60 articles written

Ryan Naraine

Popular

‘Blue Pill’ Prototype Creates 100% Undetectable Malware

A security researcher with expertise in rootkits has created...

Month of Apple Bugs, Meet Month of Patches

It's officially a cat-and-mouse race to exploit—and fix—security vulnerabilities...

Microsoft Security Pricing: Predatory or Correctional?

Allegations of "predatory pricing" are beginning to swirl around...

Can Apple Overcome Latest Security Backlash?

A pair of renegade hackers has launched a project...

Explore

“Hacker Safe” Site Hacked, Data Stolen

Geeks.com, a Web site that displays ScanAlert's Hacker Safe logo, has been hacked and sensitive customer information may have...

Microsoft Word Zero-Day Attack Discovered

Microsoft's security response team has launched an investigation into reports of a zero-day attack against a previously unknown vulnerability...

VeriSign Offers Hackers $8,000 Bounty on Vista, IE 7 Flaws

VeriSign's iDefense Labs has placed an $8,000 bounty on remote code execution holes in Windows Vista and Internet Explorer...

Can Apple Overcome Latest Security Backlash?

A pair of renegade hackers has launched a project aimed at embarrassing Apple Computer into fixing software vulnerabilities in...

Month of Apple Bugs, Meet Month of Patches

It's officially a cat-and-mouse race to exploit—and fix—security vulnerabilities affecting Apple Computer's Mac operating system. Less than 24 hours after...

Five Hackers Who Left a Mark on 2006

In the security year that was 2006, zero-day attacks and exploits dominated the headlines. However, the year will be best...

Security in 2007: Zero-Day World Puts Bull’s-Eye on Vista

Who will find the first major security flaw in Windows Vista? Will it be released as zero-day? Is there...

Phishers Attack MySpace with QuickTime Exploit Worm

Identity thieves are manipulating a feature in Apple Computer's embedded QuickTime player to launch phishing attacks on the popular...

Other Articles