Zack Whittaker

Zack Whittaker is the security editor for ZDNet, covering cybersecurity, national security, policy and privacy. He is based out of the New York newsroom, and can also be found on sister sites CNET and CBS News. You can contact him with his PGP key: EB6CEEA5.

Charlie Osborne

Charlie Osborne, a medical anthropologist who studied at the University of Kent, UK, is a journalist, freelance photographer and former teacher. She has spent years travelling and working across Europe and the Middle East as a teacher, and has been involved in the running of businesses ranging from media and events to B2B sales. Charlie currently works as a journalist and photographer -- with the occasional design piece -- and writes for ZDNet, CNET and SmartPlanet. She has particular interests in social media, IP law, social engineering and security.

Latest Posts

WPA Wi-Fi encryption (partially) cracked

WPA Wi-Fi encryption (partially) cracked

Rob McMillan at IDG has the scoop on new research that shows it's possible to partially crack the WPA (Wi-Fi Protected Access) encryption standard.Full details of the theoretical attack is not yet known but McMillan reports that two security researchers -- Erik Tews and Martin Beck -- plan to discuss the issue at next week's PacSec conference in Japan.

November 6, 2008 by in Security

Obama-related spammed trojan propagating worldwide

Obama-related spammed trojan propagating worldwide

Several security companies including F-Secure, Sunbelt, and my employer Cloudmark (disclosure) are reporting a large volume of Obama-related spam that links to malware. This is just the latest twist on the long-running theme of social engineering end users into installing web-based malware.

November 5, 2008 by in Security

Remote buffer overflow bug bites Linux Kernel

Remote buffer overflow bug bites Linux Kernel

A remote buffer overflow vulnerability in the Linux Kernel could be exploited by attackers to execute code or cripple affected systems, according to a Gentoo bug report that just became public.The flaw could allow malicious hackers to launch arbitrary code with kernel-level privileges.

November 5, 2008 by in Enterprise Software

GOP gearing up legal attack on e-voting machines

GOP gearing up legal attack on e-voting machines

According to TPM Muckraker and this press release, the Republican National Committee is lining up the computer forensics firm Forensicon to provide analysis on e-voting machines to form the basis of a legal attack against the validity of the 2008 presidential election.

November 4, 2008 by in Security

Google and T-Mobile push patch for Android security flaw

Google and T-Mobile push patch for Android security flaw

During the weekend, Google and T-Mobile pushed a patch fixing last week's disclosed security flaw affecting Google's Android. The flaw and the PoC were communicated to Google on October 20th, with the vulnerability itself made possible due to Android's use of outdated third-party software packages.

November 4, 2008 by in Mobility

Will e-voting machines tilt the election?

Will e-voting machines tilt the election?

Unless you have been living under a rock for the past 24 months, you should be well aware that tomorrow millions of Americans will be going to the polls to select their representative, one-third of their senators, and the next president. In general, Americans have become wary of the election process ever since the litigation that follows the 2000 election.

November 3, 2008 by in Hardware

Spammers targeting Bebo, generate thousands of bogus accounts

Spammers targeting Bebo, generate thousands of bogus accounts

The concept of building a fraudulent ecosystem by abusing legitimate services only is nothing new, and as we've already seen numerous times throughout the year, malicious attackers are actively embracing it. Bebo, the popular social networking site is currently under attack from spammers that are automatically registering thousands of bogus accounts advertising fake online pharmacies, with the campaign owners receiving revenue through an affiliate based program.

October 31, 2008 by in Social Enterprise

Happy 20th birthday, internet worm!

Happy 20th birthday, internet worm!

This weekend marks the 20th anniversary of the Internet Worm, the first major worm that propagated on the Internet. Even though many years have passed and underlying media has changed, worms are still able to wreak havoc and keep system administrators up at night.

October 30, 2008 by in Security

Phishers apply quality assurance, start validating credit card numbers

Phishers apply quality assurance, start validating credit card numbers

With the exact number of end users interacting with phishing emails by submitting bogus data still unknown, phishers are on the other hand continuing to apply basic quality assurance processes ensuring that they will be collecting only validated credit card details, and limiting the opportunity for researchers and end users to poison their campaigns.

October 30, 2008 by in Security

Newsletters

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.
See All
See All

Top Stories