[Correction: ] One of the October Internet Explorer vulnerabilities wasn't patched until November
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Violet Blue is an outspoken and controversial author and journalist; she contributes to ZDNet, CNET, CBS News and SF Appeal.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years
The U.S. government's rules governing its ability to shut down cellular and wireless networks to prevent remote bomb detonation must be disclosed, a court has ruled.
The new dedicated cybercrime center will be used to fight online malware spreading, intellectual property theft, and other online criminal activity, the software giant said.
After day 1 saw the compromise of iOS 6 and 7 through Safari and the Samsung Galaxy S4 through Samsung apps, Google Chrome on the Nexus 4 and Samsung Galaxy S4 was fully-compromised. The competition is now over. [UPDATE: The bugs are fixed.]
The company announced Tuesday that they would be ending support for the SHA-1 protocol in certificates, deprioritizing the RC4 cipher and turning TLS 1.2 on by default in IE11.
Google Docs has been used to distribute malware in the past. Now it is increasingly being used as a lure for phishing.
At PacSec Tokyo 2013, hacking teams from Japan and China compromised iPhone 5 running iOS 6 and iOS 7 and a Samsung Galaxy S4.
In London, banks have participated in a series of war games to test their defenses against cyberattacks.
.. a GTA app that I thought was free.
Critical vulnerabilities in Flash on Windows, Mac and Linux expose users to attack.