McAfee today announced plans to shell out $350 million to buy SafeBoot, a deal that strengthens the anti-virus vendor's push into the mobile data security market.
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Violet Blue is an outspoken and controversial author and journalist; she contributes to ZDNet, CNET, CBS News and SF Appeal.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years
In a pre-patch advisory, Adobe offered a complicated (and unsupported) workaround for its customers and promised a comprehensive fix will be ready before the end of October 2007.
Next Tuesday's batch of security updates from Microsoft will include "critical" patches for worm holes in Windows, Internet Explorer, Office, Outlook Express and Windows Mail.
Sun Microsystems has shipped patches to fix a batch of "highly critical" vulnerabilities in Sun Java JRE (Java Runtime Environment).
Apple has taken another stab at fixing a one-year-old QuickTime vulnerability that exposed Windows XP and Windows Vista to code execution attacks.
Default installations of Sun's free Solaris operating system are sitting ducks for remote code execution attacks.According to an alert from iDefense, the flaw exists in the way Solaris implements the X Font Server (xfs), which is used to handle font rendering on X11 (X Window System).
Google has confirmed -- and I've verified -- that a fix for GMail has been distributed to block a flaw that allows hackers to hijack e-mail messages.
Web application security firms HP (SPI Dynamics) and Cenzic have called off the dogs in a patent dispute over fault injection technology.
Computer networking giant 3Com has been sold for $2 billion in cash to Bain Capital and Chinese telco equipment group Huawei Technologies. The inclusion of 3Com's TippingPoint zero-day flaw broker will certainly raise eyebrows in government circles.
Apple has shipped an iPhone software update to patch 10 different vulnerabilities that could allow malicious hackers to launch executable code, steal e-mail credentials or take control of the device's phone-dialing capabilities.