Microsoft has released a file conversion tool that stops exploits rigged into .doc, .xls and .ppt files from infecting Office 2003 users.
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Violet Blue is the author of The Smart Girl's Guide to Privacy. She contributes to ZDNet, CNET, CBS News, and SF Appeal.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years
MessageLabs is reporting a surge in targeted malware attacks against a known Microsoft Word code-execution vulnerability, suggesting that an exploit generator kit may be circulating online.
The flaw can be exploited to cause a buffer overflow when a user right-clicks a malicious torrent entry in the transfer manager.
Verisign has released a Firefox add-on that brings extended validation (EV) certificate support to Mozilla's open-source Web browser
Verisign's iDefense has put a $16,000 prize for any hacker who can find a remotely exploitable flaw in six core Internet infrastructure applications.
Throughout the month of June, a Ukranian hacker plans to shake out cross-site scripting bugs in the most popular search engines (think Google, Yahoo, MSN, Ask.com) and publish details on these security flaws.
Almost exactly a year after an intense botnet denial-of-service attack destroyed the renegade Blue Frog anti-spam service, the Israeli programmers are back and you won't believe what they're up to.
Microsoft plans to implement a major change to the Patch Tuesday advance notice mechanism to provide more details ahead of the release of security bulletins. The security bulletins are also undergoing a layout/design makeover.
Secunia's inspector identified about 4.9 million installed applications, and out of those, 1.4 million applications were found to be lacking critical security patches from the vendors. Opera users were the most tardy in applying critical patches for browser vulnerabilities.
An independent security researcher has released details on a two-stage malware attack against Windows Vista to show how easy it is for non-privileged code to replace shortcuts on the Start Menu and intercept UAC (User Account Control) privilege elevation prompts.