Violet Blue

Violet Blue is the author of The Smart Girl's Guide to Privacy. She contributes to ZDNet, CNET, CBS News, and SF Appeal.

Larry Seltzer

Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years

Latest Posts

On Opera patch day, a new zero-day flaw

On the same day Opera shipped a browser update with patches for three separate security vulnerabilities, hackers are openly discussion a new zero-day flaw that exposes Windows users to remote code execution attacks.With Opera 9.

October 22, 2008 by Ryan Naraine


Google to introduce warnings for potentially hackable sites

Last week, Google's Patrick Chapman and Matt Cutts announced that they're experimenting with a new security feature aiming to alert webmasters on the potential for having their sites hacked due to the outdated version of their web applications, starting with Wordpress only :"Recently we've seen more websites get hacked because of various security holes.

October 22, 2008 by Dancho Danchev


Inside an affiliate spam program for pharmaceuticals

Bargaining with your health doesn't just mean you're heading for a shorter life expectancy, but also, increases the chances that you will either get scammed in the process, or have to pay more in the long-term while dealing with the health issues arising from using expired pharmaceutical with unverifiable origins, you bargained for at the first place.

October 20, 2008 by Dancho Danchev


Researchers hack wired keyboards, hijack keystrokes

A team of Swiss researchers say there are several ways to recover keystrokes from wired keyboards by simply measuring the electromagnetic radiations emitted when keys are pressed.In all, the team of researchers from the Security and Cryptography Laboratory in Lausanne, Switzerland, found four  different ways to fully or partially recover keystrokes from wired keyboards at a distance up to 20 meters, even through walls.

October 20, 2008 by Ryan Naraine


Google readying fix for Chrome file download flaw

Just hours after the release of the Google Chrome browser last month, researcher Aviv Raff discovered that he could combine two vulnerabilities -- a flaw in Apple Safari (WebKit) and a Java bug -- to trick users into launching executables direct from the new browser. (Here's a demo showing how a Google Chrome users can be lured into downloading and launching a JAR (Java Archive) file that gets executed without warning.

October 20, 2008 by Ryan Naraine


Security will suffer in the financial crisis

As many of you already know, the anti-Midas touch of the financial crisis is spreading to the technology sector. Sequoia Capital, one of the largest VC funds in Silicon Valley, gave a presentation that pretty much said become profitable now or pack up and go home.

October 19, 2008 by Adam O'Donnell


Adobe's Serious Magic site SQL Injected by Asprox botnet

According to SophosLabs Adobe's owned has been automatically SQL injected by the Asprox botnet, becoming the very latest high profile legitimate web sites injected with links to exploits and malware serving sites :"The infection, which resides at hxxp://www.

October 16, 2008 by Dancho Danchev


Survey: 88% of Mumbai's wireless networks easy to compromise

Deloitte's recently released Wireless Security Survey assessing Mumbai's -- India's financial capital -- state of security awareness in respect to wireless security, shows an ugly picture of insecure wireless networks in both, business, and residential districts. With Mumbai being the home of India's most important financial institutions, next to the majority of multinational corporations, it may also turn into the playground for the next high profile data breach.

October 16, 2008 by Dancho Danchev


Adobe ships fix for clickjacking, clipboard hijack threats

Adobe has released Flash Player 10 (Techmeme discussion) with a chock-full of major security improvements, including patches and mitigation for at least five serious security vulnerabilities.The vulnerabilities covered with Flash Player 10 could allow an attacker to bypass the software's security controls, Adobe warned.

October 15, 2008 by Ryan Naraine