Microsoft's Patch Tuesday train arrived today with six bulletins covering at least 11 vulnerabilities, most carrying the company's highest severity rating.
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Violet Blue is the author of The Smart Girl's Guide to Privacy. She contributes to ZDNet, CNET, CBS News, and SF Appeal.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years
Hackers attending next month's Hack in the Box conference in Kuala Lumpur are pitching in to raise funds for the Malaysian National Cancer Council.
Experts agree that Windows machines with both Internet Explorer and Firefox installed are vulnerable to a serious security vulnerability but there's all kinds of confusion over which browser is hosting the vulnerability.
The following configuration changes, recommended by CERT/CC, can disable various features and set up Firefox to run in a secure state, limiting the damage from malware attacks.
Google has announced its second acquisition in the computer security space, shelling out a whopping $625 million in cash to snap up enterprise e-mail security vendor Postini.
Guest Editorial: The story of modern computer security can never be told -- it's the story of the unknown. Right now, most people treat vulnerabilities as a constant stream of one-offs. In many real ways, the entire CVE database is the tip of an iceberg.
There's a new player in the exploding market for zero-day vulnerabilities -- an eBay-like auction site offering a place to buy and sell flaw research information.
Microsoft plans to ship six bulletins with patches for multiple code execution vulnerabilities affecting Office, Excel, Windows and the .NET Framework.
Some day, hypervisor malware will be mooted when every mainstream platform runs virtualized by default, with secured, well-tested hypervisors that prevent hyperjacking from ever taking place. Microsoft should help make that day come sooner rather than later.
As a malware researcher, I spend the majority of my days days studying the dark side of the web and one of the most interesting things I get to see are the weird, and sometimes wonderful, search engine queries that result in dangerous Web sites.