Patch Tuesday is no longer an exclusive Microsoft event. Slowly but surely, it's beginning to look like more and more big-name software vendors are piggybacking on Microsoft's scheduled patch day to roll out critical software fixes.
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Violet Blue is the author of The Smart Girl's Guide to Privacy. She contributes to ZDNet, CNET, CBS News, and SF Appeal.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years
The ongoing confusion over the IE -> Firefox security vulnerability that introduces a nasty attack vector for Windows users with both browsers installed has raised a serious question about the responsibility of software vendors to protect its customers.
A quartet of former Microsoft employees have launched an anti-malware start-up, joining an established list of companies using browser plugins to thwart drive-by exploits.
Microsoft's Patch Tuesday train arrived today with six bulletins covering at least 11 vulnerabilities, most carrying the company's highest severity rating.
Hackers attending next month's Hack in the Box conference in Kuala Lumpur are pitching in to raise funds for the Malaysian National Cancer Council.
Experts agree that Windows machines with both Internet Explorer and Firefox installed are vulnerable to a serious security vulnerability but there's all kinds of confusion over which browser is hosting the vulnerability.
The following configuration changes, recommended by CERT/CC, can disable various features and set up Firefox to run in a secure state, limiting the damage from malware attacks.
Google has announced its second acquisition in the computer security space, shelling out a whopping $625 million in cash to snap up enterprise e-mail security vendor Postini.
Guest Editorial: The story of modern computer security can never be told -- it's the story of the unknown. Right now, most people treat vulnerabilities as a constant stream of one-offs. In many real ways, the entire CVE database is the tip of an iceberg.
There's a new player in the exploding market for zero-day vulnerabilities -- an eBay-like auction site offering a place to buy and sell flaw research information.