Researchers from Peking University in Beijing and the University of Mannheim in Germany released a paper this week that aims to map the underground cybercrime economy in China.The paper concludes that 1.
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Violet Blue is the author of The Smart Girl's Guide to Privacy. She contributes to ZDNet, CNET, CBS News and SF Appeal.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years
OpenOffice.org has patched a highly critical code execution vulnerability that could allow an attacker to take control of a system.
This is the season for predictions and Websense is out with its top 10 predictions and a couple of them are quite interesting. One of the more interesting ones is the prediction (more like hope) that the government nabs a big hacking group in 2008.
European anti-malware vendor Grisoft has acquired Exploit Prevention Labs (EPL) in a deal that adds technology to protect against drive-by Web-borne attacks.Financial terms of the transaction were not released.
Security researchers Dino Dai Zovi and Charlie Miller have found a way to exploit an unpatched QuickTime vulnerability to steal Linden Dollars from users in the Second Life virtual world.Dai Zovi (the hacker behind the CanSecWest MacBook Pro hijack) and Miller (creator of the first iPhone code execution exploit) cooked up the QuickTime/Second Life attack during an investigation of the security of online games .
Technology will evolve as computers become 100 times more powerful in 10 years. IT systems will become so interconnected that the risk of failures will escalate.
Following the public release of a serious flaw in the way Windows resolves hostnames that do not include a fully-qualified domain name (FQDN), Microsoft has issued a security advisory to acknowledge the issue and offer pre-patch workarounds.
Mozilla security chief Window Snyder has dismissed Jeff Jones's IE vs Firefox flaw-counting exercise as a useless public relations exercise that ignores tons of bugs that aren't fixed until Microsoft ships service packs and major browser updates.
According to an 8-K filing, Symantec has borrowed $200 million under its $1 billion senior unsecured revolving credit facility to help finance its acquisition of DLP specialist Vontu.
3Com sells network intrusion-prevention equipment used by the Pentagon and U.S. government agencies and U.S. intelligence officials are concerned the technology China would gain from 3Com will boost the Chinese military's computer warfare capabilities.