Zack Whittaker

Zack Whittaker is the security editor for ZDNet, covering cyber and national security. He is based in New York newsroom, and is also found on sister-sites CNET and CBS News. You can reach him with his PGP key: EB6CEEA5.

Charlie Osborne

Charlie Osborne is a cybersecurity journalist and photographer who writes for ZDNet and CNET from London. PGP Key: AF40821B | Research/security tips email: cingred@protonmail.com.

Jennifer Leggio

Jennifer Leggio has been in the security industry for 17 years as a marketer, advisor, and writer. Her focus is on security culture, including disclosure, community issues, equality in security, disruptive trends, and even marketing best practices. PGP Key: 3A708289 | She prefers other contact on Twitter via @mediaphyter.

Latest Posts

Google releases open-source crypto toolkit

Google releases open-source crypto toolkit

Google's security team has released an open-source cryptographic toolkit aimed at making it easier and safer for developers to use cryptography in their applications.The toolkit, called KeyCzar, was originally developed by Steve Weis (Google) and Arkajit Dey (MIT) and is available under an Apache 2.

August 11, 2008 by in Google

Coordinated Russia vs Georgia cyber attack in progress

Coordinated Russia vs Georgia cyber attack in progress

In the wake of the Russian-Georgian conflict, a week worth of speculations around Russian Internet forums have finally materialized into a coordinated cyber attack against Georgia's Internet infrastructure. The attacks have already managed to compromise several government web sites, with continuing DDoS attacks against numerous other Georgian government sites, prompting the government to switch to hosting locations to the U.

August 11, 2008 by in Security

Saying Farewell

Saying Farewell

It's been a great handful of months here at ZDNet, but I'm deciding to say goodbye to the blogging scene.  I'm already really busy with my primary job, and at this point I want to slow the work load down a good deal and just enjoy life.

August 11, 2008 by in Enterprise Software

CNET's Clientside developer blog serving Adobe Flash exploits

CNET's Clientside developer blog serving Adobe Flash exploits

Yesterday, Websense Labs issued an alert regarding a compromised CNET blog, namely the Clientside developer blog which has been embedded with a malicious javascript code attempting to exploit the visitors through a well known vulnerability in Adobe Flash's player. Websense's alert :"Websense Security Labs ThreatSeeker Network has discovered that a CNET Networks site has been compromised.

August 7, 2008 by in Security

Talking Firefox security with Mozilla's Window Snyder

Talking Firefox security with Mozilla's Window Snyder

LAS VEGAS -- Mozilla security chief Window Snyder wants to open-source much more than the Firefox browser.During a sit-down chat at the Black Hat security conference here, Snyder announced plans to launch three new initiatives around threat modeling, training and vulnerability metrics that push the envelope around sharing and collaborating with the rest of the industry.

August 6, 2008 by in Security

Today's assignment : Coding an undetectable malware

Today's assignment : Coding an undetectable malware

Today's dynamic Internet threatscape is changing so rapidly, that the innovations and creativity applied by malware authors can easily render an information security course's curricular on malware outdated pretty fast, or worse, provide the students with a false feeling of situational awareness about today's malware that's driving the entire cybercrime ecosystem at the end of the day.

August 5, 2008 by in Security

Adobe: Beware of fake Flash downloads

Adobe: Beware of fake Flash downloads

Amidst confirmed reports that malicious hackers are starting to use fake Flash Player downloads as social engineering lures for malware, Adobe has issued a call-to-arms for users to validate installers before downloading software updates.The company's notice comes on the heels of malware attacks on Facebook, MySpace and Twitter that attempt to trick Windows users into installing a Flash Player update that turns out to be a malicious executable.

August 4, 2008 by in Windows

Twitter being used to distribute malware

Twitter being used to distribute malware

Last week, when I wrote about Aviv Raff's auto follow-me vulnerability on Twitter, I warned that it was only a matter of time before we see nasty social engineering (malware) attacks on the popular microblogging service.Well, it's here.

August 4, 2008 by in Security

Newsletters

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
See All
See All

Top Stories