Google's security team has released an open-source cryptographic toolkit aimed at making it easier and safer for developers to use cryptography in their applications.The toolkit, called KeyCzar, was originally developed by Steve Weis (Google) and Arkajit Dey (MIT) and is available under an Apache 2.
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Violet Blue is the author of The Smart Girl's Guide to Privacy. She contributes to ZDNet, CNET, CBS News, and SF Appeal.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years
In the wake of the Russian-Georgian conflict, a week worth of speculations around Russian Internet forums have finally materialized into a coordinated cyber attack against Georgia's Internet infrastructure. The attacks have already managed to compromise several government web sites, with continuing DDoS attacks against numerous other Georgian government sites, prompting the government to switch to hosting locations to the U.
It's been a great handful of months here at ZDNet, but I'm deciding to say goodbye to the blogging scene. I'm already really busy with my primary job, and at this point I want to slow the work load down a good deal and just enjoy life.
Again, sorry for the late updates. Vegas is the kind of place that demands a lot of a person.
Well, this is well late, but here's my recap of Black Hat Day 1. Sorry for the delay, but I've been terribly busy finishing up preparations for my Day 2 talk.
Next Tuesday (August 12th), Microsoft will ship 12 security bulletins with fixes for serious vulnerabilities in a wide range of of widely deployed products.Seven of the 12 bulletins will be rated "critical," Microsoft's highest severity rating.
LAS VEGAS -- Mozilla security chief Window Snyder wants to open-source much more than the Firefox browser.During a sit-down chat at the Black Hat security conference here, Snyder announced plans to launch three new initiatives around threat modeling, training and vulnerability metrics that push the envelope around sharing and collaborating with the rest of the industry.
A currently active malware campaign taking advantage of a known social engineering tactic, namely, to entice the spammed user into clicking on a site with a fake news item in order to trick them into installing a fake Flash player (flashupdate.exe; get_flash_update.
The 2008 edition of Consumer Reports' "State of the Net" report, advises that a common security mistake is "thinking your Mac shields you from all...