Violet Blue

Violet Blue is the author of The Smart Girl's Guide to Privacy. She contributes to ZDNet, CNET, CBS News and SF Appeal.

Larry Seltzer

Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years

Latest Posts

Code execution vulnerability found in Firefox 3.0

It's not all about world records for Firefox 3.0.Just hours after the official release of the latest refresh of Mozilla's flagship browser, an unnamed researcher has sold a critical code execution vulnerability that puts millions of Firefox3.

June 18, 2008 by Ryan Naraine


Finjan uncovers half a gigabyte of stolen data on crimeware servers

Finjan's Malicious Code Research Center has uncovered a half of gigabyte of stolen data from US Healthcare organizations and from a major airline on crimeware servers in Argentina and Malaysia.A representative of Finjan stated:"Hackers incorporated sophisticated attacks using crimeware toolkits, Trojans, and Command and Control servers to drive traffic from a specific region with specific characteristics.

June 17, 2008 by Nathan McFeters


Photobucket's DNS records hijacked by Turkish hacking group

Yesterday, Photobucket the world's most popular photo sharing site according to Hitwise had its DNS records hijacked to return a hacked page courtesy of the NetDevilz hacking group, a Turkish web site defacement group most widely known for its defacement of the adult video site Redtube earlier this year.

June 17, 2008 by Dancho Danchev


Fresh off the press: iPhoneDbg toolkit hotness

The guys at Core Security just released an iPhoneDbg toolkit that should make exploit development for the iPhone much easier.  This is outstanding news for all, as I think there has been a lot of concern over the quick rise of mobile devices and the new security concerns that they create.

June 17, 2008 by Nathan McFeters


How to recover GPcode encrypted files?

Got backups? In response to the security community's comments on the futile attempt to directly attack the 1024 bit RSA keys using distributed computing, Kaspersky Labs are now reasonably recommending that affected end users lacking backups of their encrypted data, take advantage of data recovery tools :Currently, it's not possible to decrypt files encrypted by Gpcode.

June 15, 2008 by Dancho Danchev


Black Hat '08 preview webcast on its way

Ladies and gents,For those who hadn't heard, I will be presenting at Black Hat Vegas '08 this year with Rob Carter, John Heasman, and Billy Rios.  Our presentation is called "The Internet is Broken: Beyond document.

June 15, 2008 by Nathan McFeters

1 Comment

Hacking SCADA for terrorism and destruction

SCADA scares me, and I've seen enough things on the Internet to be desensitized to many things, but attacks against SCADA threaten our national security in a very real and topical way by attacking power grids, water treatment plants, nuclear plants, etc.  Hacking networks that SCADA devices reside on and using that access to interact with the SCADA system is nothing really new, it's been covered in the media quite a bit...

June 11, 2008 by Nathan McFeters