Updated below: Aviv Raff, a security researcher, has found a flaw in Skype that could allow an attacker to control your PC.On his blog, Raff explains the following:Skype uses Internet Explorer web control within the application to render internal and external HTML pages.
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Violet Blue is the author of The Smart Girl's Guide to Privacy. She contributes to ZDNet, CNET, CBS News, and SF Appeal.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years
If you're like most folks you are taking your time installing Microsoft's latest round of security patches. However, you may want to get your rear end in gear.
Yahoo is supporting OpenID 2.0 and could triple the number of accounts in the single sign-on framework.
Cisco Systems on Wednesday shipped a high priority fix for its Cisco Unified Communications Manager software, formerly known as CallManager.Cisco gave the flaw, which allows remote code executions, a CVSS Base Score of 10, the highest rating available.
The Microsoft Security Response Center has confirmed ongoing attacks against Excel and is recommending that users either run files through a tool that strips out exploit code or block Office 2003 and earlier formats except for those from trusted locations.
Oracle as expected released its quarterly batch of security fixes Tuesday.In a blog post, Oracle said:Oracle today released the January 2008 Critical Patch Update (CPUJan2008).
Apple's software updates for the iPhone and iPod touch contain a few security fixes. Apple also patched QuickTime while it was at it.
An outfit called Digital Armaments has announced a $20,000 bounty for hackers that cook up and exploitable vulnerability or working exploit for Windows applications.The contest's deadline is Feb.
F-Secure claims to have discovered the first Mac rogue application--MacSweeper.According to F-Secure, MacSweeper is spyware that closely resembles its Windows cousin Cleanator.
Two security researchers have outlined how hackers can use a Web browser and a little Shockwave file to exploit most Wi-Fi routers.Ryan Naraine interviewed two researchers, Adrian Pastor and Petko D.