Zack Whittaker

Zack Whittaker is the security editor for ZDNet, covering cyber and national security. He is based in New York newsroom, and is also found on sister-sites CNET and CBS News. You can reach him with his PGP key: EB6CEEA5.

Charlie Osborne

Charlie Osborne is a cybersecurity journalist and photographer who writes for ZDNet and CNET from London. PGP Key: AF40821B | Research/security tips email: cingred@protonmail.com.

Jennifer Leggio

Jennifer Leggio has been in the security industry for 17 years as a marketer, advisor, and writer. Her focus is on security culture, including disclosure, community issues, equality in security, disruptive trends, and even marketing best practices. PGP Key: 3A708289 | She prefers other contact on Twitter via @mediaphyter.

Latest Posts

Microsoft 'Fix it' automates fixing Windows problems

Microsoft 'Fix it' automates fixing Windows problems

I'm a little bit late with this but it's such a useful move by Microsoft, I figured I'd point it out for Zero Day readers.Microsoft has been adding a nifty one-click "fix it" utility to its Knowledge Base (KB) articles to help end users solve Windows problems without having to navigate through the maze of instructions.

February 25, 2009 by in Enterprise Software

Google wants to buy Native Client security flaws

Google wants to buy Native Client security flaws

Google is (indirectly) buying security vulnerabilities from white hat hackers.Under the guise of a Native Client Security Contest, the search engine firm is offering big cash prizes to hackers who find bugs and other security flaws in the open-source research technology for running x86 native code in Web applications.

February 25, 2009 by in Security

Adobe swings and misses as PDF abuse worsens

Adobe swings and misses as PDF abuse worsens

After more than two weeks (months?) of inexplicable silence on mitigations for a known code execution vulnerability in its Reader and Acrobat product lines, Adobe has finally posted public information on the problem but the company's response falls well short of providing definitive mitigation guidance for end users.

February 25, 2009 by in Developer

ID thieves go phishing for GTalk, GMail passwords

ID thieves go phishing for GTalk, GMail passwords

If you use Google's GMail or GTalk services, pay special attention to random e-mails or instant messages requesting your login credentials.There is a major spam run underway with a phishing scam using social engineering techniques to snag Google Account usernames and passwords and, according to multiple reports, the attack appears to be very effective.

February 24, 2009 by in Collaboration

Apple catches up on Safari (browser) security

Apple catches up on Safari (browser) security

After years of lagging behind on important security features, Apple has finally added a malware-blocker, a phishing filter and support for EV (extended validation) certificates into the latest refresh of its Safari Web browser.The malware roadblock headlines a list of Safari 4 security features that also includes cookie blocking, private browsing, secure encryption, safe downloads and parental controls.

February 24, 2009 by in Security

Unofficial 'patch' for Adobe Reader, Acrobat zero-day

Unofficial 'patch' for Adobe Reader, Acrobat zero-day

In response to in-the-wild zero-day attacks targeting critical flaws in Adobe's Reader/Acrobat products, a respected security researcher is offering up a home-brewed (unofficial) patch for Windows users.The buyer-beware patch -- which is simply a replacement for the vulnerable AcroRd32.

February 24, 2009 by in Security

Chinese hackers deface the Russian Consulate in Shanghai

Chinese hackers deface the Russian Consulate in Shanghai

That was fast. Chinese hackers collaborating with the Chinese Hacking Union, a two-years old training community for wannabe hackers, hacked and defaced the official web site of  the General Consulate of the Russian Federation in Shanghai, PRC in response to the recent accusations that a Russian navy vessel has sank a Chinese cargo ship.

February 22, 2009 by in Security

Why I am against pure net neutrality

Why I am against pure net neutrality

While it may sound like treating all ISP traffic equally is a good idea, mandating strict net neutrality hurts computer security for all of us.Those of you who are tech heads and reside in the United States should all be familiar with the Net Neutrality debate, but for those of you who aren't, the debate centers around an ISP's ability to treat traffic differently depending upon application and purpose.

February 22, 2009 by in Security

Newsletters

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
See All
See All

Top Stories