Violet Blue

Violet Blue is the author of The Smart Girl's Guide to Privacy. She contributes to ZDNet, CNET, CBS News, and SF Appeal.

Larry Seltzer

Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years

Latest Posts

Zero-day #5: Beware of (unexpected) Excel files

Microsoft late Friday warned users to be on the lookout for Excel files that arrive unexpectedly -- even if they come from a co-worker's e-mail address.In an advisory, Microsoft confirmed a new wave of limited "zero-day" attacks was underway, using a code execution flaw in its Microsoft Office desktop productivity suite.

February 2, 2007 by Ryan Naraine


Super Bowl stadium site hacked, seeded with exploits

The official Web site of Dolphin Stadium, home of Sunday's Super Bowl XLI, has been hacked and seeded with exploit code targeting two known Windows security flaws. In the attack, which was discovered by malware hunters at Websense Security Labs, the server hosting the site was breached and a link to a malicious JavaScript file was inserted into the header of the front page of the site.

February 2, 2007 by Ryan Naraine


Trend Micro ships free 'rootkit buster'

Trend Micro has quietly released a rootkit scanning/cleaning utility, belatedly joining the list of anti-vendors pushing out free standalone tools to nab the stealthy computer threats.

February 2, 2007 by Ryan Naraine


Vista voice exploit - cry wolf?

Thierry Zoller, a security consultant at n.runs AG (one of the outside companies that did pen-testing on Windows Vista), argues that George Ou’s Vista speech command exploit is borderline cry-wolf.

February 1, 2007 by Ryan Naraine


Mac Developer mulling OS X equivalent of ZERT

Landon Fuller, a former engineer in Apple's BSD Technology Group, believes there's a place for immediate, third-party patches when there's a legitimate threat of code execution attacks. Now, he's mulling a plan to expand the month-of-Apple-fixes initiative.

February 1, 2007 by Ryan Naraine


U.S. government's cyber security grade: D

The Cyber Security Industry Alliance has slapped three 'D' grades on the U.S. government's ability to secure sensitive data, strengthen the resiliency of critical infrastructure and protect the integrity of federal information.

February 1, 2007 by Ryan Naraine


Port scan spike hints at BrightStor attack

Detailed exploit code for a gaping worm hole in CA's BrightStor ARCserve Backup product has been posted on the Internet, prompting a strong "patch now or else!" warnings from security researchers.

February 1, 2007 by Ryan Naraine


Month of Apple bugs hacker signs off

The controversial MOAB (Month of Apple Bugs) project crossed the finish line today with a cryptic "coming soon" note, a promise to release an exploit for a remote kernel vulnerability and a vow from one of the organizers to stop publicizing his flaw findings."My time disclosing exploits is over," said L.

January 31, 2007 by Ryan Naraine


MS Word zero-day attack video

What does a targeted Microsoft Word zero-day attack look like? A quick flicker when the .doc is opened is sometimes the only thing you'll see.

January 30, 2007 by Ryan Naraine

1 Comment