Zack Whittaker

Zack Whittaker is the security editor for ZDNet. You can securely reach him on Signal and WhatsApp at 646-755-8849, and his PGP fingerprint for email is: 4D0E 92F2 E36A EC51 DAAE 5D97 CB8C 15FA EB6C EEA5.

Charlie Osborne

Charlie Osborne is a cybersecurity journalist and photographer who writes for ZDNet and CNET from London. PGP Key: AF40821B | Research/security tips email: cingred@protonmail.com.

Jennifer Leggio

Jennifer Leggio has been in the security industry for 17 years as a marketer, advisor, and writer. Her focus is on security culture, including disclosure, community issues, equality in security, disruptive trends, and even marketing best practices. PGP Key: 3A708289 | She prefers other contact on Twitter via @mediaphyter.

Latest Posts

Project Titan: Verisign moves to strengthen DNS infrastructure

Project Titan: Verisign moves to strengthen DNS infrastructure

SAN FRANCISCO -- Just days after unknown attackers launched denial-of-service attacks against the root servers that help manage the world's Internet traffic, Verisign announced the launch of a major initiative to significantly increase its daily DNS query capacity -- from 400 billion queries a day currently to 4 trillion queries a day.

February 8, 2007 by in Networking

Dirty dozen: Windows, Office, OneCare patches on tap

Dirty dozen: Windows, Office, OneCare patches on tap

Microsoft's Patch Day bundle this month will be a whopper: 12 bulletins with fixes for a wide range of serious security vulnerabilities.Five of the 12 bulletins will cover remotely exploitable bugs in the Windows operating system while three will deal with Microsoft Office flaws.

February 8, 2007 by in Microsoft

Zero-day #5: Beware of (unexpected) Excel files

Zero-day #5: Beware of (unexpected) Excel files

Microsoft late Friday warned users to be on the lookout for Excel files that arrive unexpectedly -- even if they come from a co-worker's e-mail address.In an advisory, Microsoft confirmed a new wave of limited "zero-day" attacks was underway, using a code execution flaw in its Microsoft Office desktop productivity suite.

February 2, 2007 by in Microsoft

Super Bowl stadium site hacked, seeded with exploits

Super Bowl stadium site hacked, seeded with exploits

The official Web site of Dolphin Stadium, home of Sunday's Super Bowl XLI, has been hacked and seeded with exploit code targeting two known Windows security flaws. In the attack, which was discovered by malware hunters at Websense Security Labs, the server hosting the site was breached and a link to a malicious JavaScript file was inserted into the header of the front page of the site.

February 2, 2007 by in Enterprise Software

Vista voice exploit - cry wolf?

Vista voice exploit - cry wolf?

Thierry Zoller, a security consultant at n.runs AG (one of the outside companies that did pen-testing on Windows Vista), argues that George Ou’s Vista speech command exploit is borderline cry-wolf.

February 1, 2007 by in Windows

Newsletters

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
See All
See All

Top Stories