Despite the skepticism surrounding Kris Kaspersky's upcoming "Remote code execution through Intel CPU bugs" presentation to be held at this year's...
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Violet Blue is the author of The Smart Girl's Guide to Privacy. She contributes to ZDNet, CNET, CBS News, and SF Appeal.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years
Lost in the shuffle of this month's Patch Tuesday barrage is the fact that a critical vulnerability in the ever-present Windows Media Player (WMP) was not fixed "because of a last minute quality issue."Microsoft originally listed the WMP update in the advance notice for August but, when the patches dropped on Tuesday, it had slipped because of patch-quality concerns.
Will disclose Nokia s40 security vulnerabilities for money?
Guest editorial by Derek CallawayThis post is meant to provide an approximation of BIND nameserver updates that occurred during the past month, most likely in response to Dan Kaminsky's DNS cache poisoning vulnerability. I conducted this research because I was curious as to how widely BIND nameserver updates have been deployed given that a month has passed since US-CERT first alerted the public about the nature of the vulnerability and availability of patches.
The PHP Group has shipped the last and final patch in the PHP 4.4 series.
L0pht hacker Kingpin is getting ready for prime time.Joe Grand, who used the Kingpin handle in his time as a member of the Boston hacker crew, will co-host Prototype This!
VMware boss Paul Maritz is blaming "a piece of code" mistakenly left in the final release of ESX for the time-bomb hiccup that crippled virtual machines around the world.In a message posted online, Maritz said the glitch caused a license expiration hiccup that caused virtual machines to be powered off, suspended fail or disrupted migration.
Heads-up to Joomla users: There's a patch out for a critical password-reset forgery issue that could compromise your content management system. Oh, by the way, it's already being actively exploited.
There are confirmed reports on a new version of the Gpcode ransomware being spread via a botnet.According to Vitaly Kamluk of Kaspersky Lab (my employer), the Trojan encrypts files on an infected machine (AES-256) and leaves a text file named crypted.
Microsoft patched 26 vulnerabilities with its latest patch including 20 flaws that were deemed critical.Here's the rundown of critical flaws (full bulletin):CVE-2008-2254, CVE-2008-2255, CVE-2008-2256, CVE-2008-2257, CVE-2008-2259 and CVE-2008-2258: These patches fix IE 5 through 7 on various flavors of Windows and address HTML objects memory corruption vulnerabilities as well as memory corruption issues.