Zack Whittaker

Zack Whittaker is the security editor for ZDNet. You can securely reach him on Signal and WhatsApp at 646-755-8849, and his PGP fingerprint for email is: 4D0E 92F2 E36A EC51 DAAE 5D97 CB8C 15FA EB6C EEA5.

Charlie Osborne

Charlie Osborne is a cybersecurity journalist and photographer who writes for ZDNet and CNET from London. PGP Key: AF40821B

Jennifer Leggio

Jennifer Leggio has been in the security industry for 17 years as a marketer, advisor, and writer. Her focus is on security culture, including disclosure, community issues, equality in security, disruptive trends, and even marketing best practices. PGP Key: 3A708289 | She prefers other contact on Twitter via @mediaphyter.

Latest Posts

Microsoft's Live launches malware detection service for webmasters

Microsoft's Live launches malware detection service for webmasters

Playing catch-up with Google's Safe Browsing diagnostic, Google's warnings for potentially hackable sites, and Yahoo's SearchScan introduced through their partnership with McAfee, Microsoft's Live Search has updated their Webmaster tools to offer detection for embedded malware. Moreover, as a late entrant they simply had to differentiate, and they did it in the form of providing outbound links check for whether or not the ongoing links have also been embedded with malware.

November 26, 2008 by in Security

Google: no evidence of a Gmail vulnerability

Google: no evidence of a Gmail vulnerability

Following the speculations on the resurrection of what's thought to be an already fixed Gmail flaw which could assist in domain name hijackings, yesterday Google commented that their investigation indicated that the recent domain hijacks should be attributed to a phishing campaign, rather than to a Gmail flaw.

November 25, 2008 by in Security

Symantec puts value of underground transactions at $275M

Symantec puts value of underground transactions at $275M

Those of you looking for statistics to justify your security budgets for next year, look no further: Symantec has released their view of the underground economy as it has evolved over the past year.The qualitative information in the report is amusing, but the quantitative information has far more value to anyone trying to build a justification for infrastructure and security services related to PCI-DSS.

November 25, 2008 by in Security

Cybercriminals release Christmas themed web malware exploitation kit

Cybercriminals release Christmas themed web malware exploitation kit

"Committing cybercrime around the Christmas tree" has always been a tradition for malicious attackers introducing new ways to scam the millions of online shoppers during the holidays. This Christmas isn't going to be an exception, but what has changed compared last couple of years is the tone of the Xmas promotions already circulating across various cybercrime communities.

November 24, 2008 by in Security

Microsoft is 5th most spam-friendly ISP

Microsoft is 5th most spam-friendly ISP

Spammers are abusing Microsoft's online services at such an alarming rate that a non-profit spam fighting group now lists Microsoft as the world's 5th most spam-friendly ISP (Internet Service Provider).The latest update of Spamhaus.

November 21, 2008 by in Microsoft

Verizon snoops peek at Obama's cell phone records

Verizon snoops peek at Obama's cell phone records

Nosy Verizon employees improperly accessed and peeked at Barack Obama's personal cell phone records, the company said in a statement acknowledging the privacy breach.In the statement, Verizon Wireless chief executive Lowell McAdam apologized to the President-elect and vowed that the errant employees will be disciplined.

November 20, 2008 by in Mobility

Malware found in Lenovo software package

Malware found in Lenovo software package

Computer maker Lenovo is shipping a malware-infected software package to Windows XP users, according to warning from anti-virus researchers at Microsoft.The malicious file was identified by Microsoft as Win32/Meredrop, a Trojan dropper that is used to install and execute multiple malicious executables on an infected computer.

November 19, 2008 by in Security

Newsletters

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
See All
See All

Top Stories