Zack Whittaker

Zack Whittaker is the security editor for ZDNet, covering cybersecurity, national security, policy and privacy. He is based out of the New York newsroom, and can also be found on sister sites CNET and CBS News. You can contact him with his PGP key: EB6CEEA5.

Charlie Osborne

Charlie Osborne, a medical anthropologist who studied at the University of Kent, UK, is a journalist, freelance photographer and former teacher. She has spent years travelling and working across Europe and the Middle East as a teacher, and has been involved in the running of businesses ranging from media and events to B2B sales. Charlie currently works as a journalist and photographer -- with the occasional design piece -- and writes for ZDNet, CNET and SmartPlanet. She has particular interests in social media, IP law, social engineering and security.

Latest Posts

Britain moves against illegal file sharing

Britain moves against illegal file sharing

CBC News out of Canada is reporting that British ISPs are making an aggressive move against illegal file sharing by implementing a program designed to discover copyright violators, who will be sent warning letters and may potentially have their internet connections disconnected.For more on the article, read below.

July 25, 2008 by in Enterprise Software

GMail adds "https:"-only connections but still not by default

GMail adds "https:"-only connections but still not by default

Google has added a new "Browser Connection" feature to GMail to allow users to force e-mail sessions to always use the more secure "https:" protocol but, strangely, this is not turned on by default.In the Settings tab, at the very bottom, GMail users can now select an "Always use https" option for stronger security, especially when connecting via Wi-Fi.

July 25, 2008 by in Cloud

Click fraud in 2nd quarter of 2008 more sophisticated, botnets to blame

Click fraud in 2nd quarter of 2008 more sophisticated, botnets to blame

Whereas the overall click fraud rate isn't increasing, it's not decreasing either, remaining flat for the first two quarters of 2008, according to data gathered from the Click Fraud Network, consisting of more than 4,000 online advertisers and agencies. Click Forensics report for the second quarter of 2008, indicates that botnets continue being used for click fraud, the preferred and more efficient approach compared to hiring human clickers on a revenue sharing basis.

July 24, 2008 by in Security

Speculation over possible Skype backdoor

Speculation over possible Skype backdoor

There's growing speculation coming out of Europe that there's a backdoor in Skype that allows remote eavesdropping of telephone conversations.A report in the reputable Heise Online says the issue was discussed at a meeting with ISPs last month where high-ranking officials at the Austrian interior ministry claims "it is not a problem for them to listen in on Skype conversations.

July 24, 2008 by in Telcos

Apple looking to hire iPhone hacker

Apple looking to hire iPhone hacker

Apple is in the market for someone capable of hacking into the iPhone.According to this job listing, the company is looking for an iPhone Security Engineer capable of, among other things, developing "proof of concept" attacks on the device's current security mechanisms.

July 24, 2008 by in Security

|)ruid and HD Moore release part 2 of DNS exploit

|)ruid and HD Moore release part 2 of DNS exploit

[Updated 07/24/2008: Gallery images of diffs of code revisions has been included and will be updated as things change, see here.]Earlier today, noted researchers |)ruid and HD Moore released exploit code for the Metasploit tool for attacking the DNS flaw that was originally reported by Dan Kaminsky.

July 23, 2008 by in Networking

Attack code published for DNS flaw

Attack code published for DNS flaw

The urgency to patch Dan Kaminsky's DNS cache poisoning vulnerability just went up a few notches.Exploit code for the flaw, which allows the insertion of malicious DNS records into the cache of the target nameserver, has been added to Metasploit, a freely distributed attack/pen-testing tool.

July 23, 2008 by in Security

Newsletters

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.
See All
See All

Top Stories