Violet Blue

Violet Blue is the author of The Smart Girl's Guide to Privacy. She contributes to ZDNet, CNET, CBS News, and SF Appeal.

Larry Seltzer

Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years

Latest Posts

Microsoft is 5th most spam-friendly ISP

Spammers are abusing Microsoft's online services at such an alarming rate that a non-profit spam fighting group now lists Microsoft as the world's 5th most spam-friendly ISP (Internet Service Provider).The latest update of Spamhaus.

November 21, 2008 by Ryan Naraine

27 Comments

Verizon snoops peek at Obama's cell phone records

Nosy Verizon employees improperly accessed and peeked at Barack Obama's personal cell phone records, the company said in a statement acknowledging the privacy breach.In the statement, Verizon Wireless chief executive Lowell McAdam apologized to the President-elect and vowed that the errant employees will be disciplined.

November 20, 2008 by Ryan Naraine

8 Comments

What does the spam ISP shutdown really mean?

It has been over a week since the takedown of an ISP responsible for directing a large portion of Internet's spam. While many groups immediately hailed a massive drop in spam, the true story was more nuanced.

November 19, 2008 by Adam O'Donnell

7 Comments

Malware found in Lenovo software package

Computer maker Lenovo is shipping a malware-infected software package to Windows XP users, according to warning from anti-virus researchers at Microsoft.The malicious file was identified by Microsoft as Win32/Meredrop, a Trojan dropper that is used to install and execute multiple malicious executables on an infected computer.

November 19, 2008 by Ryan Naraine

74 Comments

Fake Windows XP activation trojan goes 2.0

Known as Kardphisher and "in the wild" since April, 2007, last week the malware author of this trojan horse mimicking the Windows XP activation interface while collecting the credit card details the end user has submitted, has made significant changes to visual interface and usability of the trojan, consequently improving its authenticity. Guess what happens when a gullible end user falls victim into this social engineering attack?

November 18, 2008 by Dancho Danchev

134 Comments

Commercial vendor of spyware under legal fire

Just like every decent marketer out there, vendors of commercial malware tools are very good at positioning their tools. However, their pitches often contradict with themselves in a way that what's promoted as a Remote Administration Tool, has in fact built-in antivirus software evading capabilities, rootkit functionality and tutorials on how to remotely infect users over email.

November 18, 2008 by Dancho Danchev

3 Comments

What really happened to the candidates' computers?

Now that two weeks have passed since the end of the presidential campaigns, it is worthwhile to take a look at what I think should have one of the biggest cybercrime stories of the year. As Ryan blogged the day after the election, both the McCain and the Obama campaigns' systems were compromised by an external party, and this compromise lead to a massive data exfiltration.

November 18, 2008 by Adam O'Donnell

7 Comments