Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Violet Blue is the author of The Smart Girl's Guide to Privacy. She contributes to ZDNet, CNET, CBS News, and SF Appeal.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years
Instead of designing the security software to run on Microsoft's Windows or another operating system, Symantec and Intel are building it so it can directly interact with the Intel chips.
The cumulative Internet Explorer update headlines a bumper batch of nine bulletins that contains fixes for 14 documented software vulnerabilities.
When the security software installed on your system exposes you to code execution attacks, can you really trust them?
Security professionals in Germany have begun to remove exploits and hacking tools from the Internet in response to a new German law that expressly forbids the distribution of any software that can be used in computer/network attacks.
Steve Orenberg, who heads up Kaspersky's U.S. unit and joins the board as a new director, says the restructuring is the first step in a strategic plan to pursue an IPO (initial public offering) exit.
An unpatched flaw in an ATI driver was at the center of the mysterious Purple Pill proof-of-concept tool that exposed a way to maliciously tamper with the Windows Vista kernel.
Microsoft plans to ship nine security bulletins next Tuesday with patches for a wide range of "critical" vulnerabilities affecting the Windows operating system, the Microsoft Office productivity suite and the widely deployed Internet Explorer browser.
On the same day Cisco released patches for multiple operating system and software vulnerabilities, the network routing and switching vendor suffered an outage that knocked the Cisco.com offline for about three hours.
Gunter Ollman, director of security strategy at IBM Internet Security Systems (ISS), believes there's no real accountability attached to the trading of vulnerability information by third party companies like iDefense and TippingPoint.