As further proof that no one is immune to making mistakes, two of the algorithms competing to be the next hash standard were found to contain buffer overflows.The government board in charge of nominating standard cryptographic algorithms, NIST, has been holding a competition to choose the next standard hash scheme.
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Violet Blue is the author of The Smart Girl's Guide to Privacy. She contributes to ZDNet, CNET, CBS News, and SF Appeal.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years
eBay solutions provider Auctiva.com suffered a malware attack during the weekend, resulting in a "this site may harm your computer" badware warning which affected hundreds of thousands of customers and their eBay auctions.
That was fast. Chinese hackers collaborating with the Chinese Hacking Union, a two-years old training community for wannabe hackers, hacked and defaced the official web site of the General Consulate of the Russian Federation in Shanghai, PRC in response to the recent accusations that a Russian navy vessel has sank a Chinese cargo ship.
While it may sound like treating all ISP traffic equally is a good idea, mandating strict net neutrality hurts computer security for all of us.Those of you who are tech heads and reside in the United States should all be familiar with the Net Neutrality debate, but for those of you who aren't, the debate centers around an ISP's ability to treat traffic differently depending upon application and purpose.
Yesterday, Adobe confirmed the existence of a critical vulnerability affecting Adobe Reader and Acrobat versions 9.0 and earlier, originally detected by the Shadowserver Foundation last week.
Impersonation is a form of flattery by itself, however, not when it comes to the very latest round of rogue security software this time impersonating ZDNet, CNET's and PC Magazine's reviews section, making it look like legitimate and highly respected technology sites have actually reviewed and recommend the rogue security software.
F-Secure and Fortinet are investigating a newly discovered mobile malware identified as SymbOS/Yxes.A!
Researchers at TrendMicro have detected a targeted malware attack exploiting last week's patched critical MS09-002 vulnerability affecting Internet Explorer 7. Upon opening the spammed Microsoft office document, vulnerable users are automatically forwarded to a Chinese live exploit site which still remains active.
A week after a newly launched crimeware tracking service went public, cybercriminals didn't hesitate to prove its usefulness by launching a distributed denial of service attack (DDoS) against it. According to the Swiss security blog, the Zeus tracker came under attack from a previously known source that also attacked abuse.
The New York Times ran an article on a new academic research project whose goal is to redesign the Internet from scratch. The most valuable product that will come from this effort is not new technology, but formally trained security researchers.