigns …
SEO poisoning campaign about Moscow subway explosions
Another SEO poisoning campaign has been started by conscienceless cyber criminals – this one takes advantage of the people’s interest in the news regarding the …
There is no such thing as Facebok AV
A rogue application claiming to be a Facebook AV has been spreading through the Friends list of its targets. Once installed, the application spreads by taking a picture like …
Facebook to share your data with “pre-approved” third-party sites?
Facebook released a plan to revise its privacy policy again. Among the features they propose to incorporate is one that made a lot of people raise their voices in opposition, …
Office photocopiers brimming with corporate secrets
Most people fail to realize that modern, multi-purpose photocopiers contain hard drives that – if not erased when decommissioned – could prove to be a treasure …
Phishing Indian employers and job seekers
People seeking jobs online have been targeted a number of times since the advent of the economic recession, but in India even the potential employers become targets. Symantec …
Fake updater destroys software’s ability to auto-update
A new type of malware variants was discovered by researchers of Vietnam-based security company Bkis. The variants look like the legitimate update programs of popular software …
Featured news
Resources
Don't miss
- Attackers are exploiting RCE vulnerability in BIG-IP APM systems (CVE-2025-53521)
- TeamPCP strikes again: Backdoored Telnyx PyPI package delivers malware
- CISA sounds alarm on Langflow RCE, Trivy supply chain compromise after rapid exploitation
- Top product launches at RSAC 2026
- Researchers release tool to detect stealthy BPFDoor implants in critical infrastructure networks