The U.S. Computer Emergency Readiness Team has warned about a code execution flaw in the AOL Radio software.
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Violet Blue is the author of The Smart Girl's Guide to Privacy. She contributes to ZDNet, CNET, CBS News, and SF Appeal.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years
A security researcher has found a remote command execution exploit in SAP's MaxDB database on the Windows, Linux and Solaris platforms.Researcher Luigi Auriemma published the flaw in MaxDB versions 7.
Secunia has some alarming stats on the lack of patching going on out there.Secunia uses its PSI application to track patches and the state of security.
The dreaded Storm worm is now being used for phishing scams, according to security researchers.F-Secure outlined a phishing scam involving the Storm worm (all resources) on i-halifax.
The latest rootkit in the wild hides on your hard drive's boot sector and is starting to infect Windows PCs, according to security researchers.And the real kicker: The rootkit can't be detected by most antivirus applications.
Microsoft on Tuesday delivered one "critical" addressing two vulnerabilities in XP and Vista and one "important" vulnerability in Windows 2000, XP and Windows Server 2003.The critical patch resolves two vulnerabilities (CVE-2007-0069 and CVE-2007-0066) reported by IBM ISS X-Force.
Computerworld chronicles the tale of Web hosting firm C I Host Inc. and details how its data center was robbed.
Geeks.com, a computer gear e-tailer that sports ScanAlert's "Hacker Safe" logo, has been hacked.
Sears may have taken down a feature that allowed you to see anyone's purchase history, but not fast enough to keep the lawyers at bay.On Friday, KamberEdelson filed a class action complaint alleging that Sears ManageMyHome.
One of the biggest problems with wireless LAN security standards is the lack of an intermediate solution. Your only choices in securing a wireless LAN were to deploy enterprise grade WPA wireless LAN security which requires RADIUS (Remote Authentication Dial In User Service) servers in addition to a PKI (Public Key Infrastructure) or you deployed shared secret technology using WPA-PSK.