Zack Whittaker

Zack Whittaker is the security editor for ZDNet. You can securely reach him on Signal and WhatsApp at 646-755-8849, and his PGP fingerprint for email is: 4D0E 92F2 E36A EC51 DAAE 5D97 CB8C 15FA EB6C EEA5.

Charlie Osborne

Charlie Osborne is a cybersecurity journalist and photographer who writes for ZDNet and CNET from London. PGP Key: AF40821B | Research/security tips email: cingred@protonmail.com.

Jennifer Leggio

Jennifer Leggio has been in the security industry for 17 years as a marketer, advisor, and writer. Her focus is on security culture, including disclosure, community issues, equality in security, disruptive trends, and even marketing best practices. PGP Key: 3A708289 | She prefers other contact on Twitter via @mediaphyter.

Latest Posts

Another free security utility: Trend Micro's RUBotted

Another free security utility: Trend Micro's RUBotted

Trend Micro has released a beta of RUBotted, a little program that watches for incoming bot related traffic.Here's the Trend Micro description:RUBotted intelligently monitors your computer's system behavior for activities that are potentially harmful to both your computer and other people's computers.

January 11, 2008 by in Security

Oracle plans 27 security fixes for Jan. 15

Oracle plans 27 security fixes for Jan. 15

Updated below: Oracle said Thursday that its latest batch of patches will fix 27 security fixes "across hundreds of Oracle products," including eight for the company's database, seven for its e-business suite and six for its application server.In its advisory, Oracle outlines a laundry list of software affected.

January 10, 2008 by in Security

Another QuickTime code execution flaw surfaces

Another QuickTime code execution flaw surfaces

A security researcher has unearthed a buffer overflow remote code execution vulnerability that affects QuickTime on both the Windows and Mac platform.The flaw was published Thursday by Luigi Auriemma, who has been busy of late, is the latest in a series of QuickTime issues.

January 10, 2008 by in Hardware

Storm worm goes phishing

Storm worm goes phishing

The dreaded Storm worm is now being used for phishing scams, according to security researchers.F-Secure outlined a phishing scam involving the Storm worm (all resources) on i-halifax.

January 9, 2008 by in Security

Lawyers circle Sears over privacy

Lawyers circle Sears over privacy

Sears may have taken down a feature that allowed you to see anyone's purchase history, but not fast enough to keep the lawyers at bay.On Friday, KamberEdelson filed a class action complaint alleging that Sears ManageMyHome.

January 7, 2008 by in Security

Ruckus wireless LAN security method solves usability versus security dilemma

Ruckus wireless LAN security method solves usability versus security dilemma

One of the biggest problems with wireless LAN security standards is the lack of an intermediate solution.  Your only choices in securing a wireless LAN were to deploy enterprise grade WPA wireless LAN security which requires RADIUS (Remote Authentication Dial In User Service) servers in addition to a PKI (Public Key Infrastructure) or you deployed shared secret technology using WPA-PSK.

January 4, 2008 by in Security

Newsletters

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
See All
See All

Top Stories