Web application security firms HP (SPI Dynamics) and Cenzic have called off the dogs in a patent dispute over fault injection technology.
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Violet Blue is the author of The Smart Girl's Guide to Privacy. She contributes to ZDNet, CNET, CBS News, and SF Appeal.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years
Computer networking giant 3Com has been sold for $2 billion in cash to Bain Capital and Chinese telco equipment group Huawei Technologies. The inclusion of 3Com's TippingPoint zero-day flaw broker will certainly raise eyebrows in government circles.
Apple has shipped an iPhone software update to patch 10 different vulnerabilities that could allow malicious hackers to launch executable code, steal e-mail credentials or take control of the device's phone-dialing capabilities.
There's a nasty worm hole in America Online's standalone AIM (instant messaging) software that won't be patched until the middle of October.
Fed up with the "ambiguity and confusion" surrounding Germany's controversial anti-hacker laws, a private security research firm has put its hacking tools back online as part of a public test of the interpretation of the new law.
In the past few days, there have been multiple disclosures of security vulnerabilies in a wide range of Google products, including a persistent e-mail theft issue affecting the widely used GMail service.
If the statistics from Microsoft's MSRT (malicious software removal tool) are anything to go by, the Storm Worm botnet is not quite the world's most powerful supercomputer.
Check Point Software Technologies has released a public beta of ZoneAlarm ForceField, a browser virtualization security tool that promises anti-phishing and spyware-blocking capabilities.
The Fall edition of Microsoft's Blue Hat hacker summit will kick off next week with a heavy focus on piercing the security veil of virtualization and process isolation.
Adobe's ever-present Acrobat/PDF Reader software is prone to a nasty code execution vulnerability that could expose Windows users to PC takeover attacks.