In a much ballyhooed media event, Apple released the iPhone SDK at a press conference last week. I've been watching the wire to see if other security researchers are as concerned about Apple's development and deployment model as I am.
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Violet Blue is the author of The Smart Girl's Guide to Privacy. She contributes to ZDNet, CNET, CBS News, and SF Appeal.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years
An application dubbed G-Archiver backs up your Gmail account to a hard drive with a not-so-nice twist: It swipes your user name and password.Jeff Atwood at Coding Horror outlines a chilling tale as told by Dustin Brooks, one of his readers.
Core Security Technologies on Monday named Mark Hatton CEO. Hatton was the president of North American operations for Sophos.
Sun released an update today to cover numerous vulnerabilities within the JDK/JRE.The following vulnerabilities were reported as patched:Two security vulnerabilities in the Java Runtime Environment Virtual Machine may independently allow an untrusted application or applet that is downloaded from a website to elevate its privileges.
Well, this may be old news to some, as Johnny Long is pretty well known for his Google hacking exploits, but I thought it was worth bringing up again as it was news to me. In July of 2007, Johnny started a group called "Hackers for Charity", with the goal of applying the skills of the hacking community to charitable organizations that need those skills.
As most of the tech industry knows, Apple launched its long-awaited iPhone SDK on Thursday.With the move Apple has gone more corporate with its iPhone (Techmeme) and talked a good security game by offering features like remote wipe.
Microsoft said it plans to address four critical bulletins for vulnerabilities in Office on its upcoming patch day March 11.In a security bulletin, Microsoft said Thursday there are four critical remote code execution flaws in Office, which is regularly under attack.
We all remember code red, right? Come on, you know you were hit with it...
Amid all the hubbub about the first beta of IE 8 the security features haven't gotten a lot of attention. Part of the problem is that Microsoft hasn't disclosed a lot, but it does appear that the browser will block malware.
If your company or organization runs an enterprise wireless LAN network, I have some troubling news for you. Odds are high that your current "enterprise-class" wireless LAN deployment is vulnerable to authentication leakage which not only exposes your internal network but all of your server access controls.