Violet Blue

Violet Blue is the author of The Smart Girl's Guide to Privacy. She contributes to ZDNet, CNET, CBS News, and SF Appeal.

Larry Seltzer

Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years

Latest Posts

Zero-day flaw haunts HP laptop models

A zero-day hole is several major HP laptop models could provide an easy way for hackers to take complete control of Windows machines, according to a warning from an independent security researcher.

December 11, 2007 by Ryan Naraine


What's the story with these security holes?

There are 28 vulnerabilities in the ZDI pipeline, all high-severity, affecting some of the world's biggest IT vendors -- Computer Associates, Microsoft, Hewlett Packard, Novell, Oracle, IBM, Symantec, Sun Microsystems, Veritas and Borland.

December 10, 2007 by Ryan Naraine


Skype patches high-risk flaw, says sorry for not telling us

The specific flaw exists within the 'skype4com' URI handler created by Skype during installation. When processing short string values through this handler an exploitable memory corruption may occur which can result in arbitrary code execution under the context of the current user.

December 10, 2007 by Ryan Naraine


China connection eyed in Oak Ridge cyber attack

Last week's phishing attack at the Oak Ridge National Laboratory in Tennessee reportedly has a China connection.Oak Ridge and Los Alamos National Laboratory were hit with a cyber attack where hackers accessed Social Security numbers and birth dates of visitors to the lab between 1990 and 2004.

December 9, 2007 by


Talking malware with Eugene Kaspersky

Amidst growing chatter that the anti-virus/anti-spyware market is gasping for air, a veteran virus fighter says desktop security products must add new protection mechanisms to keep pace with aggressive online criminals.

December 6, 2007 by Ryan Naraine


Critical flaw in Cisco Security Agent for Windows

The flaw, which carries a CVSS rating of 10.0 (the highest possible severity score), can be exploited remotely and causes corruption of kernel memory, which leads to a Windows stop error (blue screen) or to arbitrary code execution.

December 6, 2007 by Ryan Naraine