An electronic road sign hacked to alert drivers to hoards of the undead provides a nice pedagogical example of why SCADA security is such a "big deal".Earlier this week a road sign was hacked to warn drivers about zombies disturbing their evening commute.
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Violet Blue is the author of The Smart Girl's Guide to Privacy. She contributes to ZDNet, CNET, CBS News, and SF Appeal.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years
Less than six months after banking a $2 million funding round, Atlanta-based security-as-a-service startup Purewire has made its first acquisition -- online reputation management vendor Opinity. Financial terms were not released.
Google has shipped a high-priority Chrome browser patch with fixes for three security vulnerabilities that expose users to cross-site scripting and data theft attacks.Google Chrome's beta and stable channels have been updated to version 1.
From the real-time syndication of hot Google Trends keywords, maintaining AdWords campaigns, to the plain simple blackhat search engine optimization tactics, cybercriminals are constantly looking for new ways to acquire traffic by enjoying the clean reputation of each and every Web 2.0 property.
Two Mac trojan outbreaks were spotted in the past week leaving several people, including myself, to wonder if the tipping point for the Mac malware epidemic has arrived. Frankly, I don't know, but I tend not to think so.
A noted security analyst has proposed a new twist on the traditional denial of service model where attackers purposefully inflate the bills of cloud service users until they can no longer afford service.Christofer Hoff, the Chief Security Architect at Unisys, has recently been discussing the concept of an Economic Denial of Sustainability on his blog.
No weak password can survive a GPU-accelerated password recovery attack. Last week's released Wireless Security Auditor is prone to shorter the time it takes for a network administrator to pen-test the strength of the WPA/WPA2-PSK passwords used on the wireless network.
Researchers at Intego have intercepted a Mac OS X malware threat circulating in pirated copies of Apple's iWork 09 software.The malicious file, dubbed OSX.
Kaspersky Lab today warned users of five newly found variants of the Trojan-SMS.Python.
Apple today released QuickTime 7.6 to fix at least seven serious security flaws that expose Mac OS X and Windows users to remote code execution attacks.