Zack Whittaker

Zack Whittaker is the security editor for ZDNet, covering cyber and national security. He is based in New York newsroom, and is also found on sister-sites CNET and CBS News. You can reach him with his PGP key: EB6CEEA5.

Charlie Osborne

Charlie Osborne is a cybersecurity journalist and photographer who writes for ZDNet and CNET from London. PGP Key: AF40821B | Research/security tips email: cingred@protonmail.com.

Jennifer Leggio

Jennifer Leggio has been in the security industry for 17 years as a marketer, advisor, and writer. Her focus is on security culture, including disclosure, community issues, equality in security, disruptive trends, and even marketing best practices. PGP Key: 3A708289 | She prefers other contact on Twitter via @mediaphyter.

Latest Posts

Firefox tops list of 12 most vulnerable apps

Firefox tops list of 12 most vulnerable apps

Mozilla's flagship Firefox browser has earned the dubious title of the most vulnerable software program running on the Windows platform.According to application whitelisting vendor Bit9, Firefox topped the list of 12 widely deployed desktop applications that suffered through critical security vulnerabilities in 2008.

December 15, 2008 by in Enterprise Software

IE zero-day attack surface expands

IE zero-day attack surface expands

The attack surface for password-stealing Trojans currently targeting an unpatched flaw in Microsoft's Internet Explorer has expanded to include all versions of the browser, including the newest IE 8 Beta 2.Microsoft released an updated advisory to warn that the underlying flaw affects much more than IE 7 and to spread the word about additional workarounds that can help limit the damage from actual attacks.

December 12, 2008 by in Security

US-CERT: Beware of airline ticket e-mail scam

US-CERT: Beware of airline ticket e-mail scam

The United States Computer Emergency Readiness Team (US-CERT) has issued an alert for an e-mail scam targeting holiday travelers, warning that malware authors are using clever social engineering tactics to hijack Windows computers.In the e-mail scam, users get a .

December 12, 2008 by in Security

IE7 XML parsing zero day exploited in the wild

IE7 XML parsing zero day exploited in the wild

A couple of hours ago, two working proof of concept exploits for MS Internet Explorer XML Parsing Remote Buffer Overflow were posted at Milw0rm, with international hacking communities quickly catching up and starting to use it. The second PoC also works on Vista, in particular both exploits were tested on Vista SP1, Explorer 7.

December 10, 2008 by in Security

Gmail, Yahoo and Hotmail systematically abused by spammers

Gmail, Yahoo and Hotmail systematically abused by spammers

With the industry's eyes constantly monitoring the usual suspects' use of phony hosting providers, another market segment within the underground marketplace has been developing beneath the radar, aiming to build a malicious infrastructure (Spammers targeting Bebo, generate thousands of bogus accounts; Malware and spam attacks exploiting Picasa and ImageShack) through efficient CAPTCHA recognition.

December 10, 2008 by in Security

Vint Cerf's Twitter account hacked, suspended for spam

Vint Cerf's Twitter account hacked, suspended for spam

(UPDATE: Cerf denies that this was his Twitter profile) It appears that Vint Cerf, the father of Internet who needs no introduction, has had his Twitter account compromised, with a multitude of spam messages posted on his behalf during the last 24 hours, all of which are redirecting to auction search sites (baysearch .net and soldly .

December 9, 2008 by in Security

Hackers exploiting (unpatched) IE 7 flaw to launch drive-by attacks

Hackers exploiting (unpatched) IE 7 flaw to launch drive-by attacks

Malicious hackers are exploiting a zero-day flaw in Microsoft's Internet Explorer browser to launch a new wave of drive-by downloads, according to a warning from security researchers.The Web attacks, first reported by Bob McMillan, takes aim at users running IE 7 on Windows XP SP2 and includes the use of a Trojan downloader that commandeers Windows machines for nefarious purposes.

December 9, 2008 by in Enterprise Software

With or without McColo, spam volume increasing again

With or without McColo, spam volume increasing again

It was only a matter of time for spam volume to sky rocket again, despite McColo's shutdown in November. Two weeks after the cybercrime-friendly ISP got disconnected from the Internet, spam volumes are increasing once again with the main botnets using it as a command and control location regaining their strength by migrating to new hosting locations.

December 8, 2008 by in Security

Newsletters

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
See All
See All

Top Stories