Microsoft's September batch of security updates will include patches for at least five vulnerabilities in several Windows and MSN-branded software products.
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Violet Blue is the author of The Smart Girl's Guide to Privacy. She contributes to ZDNet, CNET, CBS News, and SF Appeal.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years
Apple today shipped an iTunes software refresh to add support for all the shiny new toys but, unless you're following security announcements closely, you'd never know that iTunes 7.4 contains a fix for a pretty nasty code execution vulnerability.
Nearly nine months after it was first discovered, the Storm Worm Trojan continues to surge, building what experts believe could be the world's most powerful supercomputer.
The U.S. Computer Emergency Readiness Team (US-CERT) is warning about multiple code execution holes affecting users of Intuit QuickBooks Online Edition.
The Internet Software Consortium has pulled the plug on support for BIND 8 after the discovery of a serious vulnerability that could lead to cache poisoning attacks.
According to Billy Rios and Nate McFeters, the two security researchers behind the exposure of protocol abuse in popular Web browsers, Firefox is still vulnerable to a remote command injection flaw that could allow hackers to launch executable code on Windows machines.
The Bank of India Web site has been hijacked by online criminals and is being used to serve up rootkits and backdoor Trojans on unpatched Windows machines.
Yahoo has confirmed -- and fixed -- another nasty code execution hole affecting users of its Yahoo Messenger chat client.
Apple has released a firmware upgrade to fix a remotely exploitable security issue in the AirPort Extreme Base Station.The flaw, publicly known since April, could allow remote attackers to adversely affect network performance," Apple said in an advisory.
Monster.com said it is implementing new robust capabilities for worldwide monitoring and surveillance of site traffic, reviewing and tightening all site access policies and controls and launching a series of targeted initiatives to protect job seeker contact information.