Zeljka Zorz
A closer look at Symantec Security Check
Symantec Security Check is a web-based scan that combines two features: a Security Scan and Virus Detection. To use it, you will be asked to download some components and …
The Pentagon waiting for its computer networks defense command
The Pentagon had planned to launch a cyber command that would be responsible for defending its global network of computer systems on October 1, following it by the appointment …
Twitter and Google account vulnerabilities
Nir Goldshlager, a security researcher and penetration tester, discovered some XSS vulnerabilities in Twitter and Google Calendar that can be exploited by attackers to steal …
Criminal found through World of Warcraft
It seems that law enforcement agencies are getting more creative with ways of leveraging dug up information about wanted criminals. Using the knowledge of a previously …
File-scanning services for malware writers
A lot of people are aware of and are using online file-scanning services when they want to check if a suspicious file they got as an attachment or have found on their computer …
Privacy issues of data collecting
Will 2010 see the beginning of a change in regulations regarding net privacy? It’s hard to tell. The issue has been a matter for dispute for quite some time now, but …
GSM encryption algorithm cracked
The A5/1 privacy algorithm – more commonly known as the GSM algorithm – has been cracked and published by Karsten Nohl, a German encryption expert. He says his …
A closer look at Trend Micro Internet Security 2010
Trend Micro Internet Security detects and removes viruses, spyware, and other threats from your computer, email, instant messages, and downloads, blocks untrustworthy links in …
Insidious: How trusted employees steal millions and why it’s so hard for banks to stop them
Why do employees steal? As you will see in the book, it is a combination of motivation, opportunity and attitude. But it is all underlined by the issue of trust, which is …
Cyber criminals become their own ISPs
Hounded by law enforcement agencies and security experts, cyber criminals have been witnessing the ISPs and hosting providers of their botnets being shut down at a greater …
A closer look at Panda ActiveScan 2.0 – Free Antivirus
Panda’s ActiveScan is an online security solution that scans your computer for viruses, worms and Trojans, spyware and other Internet threats. It detects and eliminates …
Facebook clickjacking attack spreads
A new clickjacking attack has targeted Facebook users. It presents itself in the form of a comment on the users’ account looking like this: The photos are, obviously, …
Featured news
Resources
Don't miss
- Your encrypted data is already being stolen
- REMnux v8 brings AI integration to the Linux malware analysis toolkit
- LockBit 5.0 ransomware expands its reach across Windows, Linux, and ESXi
- Microsoft equips CISOs and AI risk leaders with a new security tool
- OpenClaw creator Peter Steinberger joins OpenAI