Zack Whittaker

Zack Whittaker is the security editor for ZDNet, covering cyber and national security. He is based in New York newsroom, and is also found on sister-sites CNET and CBS News. You can reach him with his PGP key: EB6CEEA5.

Charlie Osborne

Charlie Osborne is a cybersecurity journalist and photographer who writes for ZDNet and CNET from London. PGP Key: AF40821B | Research/security tips email: cingred@protonmail.com.

Jennifer Leggio

Jennifer Leggio has been in the security industry for 17 years as a marketer, advisor, and writer. Her focus is on security culture, including disclosure, community issues, equality in security, disruptive trends, and even marketing best practices. PGP Key: 3A708289 | She prefers other contact on Twitter via @mediaphyter.

Latest Posts

Apple catches up on Safari (browser) security

Apple catches up on Safari (browser) security

After years of lagging behind on important security features, Apple has finally added a malware-blocker, a phishing filter and support for EV (extended validation) certificates into the latest refresh of its Safari Web browser.The malware roadblock headlines a list of Safari 4 security features that also includes cookie blocking, private browsing, secure encryption, safe downloads and parental controls.

February 24, 2009 by in Security

Unofficial 'patch' for Adobe Reader, Acrobat zero-day

Unofficial 'patch' for Adobe Reader, Acrobat zero-day

In response to in-the-wild zero-day attacks targeting critical flaws in Adobe's Reader/Acrobat products, a respected security researcher is offering up a home-brewed (unofficial) patch for Windows users.The buyer-beware patch -- which is simply a replacement for the vulnerable AcroRd32.

February 24, 2009 by in Security

Chinese hackers deface the Russian Consulate in Shanghai

Chinese hackers deface the Russian Consulate in Shanghai

That was fast. Chinese hackers collaborating with the Chinese Hacking Union, a two-years old training community for wannabe hackers, hacked and defaced the official web site of  the General Consulate of the Russian Federation in Shanghai, PRC in response to the recent accusations that a Russian navy vessel has sank a Chinese cargo ship.

February 22, 2009 by in Security

Why I am against pure net neutrality

Why I am against pure net neutrality

While it may sound like treating all ISP traffic equally is a good idea, mandating strict net neutrality hurts computer security for all of us.Those of you who are tech heads and reside in the United States should all be familiar with the Net Neutrality debate, but for those of you who aren't, the debate centers around an ISP's ability to treat traffic differently depending upon application and purpose.

February 22, 2009 by in Security

Rogue security software spoofs ZDNet Reviews

Rogue security software spoofs ZDNet Reviews

Impersonation is a form of flattery by itself, however, not when it comes to the very latest round of rogue security software this time impersonating ZDNet, CNET's and PC Magazine's reviews section, making it look like legitimate and highly respected technology sites have actually reviewed and recommend the rogue security software.

February 20, 2009 by in Security

Targeted malware attacks exploiting IE7 flaw detected

Targeted malware attacks exploiting IE7 flaw detected

Researchers at TrendMicro have detected a targeted malware attack exploiting last week's patched critical MS09-002 vulnerability affecting Internet Explorer 7.  Upon opening the spammed Microsoft office document, vulnerable users are automatically forwarded to a Chinese live exploit site which still remains active.

February 17, 2009 by in Security

Crimeware tracking service hit by a DDoS attack

Crimeware tracking service hit by a DDoS attack

A week after a newly launched crimeware tracking service went public, cybercriminals didn't hesitate to prove its usefulness by launching a distributed denial of service attack (DDoS) against it. According to the Swiss security blog, the Zeus tracker came under attack from a previously known source that also attacked abuse.

February 17, 2009 by in Security

Newsletters

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
See All
See All

Top Stories