* Ryan Naraine is away on vacation.Guest editorial by Guillaume Lovet Ah, Web 2.
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Violet Blue is the author of The Smart Girl's Guide to Privacy. She contributes to ZDNet, CNET, CBS News, and SF Appeal.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years
Spammers are abusing Microsoft's online services at such an alarming rate that a non-profit spam fighting group now lists Microsoft as the world's 5th most spam-friendly ISP (Internet Service Provider).The latest update of Spamhaus.
Nosy Verizon employees improperly accessed and peeked at Barack Obama's personal cell phone records, the company said in a statement acknowledging the privacy breach.In the statement, Verizon Wireless chief executive Lowell McAdam apologized to the President-elect and vowed that the errant employees will be disciplined.
Apple has released iPhone OS 2.2 with patches for 12 documented security flaws, some very serious.
Under sustained attack from what is described as a rapidly spreading network worm, the U.S.
It has been over a week since the takedown of an ISP responsible for directing a large portion of Internet's spam. While many groups immediately hailed a massive drop in spam, the true story was more nuanced.
Computer maker Lenovo is shipping a malware-infected software package to Windows XP users, according to warning from anti-virus researchers at Microsoft.The malicious file was identified by Microsoft as Win32/Meredrop, a Trojan dropper that is used to install and execute multiple malicious executables on an infected computer.
Known as Kardphisher and "in the wild" since April, 2007, last week the malware author of this trojan horse mimicking the Windows XP activation interface while collecting the credit card details the end user has submitted, has made significant changes to visual interface and usability of the trojan, consequently improving its authenticity. Guess what happens when a gullible end user falls victim into this social engineering attack?
Just like every decent marketer out there, vendors of commercial malware tools are very good at positioning their tools. However, their pitches often contradict with themselves in a way that what's promoted as a Remote Administration Tool, has in fact built-in antivirus software evading capabilities, rootkit functionality and tutorials on how to remotely infect users over email.
Now that two weeks have passed since the end of the presidential campaigns, it is worthwhile to take a look at what I think should have one of the biggest cybercrime stories of the year. As Ryan blogged the day after the election, both the McCain and the Obama campaigns' systems were compromised by an external party, and this compromise lead to a massive data exfiltration.