What could Cisco and Apple be up to on the security front? The two sides are not elaborating but that’s not going to stop the speculation in security circles.
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Violet Blue is the author of The Smart Girl's Guide to Privacy. She contributes to ZDNet, CNET, CBS News, and SF Appeal.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years
Some of the biggest names in the anti-virus business -- Symantec, McAfee and CA eTrust, -- are missing from the list of vendors shipping products with the "Certified for Windows Vista" logo or the "Works with Windows Vista" logo.
It looks like Michal Zalewski is turning February into the MOFFB (month of Firefox bugs).
More than four years after Slammer started exploiting holes in Microsoft's SQL Server and Desktop Engine database products, the worm continues to squirm in machines that serve as eternal carriers for the worm.
Google has released a patch for a major security vulnerability in its powerful desktop search application.
Microsoft's implementation of the UAC (user account control) mechanism in Windows Vista continues to take a beating from security researchers.
A stack-based buffer overflow in the Snort IDS (intrusion detection system) could leave government and enterprise installations vulnerable to remote unauthenticated code execution attacks.
Mozilla's Firefox browser suffers from a design flaw that puts casual surfers at risk of phishing attacks; Microsoft applies for a patent covering the discovery and notification of browser-based phishing attempts.
The anti-phishing community at CastleCops.com has been knocked out by a massive DDoS (distributed denial-of-service attack).
A critical code execution hole is found in µTorrent, everyone's favorite torrent client. Dirty .torrent files could be used to in PC-takeover attacks.