According to Ryan Singel at Wired News, AOL shipped a silent, server-level patch on Monday night to fixa gaping hole that allowed hackers to gain complete control of any PC running the latest version of AIM.
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Violet Blue is the author of The Smart Girl's Guide to Privacy. She contributes to ZDNet, CNET, CBS News, and SF Appeal.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years
One of my rules with security problems--phishing, bogus programs and such--is to check the spelling. Here's a secret: Hackers can't spell.
Microsoft issued seven security bulletins on Thursday with three deemed critical. The other four were rated "important.
Researchers from Peking University in Beijing and the University of Mannheim in Germany released a paper this week that aims to map the underground cybercrime economy in China.The paper concludes that 1.
OpenOffice.org has patched a highly critical code execution vulnerability that could allow an attacker to take control of a system.
This is the season for predictions and Websense is out with its top 10 predictions and a couple of them are quite interesting. One of the more interesting ones is the prediction (more like hope) that the government nabs a big hacking group in 2008.
European anti-malware vendor Grisoft has acquired Exploit Prevention Labs (EPL) in a deal that adds technology to protect against drive-by Web-borne attacks.Financial terms of the transaction were not released.
Security researchers Dino Dai Zovi and Charlie Miller have found a way to exploit an unpatched QuickTime vulnerability to steal Linden Dollars from users in the Second Life virtual world.Dai Zovi (the hacker behind the CanSecWest MacBook Pro hijack) and Miller (creator of the first iPhone code execution exploit) cooked up the QuickTime/Second Life attack during an investigation of the security of online games .
Technology will evolve as computers become 100 times more powerful in 10 years. IT systems will become so interconnected that the risk of failures will escalate.
Following the public release of a serious flaw in the way Windows resolves hostnames that do not include a fully-qualified domain name (FQDN), Microsoft has issued a security advisory to acknowledge the issue and offer pre-patch workarounds.