Zack Whittaker

Zack Whittaker is the security editor for ZDNet. You can send tips securely via Signal and WhatsApp to 646-755-8849, and his PGP fingerprint for email is: 4D0E 92F2 E36A EC51 DAAE 5D97 CB8C 15FA EB6C EEA5.

Charlie Osborne

Charlie Osborne is a cybersecurity journalist and photographer who writes for ZDNet and CNET from London. PGP Key: AF40821B

Jennifer Leggio

Jennifer Leggio has been in the security industry for 17 years as a marketer, advisor, and writer. Her focus is on security culture, including disclosure, community issues, equality in security, disruptive trends, and even marketing best practices. PGP Key: 3A708289 | She prefers other contact on Twitter via @mediaphyter.

Latest Posts

Microsoft blames 'human issues' for Bluetooth patch hiccup

Microsoft blames 'human issues' for Bluetooth patch hiccup

Microsoft has re-released its critical MS08-030 bulletin for Windows XP SP2 and SP3 users, warning that "two separate human issues" caused a major hiccup with the critical security patch.The original version of the patch, which corrects a remote code execution flaw in the Windows Bluetooth stack, failed to properly fix the vulnerability for Windows XP users, according to Christopher Budd, a program manager in the MSRC (Microsoft Security Response Center).

June 19, 2008 by in Enterprise Software

Security breach hits DivShare, unauthorized access to its database

Security breach hits DivShare, unauthorized access to its database

The popular document and media sharing service DivShare, suffered a security breach according to a security announcement posted by DivShare's support team earlier this week :Late last night we were alerted of a security breach that allowed a malicious user to access our database, which included user e-mail addresses and other basic profile information. No financial information has been accessed by any unauthorized parties.

June 19, 2008 by in Security

2008 Pwnie Awards

2008 Pwnie Awards

Don't forget to go and vote on the Pwnie Awards, which will happen at Black Hat Vegas again this year.  I don't want to campaign for votes, but I wouldn't be pissed if some of my loyal readers out there voted for me, Billy Rios, Rob Carter, and John Heasman and some of our interesting research that I've presented here on the blog.

June 19, 2008 by in Security

China detains web site defacer spreading earthquake rumors

China detains web site defacer spreading earthquake rumors

The Xinhua news agency is reporting that the web site defacer which I mentioned in a previous post regarding the use of web site defacements as tools for psychological operations, has been located and detained in less than a week after he defaced the Seismic Emergency and Public Center of the Guangxi province where he left a fake message on an upcoming earthquake that's going to hit China.

June 18, 2008 by in Security

Finjan uncovers half a gigabyte of stolen data on crimeware servers

Finjan uncovers half a gigabyte of stolen data on crimeware servers

Finjan's Malicious Code Research Center has uncovered a half of gigabyte of stolen data from US Healthcare organizations and from a major airline on crimeware servers in Argentina and Malaysia.A representative of Finjan stated:"Hackers incorporated sophisticated attacks using crimeware toolkits, Trojans, and Command and Control servers to drive traffic from a specific region with specific characteristics.

June 17, 2008 by in Tech & Work

Fresh off the press: iPhoneDbg toolkit hotness

Fresh off the press: iPhoneDbg toolkit hotness

The guys at Core Security just released an iPhoneDbg toolkit that should make exploit development for the iPhone much easier.  This is outstanding news for all, as I think there has been a lot of concern over the quick rise of mobile devices and the new security concerns that they create.

June 17, 2008 by in iPhone

How to recover GPcode encrypted files?

How to recover GPcode encrypted files?

Got backups? In response to the security community's comments on the futile attempt to directly attack the 1024 bit RSA keys using distributed computing, Kaspersky Labs are now reasonably recommending that affected end users lacking backups of their encrypted data, take advantage of data recovery tools :Currently, it's not possible to decrypt files encrypted by Gpcode.

June 15, 2008 by in Security

Hacking SCADA for terrorism and destruction

Hacking SCADA for terrorism and destruction

SCADA scares me, and I've seen enough things on the Internet to be desensitized to many things, but attacks against SCADA threaten our national security in a very real and topical way by attacking power grids, water treatment plants, nuclear plants, etc.  Hacking networks that SCADA devices reside on and using that access to interact with the SCADA system is nothing really new, it's been covered in the media quite a bit...

June 11, 2008 by in Networking

Newsletters

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
See All
See All

Top Stories