There's a new player in the exploding market for zero-day vulnerabilities -- an eBay-like auction site offering a place to buy and sell flaw research information.
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Violet Blue is the author of The Smart Girl's Guide to Privacy. She contributes to ZDNet, CNET, CBS News, and SF Appeal.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years
Microsoft plans to ship six bulletins with patches for multiple code execution vulnerabilities affecting Office, Excel, Windows and the .NET Framework.
Some day, hypervisor malware will be mooted when every mainstream platform runs virtualized by default, with secured, well-tested hypervisors that prevent hyperjacking from ever taking place. Microsoft should help make that day come sooner rather than later.
As a malware researcher, I spend the majority of my days days studying the dark side of the web and one of the most interesting things I get to see are the weird, and sometimes wonderful, search engine queries that result in dangerous Web sites.
Guest Editorial: What do 225,000 Ohio taxpayers, 64,000 state employees and 600 lucky holders of winning lottery tickets have in common?
Guest Editorial: The US FBI has kicked off Operation Bot Roast this summer with the goal of addressing the botnet problem. Hurray for them,it's good that something is being done. However, this is probably not going to stop the botnet problem, and maybe wont even make a dent in the problem.
Hardware hackers at iFixit are disassembling the iPhone in real time, providing the first look at the belly of the beast.
Rutkowska says she is "ready to accept" the challenge but wants her two-person team to be paid $384,000 ($200 a day each for two people working full-time for six months), a demand that has dashed all hopes for a hacker face off at Black Hat this year.
Less than three years after shelling out $430 million to acquire TippingPoint, 3Com plans to spin out the unit in a planned IPO later this year.
Virus hunters at Symantec have stumbled upon a malicious server using an attack framework that intelligently chooses exploits based on the client's browser.This is the first sign of the type of reconnaissance attacks predicted by by white hat researchers (See: Do you know what's leaking out of your browser?