Authorities are confident that hackers who broke into the systems of JPMorgan will wind up in court within months.
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years. He was most recently Editorial Director of BYTE, Dark Reading and Network Computing at UBM Tech. Prior to that he spent over a decade consulting and writing on technology subjects, primarily in the area of security. He is the author of three books and thousands of published articles and many more unpublished, private reports. Larry has been Technical Director at several test laboratories where he both directed and ran product testing, with a special interest in test automation. Larry began his career as a Software Engineer at the now-defunct Desktop Software Corporation in Princeton, NJ, on the team that wrote the NPL 4GL query language. He also worked on corporate IT and software development at Chase Econometrics. Larry is a graduate of the University of Pennsylvania with a degree in Public Policy.
Ms. Violet Blue (tinynibbles.com, @violetblue) is a freelance investigative reporter on hacking and cybercrime at Zero Day/ZDNet, CNET and CBS News, as well as a noted sex columnist. She has made regular appearances on CNN and The Oprah Winfrey Show and is regularly interviewed, quoted, and featured in a variety of publications that includes ABC News and the Wall Street Journal. She has authored and edited award-winning, best selling books in eight translations and has been a sex columnist for the San Francisco Chronicle. She has given keynote talks at such conferences as ETech, LeWeb, and the Forbes Brand Leadership Conference, and has given two Tech Talks at Google. In 2010, the London Times named Blue one of “40 bloggers who really count.” Ms. Blue is the author of The Smart Girl's Guide to Privacy. Violet Blue bio courtesy of TTI Vanguard.
Never having to remember a password again may be appealing -- but is such a concept promoting lax security?
The web portal giant wants encryption in everyone's hands by the end of the year.
Adobe's latest security update includes patches for vulnerabilities which allow remote code execution.
A Senate committee overwhelmingly passes a controversial bill aimed at sharing user data with the government, in efforts to prevent cyberattacks. Just one lawmaker opposed.
A bug recently discovered in the Google Apps engine inadvertently revealed the hidden registration details of over 280,000 website owners.
A collection of notable security news items for the week ending March 13, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
The company, slated as having the world's most secure messaging devices, warns that devices will be vulnerable to a serious security flaw until a patch is released.
A new strain of the CryptoLocker ransomware is targeting gamers through online games and services, including Minecraft, World of Warcraft and the Steam platform.
Research analyzing today's smart home devices has revealed disturbing security implications for consumers.
A blind SQL attack could result in the unauthorized access of a WordPress installation. Users on hosted Wordpress.org versions have been patched automatically.
In an effort to crack down on hijacked computers and networks, the Obama administration is seeking expanded powers through an amendment to existing law.
Users were warned not to restart their PCs, in case they wouldn't boot up again.
UPDATED. A vulnerability in Samsung mobile devices which placed social networking accounts has been patched -- finally.
Far beyond the capabilities of traditional cybercriminals, The Equation Group's EquationDrug platform is used to target select victims worldwide.
The best of ZDNet, delivered
- 1 The top ten most common database security vulnerabilities
- 2 Yes, the FBI and CIA can read your email. Here's how
- 3 Symantec releases simplified Norton Security line
- 4 Google.com now 'censors' explicit content from image searches
- 5 Six clicks: How hackers use employees to break through security walls