Zack Whittaker

Zack Whittaker is the security editor for ZDNet. You can send tips securely via Signal and WhatsApp to 646-755-8849, and his PGP fingerprint for email is: 4D0E 92F2 E36A EC51 DAAE 5D97 CB8C 15FA EB6C EEA5.

Charlie Osborne

Charlie Osborne is a cybersecurity journalist and photographer who writes for ZDNet and CNET from London. PGP Key: AF40821B

Jennifer Leggio

Jennifer Leggio has been in the security industry for 17 years as a marketer, advisor, and writer. Her focus is on security culture, including disclosure, community issues, equality in security, disruptive trends, and even marketing best practices. PGP Key: 3A708289 | She prefers other contact on Twitter via @mediaphyter.

Latest Posts

Google: no evidence of a Gmail vulnerability

Google: no evidence of a Gmail vulnerability

Following the speculations on the resurrection of what's thought to be an already fixed Gmail flaw which could assist in domain name hijackings, yesterday Google commented that their investigation indicated that the recent domain hijacks should be attributed to a phishing campaign, rather than to a Gmail flaw.

November 25, 2008 by in Security

Symantec puts value of underground transactions at $275M

Symantec puts value of underground transactions at $275M

Those of you looking for statistics to justify your security budgets for next year, look no further: Symantec has released their view of the underground economy as it has evolved over the past year.The qualitative information in the report is amusing, but the quantitative information has far more value to anyone trying to build a justification for infrastructure and security services related to PCI-DSS.

November 25, 2008 by in Security

Cybercriminals release Christmas themed web malware exploitation kit

Cybercriminals release Christmas themed web malware exploitation kit

"Committing cybercrime around the Christmas tree" has always been a tradition for malicious attackers introducing new ways to scam the millions of online shoppers during the holidays. This Christmas isn't going to be an exception, but what has changed compared last couple of years is the tone of the Xmas promotions already circulating across various cybercrime communities.

November 24, 2008 by in Security

Microsoft is 5th most spam-friendly ISP

Microsoft is 5th most spam-friendly ISP

Spammers are abusing Microsoft's online services at such an alarming rate that a non-profit spam fighting group now lists Microsoft as the world's 5th most spam-friendly ISP (Internet Service Provider).The latest update of Spamhaus.

November 21, 2008 by in Microsoft

Verizon snoops peek at Obama's cell phone records

Verizon snoops peek at Obama's cell phone records

Nosy Verizon employees improperly accessed and peeked at Barack Obama's personal cell phone records, the company said in a statement acknowledging the privacy breach.In the statement, Verizon Wireless chief executive Lowell McAdam apologized to the President-elect and vowed that the errant employees will be disciplined.

November 20, 2008 by in Mobility

Malware found in Lenovo software package

Malware found in Lenovo software package

Computer maker Lenovo is shipping a malware-infected software package to Windows XP users, according to warning from anti-virus researchers at Microsoft.The malicious file was identified by Microsoft as Win32/Meredrop, a Trojan dropper that is used to install and execute multiple malicious executables on an infected computer.

November 19, 2008 by in Security

Fake Windows XP activation trojan goes 2.0

Fake Windows XP activation trojan goes 2.0

Known as Kardphisher and "in the wild" since April, 2007, last week the malware author of this trojan horse mimicking the Windows XP activation interface while collecting the credit card details the end user has submitted, has made significant changes to visual interface and usability of the trojan, consequently improving its authenticity. Guess what happens when a gullible end user falls victim into this social engineering attack?

November 18, 2008 by in Security

Commercial vendor of spyware under legal fire

Commercial vendor of spyware under legal fire

Just like every decent marketer out there, vendors of commercial malware tools are very good at positioning their tools. However, their pitches often contradict with themselves in a way that what's promoted as a Remote Administration Tool, has in fact built-in antivirus software evading capabilities, rootkit functionality and tutorials on how to remotely infect users over email.

November 18, 2008 by in Security

What really happened to the candidates' computers?

What really happened to the candidates' computers?

Now that two weeks have passed since the end of the presidential campaigns, it is worthwhile to take a look at what I think should have one of the biggest cybercrime stories of the year. As Ryan blogged the day after the election, both the McCain and the Obama campaigns' systems were compromised by an external party, and this compromise lead to a massive data exfiltration.

November 18, 2008 by in Enterprise Software

Newsletters

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
See All
See All

Top Stories