Adobe said a previously undisclosed vulnerability in its Reader and Acrobat applications was passed along by defense contractor Lockheed Martin, raising the specter of a targeted attack on the important military supplier.
Browsing Category: Hacks
The researchers who last week said they had succeeded in jailbreaking the RIM PlayBook tablet have now posted a detailed walkthrough of how users can accomplish the same task on their own. The technique requires the use of a custom tool, but otherwise is fairly straightforward.
The Black Hole exploit kit and the Carberp Trojan have a lovely, symbiotic relationship and they’ve recently decided to take that relationship to the next level. In the last month, there has a been a major spike in the volume of Carberp infections related to attacks from sites hosting Black Hole, mostly exploiting Java vulnerabilities.
The half life of the CarrierIQ “rootkit” scandal proved to be a little more than a week. That’s about how long it took for Trevor Eckhart, a young, Connecticut-based Android developer to begin raising questions about some stealth software he discovered running on Android phones by HTC and speculation in the media and online to run rampant about what kinds of spying said software might be engaged in. It was time enough for CarrierIQ to issue a lawyer letter threatening to sue the Eckhart and the Electronic Frontier Foundation to come to his defense and even for Congress to get involved – each of which ensured even more news cycles would be taken up with the mini-controversy. And it was time, at long last, for more information to become available about what was really going on with CarrierIQs software, and for cooler heads to prevail on both sides. The question, now, is why incidents like this provoke our anger so – and what we can do to stop them from happening again.
Security researchers at BitDefender are warning users about a new Yahoo! Messenger vulnerability that allows an attacker to change victims’ status updates.
Many of the apps that come pre-installed on a variety of Android devices from manufacturers such as HTC, Samsung, Google and others have access to more services and capabilities on the devices than they should or that users are aware they have, according to new research. These “capability leaks” can sometimes be inherited from other apps, but the researchers say that they constitute significant security weaknesses on the Android devices.
Join Dennis Fisher, Threatpost editor-in-chief, and his guests, Josh Corman, Director Security Intelligence Akamai, and Gene Kim, Founder / Former CTO Tripwire, and Author, “Visible Ops,” as they discuss the changing threat landscape and how technology plays a pivotal role in the security challenges facing businesses today.
The FBI says that more than 2.5 million systems infected with the DNSChanger malware connected to DNS servers set up by the authorities in the week following a crackdown on a global criminal network dubbed Ghost Click.
A group of researchers is claiming that they’ve found a root exploit that enables them to jailbreak the BlackBerry PlayBook tablet made by Research In Motion. In a video demonstration of the jailbreak, one of the researchers shows off the ability to change the settings on a PlayBook and says that he also has the ability to install the Android Market app on the tablet.
Java has become virtually unavoidable in the last few years, and it’s installed on hundreds of millions of PCs around the world. A huge number of those installations are vulnerable versions of Java, and this fact has not escaped the attention of attackers, who have made the technology one of their favored targets. In fact, new data from Microsoft shows that Java exploits were the most prevalent in the first six months of 2011, and that attackers often use exploits for bugs that are several months or years old.