Google has quietly made its first anti-malware acquisition, snapping up GreenBorder Technologies, a venture-backed company that sells browser virtualization security software.
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Ryan Naraine is a journalist and social media enthusiast specializing in Internet and computer security issues.
Dancho Danchev is an independent security consultant and cyber threats analyst, with extensive experience in open source intelligence gathering, malware and cybercrime incident response.
Exploit code for a dangerous flaw in the Mac OS X Bonjour service is released less than 24 hours after Apple's security update.
The latest mega update is the fifth from Apple this year and brings the patch total for 2007 up to 109.
This month's ActiveX flaw project has uncovered a potentially dangerous code execution hole in an ActiveX module in Microsoft Office 2000.
Barring any "show-stopper issues" during the testing process, security and stability support for Mozilla Firefox 1.5 will expire on May 30.
Anti-virus experts are giving a collective thumbs-down to a proof-of-concept virus targeting OpenOffice and StarOffice, dismissing the creation as a silly publicity stunt.
Google has invested heavily in several anti-malware/anti-spyware initiatives but the search engine giant might have a spyware problem of its own.According to David Ulevitch, CEO of OpenDNS, Google's revenue-generating URL error alliance with Dell drops a difficult-to-remove program on computers that straddles the spyware line.
Google's anti-malware team has emerged from the shadows with a new blog, a widely discussed research paper and enough clues about its ambitious drive to put a roadblock between dirty Web sites and end users.
Microsoft has released a file conversion tool that stops exploits rigged into .doc, .xls and .ppt files from infecting Office 2003 users.
MessageLabs is reporting a surge in targeted malware attacks against a known Microsoft Word code-execution vulnerability, suggesting that an exploit generator kit may be circulating online.