Narrow your search
Veracode researcher demonstrates spyware that allows someone to steal a stranger's contact list, read text messages in real time, and track the location of the phone.
Users should not use their browser until a patch for a security hole is made available, a security researcher says.
Patches address vulnerabilities in the Cisco Voice Portal and Secure Shell server (SSH) implementations.
Printed voting audits may help to detect fraud--unless the vendor offers a good excuse.
A researcher at ShmooCon demonstrates how browser hot keys can expose the internal network running behind a Citrix presentation server.
Under fire for New Jersey vote discrepancies and legal threats against electronic voting systems researchers, the Sequoia Voting Systems blot site went dark Thursday.
E-voting is not secure now and will never be in the foreseeable future, says guest blogger and security specialist Rebecca Mercuri.
Two researchers demonstrate how unprotected, public VoIP phones could expose the internal network of a company or organization.
Researchers show how objects with multimedia attributes within Second Life can unleash malware on unsuspecting users.
Researcher who found vulnerabilities in California's e-voting systems looks ahead to better auditing.