In a blog posted yesterday on Opera's website, blogger Claudio Santambrogio tells us that he isn't happy about the way Mozilla handled an Opera security disclosure. Here's what Claudio had to say:Mozilla notified us of one security issue ( ) the day before they published their public advisory ( ).
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Violet Blue is the author of The Smart Girl's Guide to Privacy. She contributes to ZDNet, CNET, CBS News, and SF Appeal.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years
Exploit code for Microsoft Works--which was just patched on Tuesday--and QuickTime is making the rounds.First up, the Microsoft Works exploit.
Cisco on Wednesday delivered patches to plug multiple overflow and denial of service vulnerabilities.In an advisory Cisco said multiple IP phone devices running the Skinny Client Control Protocol (SCCP) firmware were impacted.
Adobe has delivered three new bulletins warning about a critical code injection vulnerability that could allow an attacker to take over a system. The two primary platforms affected--Flash Media Server 2.
Ryan Naraine has cooked up a list of the most influential people in security.Here's the list packaged in a slideshow, which is annoyingly set on fast forward.
Bain Capital, the private equity firm trying to engineer a takeover of 3Com with Huawei Technologies, is reportedly offering to divest security software firm TippingPoint to win U.S.
Mozilla launched the third beta of its Firefox 3 browser Tuesday night with enhanced security features.Firefox 3 Beta 3 contains more than 1,300 changes from the second beta to improve performance.
Updated: Microsoft delivered 11 patches on Tuesday addressing 17 vulnerabilities. Six updates fix critical flaws and five address important vulnerabilities, but an already exploited Excel zero day was left unpatched.
George Ou highlights problems with Vista's speech recognition software and wonders why the issue hasn't been fixed for more than a year. The reason: Risk management.
A little more than a year ago, Sebastian Krahmer posted a question on the Dailydave security mailing list whether Vista's speech recognition was exploitable or not via malicious sound files that could be hosted on websites. I was the first to answer his call with some initial skepticism but that turned in to astonishment when I ran some tests that confirmed the vulnerability.