Security researchers working for the CIA have been poking holes in Apple security as part of a multi-year campaign.
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years. He was most recently Editorial Director of BYTE, Dark Reading and Network Computing at UBM Tech. Prior to that he spent over a decade consulting and writing on technology subjects, primarily in the area of security. He is the author of three books and thousands of published articles and many more unpublished, private reports. Larry has been Technical Director at several test laboratories where he both directed and ran product testing, with a special interest in test automation. Larry began his career as a Software Engineer at the now-defunct Desktop Software Corporation in Princeton, NJ, on the team that wrote the NPL 4GL query language. He also worked on corporate IT and software development at Chase Econometrics. Larry is a graduate of the University of Pennsylvania with a degree in Public Policy.
Ms. Violet Blue (tinynibbles.com, @violetblue) is a freelance investigative reporter on hacking and cybercrime at Zero Day/ZDNet, CNET and CBS News, as well as a noted sex columnist. She has made regular appearances on CNN and The Oprah Winfrey Show and is regularly interviewed, quoted, and featured in a variety of publications that includes ABC News and the Wall Street Journal. She has authored and edited award-winning, best selling books in eight translations and has been a sex columnist for the San Francisco Chronicle. She has given keynote talks at such conferences as ETech, LeWeb, and the Forbes Brand Leadership Conference, and has given two Tech Talks at Google. In 2010, the London Times named Blue one of “40 bloggers who really count.” Ms. Blue is the author of The Smart Girl's Guide to Privacy. Violet Blue bio courtesy of TTI Vanguard.
Apple has patched a security vulnerability in iPhones and iPads, which the company warned could allow an attacker to intercept encrypted connections.
Security researchers have identified a security flaw in the Google Admin console which allows attackers to claim domains and send out spoof emails.
The agency says restructuring will bring it to the digital forefront -- and digital intelligence gathering is now critical.
Sensitive data held by the university has been compromised -- including the Social Security numbers of students and employees.
A collection of notable security news items for the week ending March 6, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
Arrested 10 months ago by Australian Federal Police, Anonymous radio host LoraxLive (Adam Bennett) faces a prosecution struggling to pin charges on him.
After admitting to a security breach, the luxury hotel chain has managed to remove malware discovered on systems related to customer financial data.
Tech companies aren't allowed to tell you when the government wants your data. Enter the warrant canary.
Adobe, maker of software including Flash and Adobe reader, is catching up to the times and has launched a vulnerability disclosure program -- but something may be missing.
China wants the encryption keys from U.S. technology companies as part of a counter-terrorism law. The draft law leaves U.S. tech giants with two options: Play ball or get out.
While Silent Circle's encrypted devices and services look tempting, there are now free end-to-end encryption services available.
AdaptiveMobile has uncovered a new mobile malware campaign which uses phone contacts to spread.
UPDATED: The search giant will let phone makers decide whether or not to enable encryption-by-default because of performance issues on older devices.
The Cryptocat developer's new team aims to get easy file and message encryption into everyone's hands, which could give Gmail and Dropbox (and the NSA) a run for their money.
The best of ZDNet, delivered
- 1 The top ten most common database security vulnerabilities
- 2 Symantec releases simplified Norton Security line
- 3 Yes, the FBI and CIA can read your email. Here's how
- 4 Google.com now 'censors' explicit content from image searches
- 5 FireEye, Fox-IT launch free service to combat Cryptolocker ransomware