The country has finally admitted to the existence of units dedicated to cyber warfare.
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years. He was most recently Editorial Director of BYTE, Dark Reading and Network Computing at UBM Tech. Prior to that he spent over a decade consulting and writing on technology subjects, primarily in the area of security. He is the author of three books and thousands of published articles and many more unpublished, private reports. Larry has been Technical Director at several test laboratories where he both directed and ran product testing, with a special interest in test automation. Larry began his career as a Software Engineer at the now-defunct Desktop Software Corporation in Princeton, NJ, on the team that wrote the NPL 4GL query language. He also worked on corporate IT and software development at Chase Econometrics. Larry is a graduate of the University of Pennsylvania with a degree in Public Policy.
Ms. Violet Blue (tinynibbles.com, @violetblue) is a freelance investigative reporter on hacking and cybercrime at Zero Day/ZDNet, CNET and CBS News, as well as a noted sex columnist. She has made regular appearances on CNN and The Oprah Winfrey Show and is regularly interviewed, quoted, and featured in a variety of publications that includes ABC News and the Wall Street Journal. She has authored and edited award-winning, best selling books in eight translations and has been a sex columnist for the San Francisco Chronicle. She has given keynote talks at such conferences as ETech, LeWeb, and the Forbes Brand Leadership Conference, and has given two Tech Talks at Google. In 2010, the London Times named Blue one of “40 bloggers who really count.” Ms. Blue is the author of The Smart Girl's Guide to Privacy. Violet Blue bio courtesy of TTI Vanguard.
A collection of notable security news items for the week ending March 20, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
The plugin's security problem could be exploited to allow remote attackers to conduct arbitrary server-side code execution.
The biggest mystery is why the retail and mobile giant has kept quiet for so long.
The update fixes a security vulnerability with the highest severity rating, which could allow a hacker to launch a denial-of-service attack against a server.
The former FireEye executive will lead the company in developing ways to combat APTs, Zero days and new, advanced threats.
The marketplace, used to sell everything from drugs to hacking services, has disappeared without a trace.
Researchers from FireEye claim the security risks posed by the FREAK flaw are far from over.
Could the DARPA-funded tool prevent security disasters such as the Heartbleed bug?
The multi-state health insurance company was attacked in January and is working with the FBI to determine the cause of the breach.
The open-source library will receive an update later this week that will fix a number of security flaws, including one of the highest rated severity.
Microsoft warned of "attempts to spoof content, perform phishing attacks, or perform man-in-the-middle attacks," but reports quickly began to pin blame on the company.
Breaches are unavoidable, but how do you convince management to spend more on incident response? It's like betting on failure.
According to IBM, roughly one billion personal records were leaked in 2014 due to online threats and cyberattacks.
The social networking giant (and many others) don't have the option to say they have received no secret demands for user data -- only "some."
The best of ZDNet, delivered
- 1 The top ten most common database security vulnerabilities
- 2 Yes, the FBI and CIA can read your email. Here's how
- 3 Symantec releases simplified Norton Security line
- 4 Google.com now 'censors' explicit content from image searches
- 5 Six clicks: How hackers use employees to break through security walls