The following configuration changes, recommended by CERT/CC, can disable various features and set up Firefox to run in a secure state, limiting the damage from malware attacks.
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Violet Blue is the author of The Smart Girl's Guide to Privacy. She contributes to ZDNet, CNET, CBS News, and SF Appeal.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years
Google has announced its second acquisition in the computer security space, shelling out a whopping $625 million in cash to snap up enterprise e-mail security vendor Postini.
Guest Editorial: The story of modern computer security can never be told -- it's the story of the unknown. Right now, most people treat vulnerabilities as a constant stream of one-offs. In many real ways, the entire CVE database is the tip of an iceberg.
There's a new player in the exploding market for zero-day vulnerabilities -- an eBay-like auction site offering a place to buy and sell flaw research information.
Microsoft plans to ship six bulletins with patches for multiple code execution vulnerabilities affecting Office, Excel, Windows and the .NET Framework.
Some day, hypervisor malware will be mooted when every mainstream platform runs virtualized by default, with secured, well-tested hypervisors that prevent hyperjacking from ever taking place. Microsoft should help make that day come sooner rather than later.
As a malware researcher, I spend the majority of my days days studying the dark side of the web and one of the most interesting things I get to see are the weird, and sometimes wonderful, search engine queries that result in dangerous Web sites.
Guest Editorial: What do 225,000 Ohio taxpayers, 64,000 state employees and 600 lucky holders of winning lottery tickets have in common?
Guest Editorial: The US FBI has kicked off Operation Bot Roast this summer with the goal of addressing the botnet problem. Hurray for them,it's good that something is being done. However, this is probably not going to stop the botnet problem, and maybe wont even make a dent in the problem.
Hardware hackers at iFixit are disassembling the iPhone in real time, providing the first look at the belly of the beast.