Zack Whittaker

Zack Whittaker is the security editor for ZDNet, covering cyber and national security. He is based in New York newsroom, and is also found on sister-sites CNET and CBS News. You can reach him with his PGP key: EB6CEEA5.

Charlie Osborne

Charlie Osborne, a medical anthropologist who studied at the University of Kent, UK, is a journalist, freelance photographer and former teacher. She has spent years travelling and working across Europe and the Middle East as a teacher, and has been involved in the running of businesses ranging from media and events to B2B sales. Charlie currently works as a journalist and photographer -- with the occasional design piece -- and writes for ZDNet, CNET and SmartPlanet. She has particular interests in social media, IP law, social engineering and security.

Latest Posts

Debate around 'partial disclosure' heats up

Debate around 'partial disclosure' heats up

There are many ways of telling the world about a security vulnerability. A vulnerability can be announced without telling the vendor, it can be announced after giving the vendor a period of time to fix the issue, or it may just be circulated amongst the underground without ever coming to the surface.

October 13, 2008 by in Security

Mac OS X Patch Day: 40 security flaws fixed

Mac OS X Patch Day: 40 security flaws fixed

Apple has shipped another whopper of a patch to cover a total of 40 documented vulnerabilities affecting the Mac OS X ecosystem.The Security Update 2008-007, available for Tiger and Leopard, covers a range of third-party components and Mac OS X flaws that could users at risk of remote code executions attacks.

October 9, 2008 by in Security

Asus ships Eee Box PCs with malware

Asus ships Eee Box PCs with malware

Asus has confirmed and apologized to customers (press release in Japanese; translated version) for shipping malware on the recently introduced Eee Box desktop computer :"According to an email sent out by Asus, PC Advisor reports, the Eee Box's 80GB hard drive has the recycled.exe virus files hidden in the drive's D: partition.

October 9, 2008 by in Hardware

Atrivo/Intercage's disconnection briefly disrupts spam levels

Atrivo/Intercage's disconnection briefly disrupts spam levels

After years of operation, California based ISP Atrivo/Intercage, a well known Russian Business Network darling, faced the music and was disconnected from the Internet by its upstream provider at the end of September. What happened according to MessageLabs's latest intelligence report, was a brief decline of spam due to the fact that the malware infected hosts couldn't reach the ISP's netblock.

October 7, 2008 by in Security

Scammers introduce ATM skimmers with built-in SMS notification

Scammers introduce ATM skimmers with built-in SMS notification

The bust of the notorious ATM scammer going under the handle of Cha0 in early September, once again puts ATM skimming in the spotlight. Among the main insecurities scammers face while embedding an ATM skimmer, is the retrieval process of the device that is now containing the credit card details of several hundred people depending on the volume of transactions that occurred while the device was in place.

October 7, 2008 by in Security

Talkback Tuesday: Mobile Malware

Talkback Tuesday: Mobile Malware

Last week I wrote two posts about why I was not concerned about mobile malware right now, but I expected mobile malware to become a problem in the near future. There were several responses to the two posts, including the following:Phatkat writes: Most crackers (hackers gone bad) are doing this for monetary gain so like most people want to put the minimal amount effort to get the maximum gain.

October 6, 2008 by in Security

iPhone hits another security speedbump

iPhone hits another security speedbump

Apple's ongoing struggles with poor security-related design choices have extended to the iPhone.  According to security researcher Aviv Raff, everyone's favorite mobile device is vulnerable to two separate security weaknesses that expose millions of users to phishing and spamming attacks.

October 6, 2008 by in Security

Newsletters

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
See All
See All

Top Stories