Guest editorial by Roel SchouwenbergAs Dancho Danchev pointed out, the BBC leased itself a botnet. I couldn't quite believe it when I read it.
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Violet Blue is the author of The Smart Girl's Guide to Privacy. She contributes to ZDNet, CNET, CBS News, and SF Appeal.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years
Cyberwarfare consisting of citizen militias and the digital equivalent of cheap rifles does not preclude the existence of more effective weaponry.First, a history lesson.
The primary motives that are being cited for cloud computing, such as lower operational cost, scalability to elastic demand, and high availability, have all been addressed before in the underground.Have you ever heard of this thing called "Cloud Computing"?
Update: BBC Click's tweet states that they took legal advice following comments on the potential violation of U.K's Computer Misuse Act.
Hackers can create malicious podcasts to hijack usernames and passwords from Apple's iTunes software.According to a warning from Apple, a "design issue" in the iTunes podcast feature can be abused via rigged audio files to cause an authentication dialog to be presented to the user.
In a presentation at SOURCE Boston, Dr. Jose Nazario of Arbor Networks stated that DDoS applications are moving from the domain of trained attackers to tools for the average person to voice a political statement.
After weeks of swinging and missing on proper response to a gaping security hole in its ever-present PDF Reader software, Adobe has finally shipped a patch but only for some affected users.On the same day Microsoft issued its scheduled batch of patches, Adobe dropped a security bulletin warning of a "critical" vulnerability in Adobe Reader 9 and Acrobat 9 and earlier versions.
Microsoft today shipped three security bulletins with fixes for at least 8 documented vulnerabilities affecting millions of Windows OS users.The most serious of this month's patch batch is rated "critical" and could allow full remote execution attacks if a Windows user is simply lured into viewing a booby-trapped image file.
Can you teach an old employee new phishing protection tricks?In a recently presented study by the Intrepidus Group, the company behind the PhishMe.
According to a security group going under the name of TeamElite, the international sites of Kaspersky Iran (kasperskylabs.ir), Taiwan (web.