Security researchers are seeing signs of gang warfare among pump-and-dump spam scammers.
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Violet Blue is the author of The Smart Girl's Guide to Privacy. She contributes to ZDNet, CNET, CBS News, and SF Appeal.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years
Microsoft late Friday warned users to be on the lookout for Excel files that arrive unexpectedly -- even if they come from a co-worker's e-mail address.In an advisory, Microsoft confirmed a new wave of limited "zero-day" attacks was underway, using a code execution flaw in its Microsoft Office desktop productivity suite.
Trend Micro has quietly released a rootkit scanning/cleaning utility, belatedly joining the list of anti-vendors pushing out free standalone tools to nab the stealthy computer threats.
Thierry Zoller, a security consultant at n.runs AG (one of the outside companies that did pen-testing on Windows Vista), argues that George Ou’s Vista speech command exploit is borderline cry-wolf.
Landon Fuller, a former engineer in Apple's BSD Technology Group, believes there's a place for immediate, third-party patches when there's a legitimate threat of code execution attacks. Now, he's mulling a plan to expand the month-of-Apple-fixes initiative.
The Cyber Security Industry Alliance has slapped three 'D' grades on the U.S. government's ability to secure sensitive data, strengthen the resiliency of critical infrastructure and protect the integrity of federal information.
Detailed exploit code for a gaping worm hole in CA's BrightStor ARCserve Backup product has been posted on the Internet, prompting a strong "patch now or else!" warnings from security researchers.
The controversial MOAB (Month of Apple Bugs) project crossed the finish line today with a cryptic "coming soon" note, a promise to release an exploit for a remote kernel vulnerability and a vow from one of the organizers to stop publicizing his flaw findings."My time disclosing exploits is over," said L.
What does a targeted Microsoft Word zero-day attack look like? A quick flicker when the .doc is opened is sometimes the only thing you'll see.