Zack Whittaker

Zack Whittaker is the security editor for ZDNet. You can securely reach him on Signal and WhatsApp at 646-755-8849, and his PGP fingerprint for email is: 4D0E 92F2 E36A EC51 DAAE 5D97 CB8C 15FA EB6C EEA5.

Charlie Osborne

Charlie Osborne is a cybersecurity journalist and photographer who writes for ZDNet and CNET from London. PGP Key: AF40821B

Jennifer Leggio

Jennifer Leggio has been in the security industry for 17 years as a marketer, advisor, and writer. Her focus is on security culture, including disclosure, community issues, equality in security, disruptive trends, and even marketing best practices. PGP Key: 3A708289 | She prefers other contact on Twitter via @mediaphyter.

Latest Posts

AVG and Rising signatures update detects Windows files as malware

AVG and Rising signatures update detects Windows files as malware

Yesterday, a signatures update pushed by AVG falsely labeled a critical Windows file as a banker malware, prompting the company to quickly fix the issue and issue a workaround, following end users complaints at its support forums.AVG's false positive causing downtime for Windows users is happening a week after Rising antivirus apologized to its customers for falsely detecting Outlook Express as malware leading to loss of emails, and yes, productivity too.

November 11, 2008 by in Security

'Memoryze' utility pinpoints malware code in live memory

'Memoryze' utility pinpoints malware code in live memory

Jamie Butler, a Windows internals expert who co-wrote the definitive book on rootkits, has created a free forensics tool capable of finding malicious code in live memory.The utility, called Mandiant Memoryze, was released at this year's Hack in the Box conference in Kuala Lumpur, Malaysia.

November 10, 2008 by in Hardware

Koobface Facebook worm still spreading

Koobface Facebook worm still spreading

Originally spreading since July, the Koobface worm remains active according to a recent security alert issued by Websense :"The email reveals that infected user accounts are being used to post messages to Facebook friends lists. The content was an enticing message with a link that used a Facebook open redirector.

November 10, 2008 by in Security

Rigged PDFs exploiting just-patched Adobe Reader flaw

Rigged PDFs exploiting just-patched Adobe Reader flaw

Just three days after Adobe shipped a patch with fixes for a critical Adobe Reader vulnerability, hackers are using booby-trapped PDF files to fire exploits against Windows users.[ SEE: Heads up: Patch your Adobe Reader now ]The in-the-wild attacks, first spotted by the SANS Internet Storm Center, follows the public release of proof-of-concept exploits at Milw0rm.

November 7, 2008 by in Security

WPA Wi-Fi encryption (partially) cracked

WPA Wi-Fi encryption (partially) cracked

Rob McMillan at IDG has the scoop on new research that shows it's possible to partially crack the WPA (Wi-Fi Protected Access) encryption standard.Full details of the theoretical attack is not yet known but McMillan reports that two security researchers -- Erik Tews and Martin Beck -- plan to discuss the issue at next week's PacSec conference in Japan.

November 6, 2008 by in Security

Obama-related spammed trojan propagating worldwide

Obama-related spammed trojan propagating worldwide

Several security companies including F-Secure, Sunbelt, and my employer Cloudmark (disclosure) are reporting a large volume of Obama-related spam that links to malware. This is just the latest twist on the long-running theme of social engineering end users into installing web-based malware.

November 5, 2008 by in Security

Newsletters

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
See All
See All

Top Stories