Google's anti-malware team has emerged from the shadows with a new blog, a widely discussed research paper and enough clues about its ambitious drive to put a roadblock between dirty Web sites and end users.
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Violet Blue is an outspoken and controversial author and journalist; she contributes to ZDNet, CNET, CBS News and SF Appeal.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years
Microsoft has released a file conversion tool that stops exploits rigged into .doc, .xls and .ppt files from infecting Office 2003 users.
MessageLabs is reporting a surge in targeted malware attacks against a known Microsoft Word code-execution vulnerability, suggesting that an exploit generator kit may be circulating online.
The flaw can be exploited to cause a buffer overflow when a user right-clicks a malicious torrent entry in the transfer manager.
Verisign has released a Firefox add-on that brings extended validation (EV) certificate support to Mozilla's open-source Web browser
Verisign's iDefense has put a $16,000 prize for any hacker who can find a remotely exploitable flaw in six core Internet infrastructure applications.
Throughout the month of June, a Ukranian hacker plans to shake out cross-site scripting bugs in the most popular search engines (think Google, Yahoo, MSN, Ask.com) and publish details on these security flaws.
Almost exactly a year after an intense botnet denial-of-service attack destroyed the renegade Blue Frog anti-spam service, the Israeli programmers are back and you won't believe what they're up to.
Microsoft plans to implement a major change to the Patch Tuesday advance notice mechanism to provide more details ahead of the release of security bulletins. The security bulletins are also undergoing a layout/design makeover.
Secunia's inspector identified about 4.9 million installed applications, and out of those, 1.4 million applications were found to be lacking critical security patches from the vendors. Opera users were the most tardy in applying critical patches for browser vulnerabilities.