This month's ActiveX flaw project has uncovered a potentially dangerous code execution hole in an ActiveX module in Microsoft Office 2000.
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Violet Blue is the author of The Smart Girl's Guide to Privacy. She contributes to ZDNet, CNET, CBS News, and SF Appeal.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years
Barring any "show-stopper issues" during the testing process, security and stability support for Mozilla Firefox 1.5 will expire on May 30.
Anti-virus experts are giving a collective thumbs-down to a proof-of-concept virus targeting OpenOffice and StarOffice, dismissing the creation as a silly publicity stunt.
Google has invested heavily in several anti-malware/anti-spyware initiatives but the search engine giant might have a spyware problem of its own.According to David Ulevitch, CEO of OpenDNS, Google's revenue-generating URL error alliance with Dell drops a difficult-to-remove program on computers that straddles the spyware line.
Google's anti-malware team has emerged from the shadows with a new blog, a widely discussed research paper and enough clues about its ambitious drive to put a roadblock between dirty Web sites and end users.
Microsoft has released a file conversion tool that stops exploits rigged into .doc, .xls and .ppt files from infecting Office 2003 users.
MessageLabs is reporting a surge in targeted malware attacks against a known Microsoft Word code-execution vulnerability, suggesting that an exploit generator kit may be circulating online.
The flaw can be exploited to cause a buffer overflow when a user right-clicks a malicious torrent entry in the transfer manager.
Verisign has released a Firefox add-on that brings extended validation (EV) certificate support to Mozilla's open-source Web browser
Verisign's iDefense has put a $16,000 prize for any hacker who can find a remotely exploitable flaw in six core Internet infrastructure applications.