The health insurance company said that millions of people who weren't enrolled in its services were affected by a hack earlier this year.
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years. He was most recently Editorial Director of BYTE, Dark Reading and Network Computing at UBM Tech. Prior to that he spent over a decade consulting and writing on technology subjects, primarily in the area of security. He is the author of three books and thousands of published articles and many more unpublished, private reports. Larry has been Technical Director at several test laboratories where he both directed and ran product testing, with a special interest in test automation. Larry began his career as a Software Engineer at the now-defunct Desktop Software Corporation in Princeton, NJ, on the team that wrote the NPL 4GL query language. He also worked on corporate IT and software development at Chase Econometrics. Larry is a graduate of the University of Pennsylvania with a degree in Public Policy.
Ms. Violet Blue (tinynibbles.com, @violetblue) is a freelance investigative reporter on hacking and cybercrime at Zero Day/ZDNet, CNET and CBS News, as well as a noted sex columnist. She has made regular appearances on CNN and The Oprah Winfrey Show and is regularly interviewed, quoted, and featured in a variety of publications that includes ABC News and the Wall Street Journal. She has authored and edited award-winning, best selling books in eight translations and has been a sex columnist for the San Francisco Chronicle. She has given keynote talks at such conferences as ETech, LeWeb, and the Forbes Brand Leadership Conference, and has given two Tech Talks at Google. In 2010, the London Times named Blue one of “40 bloggers who really count.” Ms. Blue is the author of The Smart Girl's Guide to Privacy. Violet Blue bio courtesy of TTI Vanguard.
A Wednesday press conference will aim to quell fears that the UK and US intelligence agencies have unfettered access to our mobile devices and phone calls.
FireEye's Mandiant M-Trends report says impersonation and social engineering are now key tactics used by cybercriminals targeting corporations.
Lenovo is still smarting from the Superfish media storm, but CTO Peter Hortensius says the firm is working to fix its battered reputation.
The former NSA contractor turned whistleblower said during a Reddit question-and-answer session that the leaks have also improved security and encryption in Silicon Valley.
Superfish isn't just adware -- it can also be a nightmare for those who value their privacy.
Zero Day Weekly: Lenovo's poison Superfish, Netgear vuln, SIM card spying, Obama's encryption follies
A collection of notable security news items for the week ending February 20, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
Google's new Cloud Security Scanner allows users to easily scan applications for two common vulnerabilities: cross-site scripting, and mixed content.
Terrorist groups such as ISIS and Al Qaeda have something in common -- they are using encryption tools which are not worthy of the name.
A bill aimed at reforming a 30-year-old law, which allows the government warrantless access to old emails, has considerable bipartisan support.
HackerOne CPO and former Microsoft security expert Katie Moussouris says bug bounties are valuable to product development -- but there are certain steps necessary for success.
Would you be comfortable with a chip in your hand replacing your smartphone and credit card? This is the future, according to a biohacking specialist.
Security experts say The Equation Group surpasses every other threat actor known in complexity and sophistication.
Carbanak malware offered criminals the chance to steal up to $10 million per heist.
The Apple boss said people have entrusted the company with their most personal bits of information. "We owe them nothing less than the best protections we can possibly provide."
The best of ZDNet, delivered
- 1 The top ten most common database security vulnerabilities
- 2 Symantec releases simplified Norton Security line
- 3 Yes, the FBI and CIA can read your email. Here's how
- 4 Google.com now 'censors' explicit content from image searches
- 5 FireEye, Fox-IT launch free service to combat Cryptolocker ransomware