The Gentoo Project has removed a server hosting several sites and services after the discovery of a potentially serious command injection vulnerability.
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Violet Blue is the author of The Smart Girl's Guide to Privacy. She contributes to ZDNet, CNET, CBS News, and SF Appeal.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years
Exploit code for a potentially serious vulnerability in Yahoo Messenger has been posted on the Internet, putting millions of computer users at risk of code execution attacks.
According to a notice in the Ubuntu weekly newsletter, 5 of the 8 servers that are loco hosted had to be shut down after an investigation showed a variety of security problems.
Instead of designing the security software to run on Microsoft's Windows or another operating system, Symantec and Intel are building it so it can directly interact with the Intel chips.
The cumulative Internet Explorer update headlines a bumper batch of nine bulletins that contains fixes for 14 documented software vulnerabilities.
When the security software installed on your system exposes you to code execution attacks, can you really trust them?
Security professionals in Germany have begun to remove exploits and hacking tools from the Internet in response to a new German law that expressly forbids the distribution of any software that can be used in computer/network attacks.
Steve Orenberg, who heads up Kaspersky's U.S. unit and joins the board as a new director, says the restructuring is the first step in a strategic plan to pursue an IPO (initial public offering) exit.
An unpatched flaw in an ATI driver was at the center of the mysterious Purple Pill proof-of-concept tool that exposed a way to maliciously tamper with the Windows Vista kernel.