The Early Random Pseudo-Random Number Generator in Apple iOS 7 returns predictable outcomes threatening kernel exploit mitigations native to the mobile operating system.
The term metadata and the implications of its collection and analysis have been one of the key points in the debate surrounding the NSA’s broad surveillance programs over the last year. Legislators, policy makers and others continue to argue about whether metadata can actually reveal anything about the people behind the phone numbers, but researchers[...]
The Pwn4Fun prelude to the Pwn2Own contest paid out more than $80,000 to the Red Cross of Canada, but critics wondered how long HP and Google sat on the zero-day vulnerabilities used in the contest.
Exploit broker Vupen won four cash prizes for zero-day exploits of Internet Explorer 11, Firefox, Adobe Reader and Flash at the Pwn2Own contest.
More than 162,000 “popular and clean” WordPress sites were recently used in a large-scale distributed denial of service attack (DDoS) that exploited the content management system’s pingback feature.