Zack Whittaker

Zack Whittaker is the security editor for ZDNet. You can securely reach him on Signal and WhatsApp at 646-755-8849, and his PGP fingerprint for email is: 4D0E 92F2 E36A EC51 DAAE 5D97 CB8C 15FA EB6C EEA5.

Charlie Osborne

Charlie Osborne is a cybersecurity journalist and photographer who writes for ZDNet and CNET from London. PGP Key: AF40821B | Research/security tips email: cingred@protonmail.com.

Jennifer Leggio

Jennifer Leggio has been in the security industry for 17 years as a marketer, advisor, and writer. Her focus is on security culture, including disclosure, community issues, equality in security, disruptive trends, and even marketing best practices. PGP Key: 3A708289 | She prefers other contact on Twitter via @mediaphyter.

Latest Posts

Webmail providers can fix Palin hack-style problems

Webmail providers can fix Palin hack-style problems

One of the most important questions we should be asking ourselves in light of the Palin webmail hack discussed at length here, here and here is how it could have been prevented. There are several software techniques that I can think of off the top of my head that would help webmail prevent malicious password reset attacks.

September 21, 2008 by in Enterprise Software

Adobe moves to nuke 'clipboard hijack' attacks

Adobe moves to nuke 'clipboard hijack' attacks

Adobe has announced plans to modify the next version of its Flash Player to use an "allow/deny" system to mitigate clipboard hijack attacks.The change will be fitted into the final version of Flash Player 10 to demand user interaction when a Shockwave (.

September 19, 2008 by in Hardware

Apple security not ready for enterprise prime-time

Apple security not ready for enterprise prime-time

Guest editorial by Andrew StormsLast week Apple proved that they are not ready for prime time enterprise relationships.Apple has tried to position the iPhone as enterprise-ready, but this last round of software updates demonstrated beyond a shadow of a doubt how far they have to go to understand the enterprise mentality.

September 19, 2008 by in Apple

Attacker: Hacking Sarah Palin's email was easy

Attacker: Hacking Sarah Palin's email was easy

A college student identified as Rubico has claimed responsibility for hacking into Sarah Palin's personal email, and provided a detailed 1st person account of how he hacked into the email account using the password "popcorn" which he managed to reset by successfully answering her security question “Where did you meet your spouse?

September 18, 2008 by in Social Enterprise

Norwegian BitTorrent tracker under DDoS attack

Norwegian BitTorrent tracker under DDoS attack

Norway's largest BitTorrent tracker Norbits (norbits.net) with approximately 10,000 users, is currently under a DDoS attack launched from a group known as MORRADi, which is also speculating that it has managed to compromise the tracker and is threatening to release personal details of its users including IPs, until the tracker is closed :"In an NFO file obtained by IT-Avisen, a group called MORRADi takes responsibility for the attack on Norbits.

September 18, 2008 by in Legal

Webmail and traditional e-mail face different threats

Webmail and traditional e-mail face different threats

This week's attack on Sarah Palin's e-mail account highlights how the same application could have very different threat models depending on the technology used. While this is a general issue for all Software-as-a-Service offerings versus traditional desktop packages, let's focus on just e-mail for now.

September 18, 2008 by in CXO

DarkMarket ID theft message board shuts down

DarkMarket ID theft message board shuts down

DarkMarket, an infamous underground message board that provides a haven for identity thieves to buy, trade and sell stolen data, plans to shut down operations.According to Threat Level's Kevin Poulsen, the three-year-old forum will go dark on October 4.

September 18, 2008 by in Security

The most "dangerous" celebrities to search for in 2008

The most "dangerous" celebrities to search for in 2008

Searching for details regarding the latest celebrity gossip may expose you to everything the IT underground has to offer - from adware and spyware to misleading offers and fake newsletters enticing you to opt-in into a spammer's campaign. McAfee owned SiteAdvisor has recently released the 2008 list of the celebrity names that are most actively abused by malicious attackers in order to attract legitimate traffic to their malicious sites.

September 17, 2008 by in Security

Targeted malware attack against U.S schools intercepted

Targeted malware attack against U.S schools intercepted

Timing is everything, and from a cybercriminal's perspective, a new school year means segmenting their email databases to launch a targeted attack welcoming everyone back online. According to MessageLabs Intelligence :"Starting in early September, MessageLabs intercepted a targeted, email-borne malware attack on US schools and government organizations, a majority of which are located in New Mexico, Virginia, Illinois and Hawaii.

September 17, 2008 by in Security

Google downplays Chrome's carpet-bombing flaw

Google downplays Chrome's carpet-bombing flaw

In a recent Q&A with Google's Brian Rakowski, Philipp Lenssen asked him a question in regard to Chrome's carpet-bombing flaw. Not surprising, considering that Apple refused to admit Safari's carpet-bombing flaw at the first place, Google is too, downplaying it  :"Lenssen: There are ways to make Chrome automatically download a file without the user confirming this (at least using Chrome’s default options).

September 16, 2008 by in Enterprise Software

Newsletters

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
See All
See All

Top Stories