Apple on Tuesday patched code execution and cross-site scripting vulnerabilities on Tiger, Leopard, Vista and XP in a Safari update that included 13 patches.Apple historically has delivered patches along with new feature or software updates.
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Violet Blue is the author of The Smart Girl's Guide to Privacy. She contributes to ZDNet, CNET, CBS News, and SF Appeal.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years
Hannaford Bros., a supermarket chain with stores primarily in the Northeast and Florida, said Monday that it was hit by a data breach that exposed 4.
Another day another ActiveX problem. This time an ActiveX vulnerability in CA BrightStor ARCServe Backup could be exploited to compromise a user's system.
Web defacement archive Zone-H.org has produced a comprehensive three-year report on Web Server defacements for 2005 to 2007.
Microsoft plugged more than a few vulnerabilities in Excel last week, but the trade off may be calculation errors.Microsoft's Bill Sisk said in a post late Friday following the software giant's latest patch batch:I wanted to let you know that we have updated bulletin MS08-014 to provide additional information on a newly identified issue that causes Microsoft Excel 2003 calculations to return an incorrect result when a Real Time Data source is used.
The Same Origin Policy is one of the guiding principles that seek to protect our browsing experience. The Same Origin Policy was originally released with Netscape Navigator 2.
It's not much fun when one of your security vendors falls to a Web attack. Infoworld reports that TrendMicro was a victim of a recent Web attack that used legit sites to deliver malware.
CAPTCHAs, those fuzzy letters that are supposed to ensure you're a human when you register for an account, have been under fire of late, but Google says their demise is greatly exaggerated.That's the takeaway from a post by Brad Stone in the New York Times Bits blog.
Reports are in from Gizmodo that the iPhone 2.0 firmware has been hacked.
I was looking over famed security researcher and cryptography expert Bruce Schneier's blog today and found an article on hacking medical devices. I have to admit that I was surprised, but I shouldn't have been.