Zeljka Zorz
Fake Amazon email ships malware
The image of an open Amazon delivery box has a prominent place in the latest spam campaign that aims to trick users into downloading an alleged order update coming from the …
Rogue Android banking applications
Following a couple of announcements made in December by the likes of Travis Credit Union and First Tech Credit Union, a big brouhaha was raised about some mobile banking …
IRS spam campaign delivers malware
The end-of-year holidays have come and gone, and holiday scams are for the moment put on hold as tax season is approaching. TrendLabs warn about the latest spamming campaign …
Job seekers targeted by online scams
It’s hard times for job seekers around the world, made even harder by the fact that they have been heavily targeted by those who don’t have qualms about taking …
Privacy rights under attack
I think we can all agree about the fact that privacy has become an increasingly fluid concept with the advent of social networks. Yes, you can choose what you post, but your …
Your files held for ransom
F-Secure alerts about the latest scheme that tries to make you buy rogue software to “repair” your “corrupted” files. It starts when you get infected …
Can a router hack expose your physical location?
Remember the Samy worm? The author of the first major worm that took advantage of cross-site scripting to propagate itself all across MySpace has found and exploited another …
Hacking: The Next Generation
We have all been witnessing new kinds of attacks emerging thanks to new technologies and ways of using our computers and networks. The use of social media, an increasingly …
Cybersecurity expert: Job guaranteed
Computer security used to be regarded as a boring and less important field of computer science, but with the proliferation of computer threats (from malware to active attacks) …
A closer look at Symantec Security Check
Symantec Security Check is a web-based scan that combines two features: a Security Scan and Virus Detection. To use it, you will be asked to download some components and …
The Pentagon waiting for its computer networks defense command
The Pentagon had planned to launch a cyber command that would be responsible for defending its global network of computer systems on October 1, following it by the appointment …
Twitter and Google account vulnerabilities
Nir Goldshlager, a security researcher and penetration tester, discovered some XSS vulnerabilities in Twitter and Google Calendar that can be exploited by attackers to steal …
Featured news
Resources
Don't miss
- Claude helps researcher dig up decade-old Apache ActiveMQ RCE vulnerability (CVE-2026-34197)
- Acrobat Reader zero-day exploited in the wild for many months
- AI agent intent is a starting point, not a security strategy
- Asqav: Open-source SDK for AI agent governance
- BlueHammer: Windows zero-day exploit leaked