Violet Blue

Violet Blue is the author of The Smart Girl's Guide to Privacy. She contributes to ZDNet, CNET, CBS News, and SF Appeal.

Larry Seltzer

Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years

Latest Posts

Fake CNN news items malware campaign spreading rapidly

A currently active malware campaign taking advantage of a known social engineering tactic, namely, to entice the spammed user into clicking on a site with a fake news item in order to trick them into installing a fake Flash player (flashupdate.exe; get_flash_update.

August 6, 2008 by Dancho Danchev


Today's assignment : Coding an undetectable malware

Today's dynamic Internet threatscape is changing so rapidly, that the innovations and creativity applied by malware authors can easily render an information security course's curricular on malware outdated pretty fast, or worse, provide the students with a false feeling of situational awareness about today's malware that's driving the entire cybercrime ecosystem at the end of the day.

August 5, 2008 by Dancho Danchev


Microsoft makes daring vulnerability sharing move

LAS VEGAS -- Starting in October, Microsoft will start sharing details on software vulnerabilities with security vendors ahead of Patch Tuesday under a daring new program aimed at reducing the window of exposure to hacker attacks.

August 4, 2008 by Ryan Naraine


Adobe: Beware of fake Flash downloads

Amidst confirmed reports that malicious hackers are starting to use fake Flash Player downloads as social engineering lures for malware, Adobe has issued a call-to-arms for users to validate installers before downloading software updates.The company's notice comes on the heels of malware attacks on Facebook, MySpace and Twitter that attempt to trick Windows users into installing a Flash Player update that turns out to be a malicious executable.

August 4, 2008 by Ryan Naraine

27 Comments 2 Votes

Twitter being used to distribute malware

Last week, when I wrote about Aviv Raff's auto follow-me vulnerability on Twitter, I warned that it was only a matter of time before we see nasty social engineering (malware) attacks on the popular microblogging service.Well, it's here.

August 4, 2008 by Ryan Naraine


Purewire raises funding, adds Noonan to board

Purewire, a security start-up competing in the software-as-a-service (Saas) market, has banked $2 million in friends-and-family funding and added industry veteran Tom Noonan to its board of directors.The latest funding round, which was led by Imlay Investments, Inc.

August 4, 2008 by Ryan Naraine



Ever since Rob McMillan of IDG published a story giving a preview of our coming Black Hat talk, specifically a preview of the portion of our talk related to GIFARs, media coverage of the research has swirled a bit out of control and there's been some misconceptions.  My co-presenter John Heasman has a write-up on GIFARs that explains this all just a bit more.

August 2, 2008 by Nathan McFeters