The flaw can be exploited to conduct denial-of-service attacks or remote hijacking.
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years. He was most recently Editorial Director of BYTE, Dark Reading and Network Computing at UBM Tech. Prior to that he spent over a decade consulting and writing on technology subjects, primarily in the area of security. He is the author of three books and thousands of published articles and many more unpublished, private reports. Larry has been Technical Director at several test laboratories where he both directed and ran product testing, with a special interest in test automation. Larry began his career as a Software Engineer at the now-defunct Desktop Software Corporation in Princeton, NJ, on the team that wrote the NPL 4GL query language. He also worked on corporate IT and software development at Chase Econometrics. Larry is a graduate of the University of Pennsylvania with a degree in Public Policy.
Ms. Violet Blue (tinynibbles.com, @violetblue) is a freelance investigative reporter on hacking and cybercrime at Zero Day/ZDNet, CNET and CBS News, as well as a noted sex columnist. She has made regular appearances on CNN and The Oprah Winfrey Show and is regularly interviewed, quoted, and featured in a variety of publications that includes ABC News and the Wall Street Journal. She has authored and edited award-winning, best selling books in eight translations and has been a sex columnist for the San Francisco Chronicle. She has given keynote talks at such conferences as ETech, LeWeb, and the Forbes Brand Leadership Conference, and has given two Tech Talks at Google. In 2010, the London Times named Blue one of “40 bloggers who really count.” Ms. Blue is the author of The Smart Girl's Guide to Privacy. Violet Blue bio courtesy of TTI Vanguard.
The new attack can be used to spy upon encrypted connections used by tens of thousands of HTTPS websites and mail servers.
Attackers are using smaller bandwidth attacks to last longer, and do more damage.
Ad-blockers harm the internet economy. But they can also help save your privacy. Which do you value more?
Security researchers warn that it may make phishing far more effective.
New research suggests the average financial or commercial business face multiple attacks per month -- and it takes months for data breaches to be detected.
Almost two-thirds of voters believe the Patriot Act should not be reauthorized in its current form.
A version of the client has been tampered to steal user data.
Research suggests despite knowing otherwise, workers worldwide regularly ignore IT policies and place businesses at risk.
A multitude of technology firms hope to stop legislation which would allow law enforcement access to data stored in mobile devices.
RadioShack promised not to sell the data, and there's a past precedent for such a case.
The Kremlin wants to use smartphone technology it can trust -- by cracking open an alternative's source code.
Servers with thousands of people's data was targeted at the university's engineering college.
Now we know the real reason why GCHQ is openly trying to recruit hackers...
Opinion: Security is everyone's responsibility, not just those with the cash to upgrade.