Adobe released security updates for Reader, Acrobat and Flash Player. The Reader and Acrobat patches address a zero-day vulnerability being exploited in limited targeted attacks.
Browsing Category: Vulnerabilities
There’s a remotely exploitable authentication bypass vulnerability in the BlackBerry Z10 phone that affects the service that lets users share files with machines on a wireless network. The bug could allow an attacker to steal users’ personal data or hit them with targeted malware.
Vulnerabilities in the secure Blackphone reported during DEF CON require unusual circumstances to exploit.
Absolute Software’s anti-theft Computrace software is mysteriously installed on brand new machines, nearly impossible to remove, and exploitable.
Embedded device security emerged as front page news during the recently wrapped up Black Hat and DEF CON events.
Microsoft announced that it will block older ActiveX controls in Internet Explorer, starting with Java.
LAS VEGAS – It’s widely known that embedded medical devices are hackable in dangerous ways, but the true risks to medical device are less well known.
Cambridge University researcher Ross Anderson urged experts to take heed of weaknesses in chip-and-PIN payment cards as the inevitable switchover looms in the U.S.
LAS VEGAS–Yahoo plans to enable end-to-end encryption for all of its Mail users next year. The company is working with Google on the project and the encryption will be mostly transparent for users, making it as simple as possible to use. Alex Stamos, CISO at Yahoo, said that the project has been a priority since[...]
Dennis Fisher talks with Wendy Nather of 451 Research about the happenings on day one of Black Hat, the possibility of the US government disrupting the vulnerability market and software liability. Download: Wendy-Nather-on-the-Black-Hat-Buzz.mp3