Violet Blue

Violet Blue is the author of The Smart Girl's Guide to Privacy. She contributes to ZDNet, CNET, CBS News, and SF Appeal.

Larry Seltzer

Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years

Latest Posts

Cisco confirms vulnerability in 7921 Wi-Fi IP phone

Two days after news of the Vocera Wi-Fi VoIP communicator PEAP security bypass vulnerability, I received confirmation from Cisco that their model 7921 Wi-Fi VoIP phone is also vulnerable to the same issue where digital certificates aren't cryptographically verified.  Both Cisco and Vocera have told me that they intend to fix future implementations of PEAP and do the necessary steps to ensure certificate authenticity.

February 22, 2008 by George Ou


Cryogenically frozen RAM bypasses all disk encryption methods

Computer encryption technologies have all relied on one key assumption that RAM (Random Access Memory) is volatile and that all content is lost when power is lost. That key assumption is now being fundamentally challenged with a $7 can of compressed air and it's enough to give every security professional heart burn.

February 21, 2008 by George Ou

61 Comments 1 Vote

Microsoft: 'We try to reproduce every vulnerability that comes in'

Microsoft outlined what it does with incoming vulnerability research, how it designates flaws and playing the cloak-and-dagger game with hackers.In a Q&A with Ryan Naraine, Jonathan Ness, the lead software engineer on Microsoft's SWI Defense team, addressed a big emerging issue between the software giant and security researchers: Who has the onus to reproduce the flaw?

February 19, 2008 by


Wanted: Black Hat bloggers

Due to a scheduling conflict, I can't make the Black Hat conference so we're calling for guest submissions for Zero Day.In a nutshell, we're looking for brief recaps of the Black Hat presentations and your take on the festivities since I can't be in three places at once.

February 15, 2008 by

1 Comment