Browsing Category: Malware

[img_assist|nid=2126|title=|desc=|link=none|align=left|width=100|height=100]A security researcher has released a proof-of-concept attack that
exploits critical vulnerabilities that Apple patched on Thursday; The
vulns stem from bugs in the Java runtime environment that allow
attackers to remotely execute malicious code. Read the full article. [The Register]

Read more...

Categories: Malware

[img_assist|nid=2122|title=|desc=|link=none|align=right|width=100|height=100]A Swiss iPhone developer has released a new application that is capable of harvesting huge amounts of personal data from iPhones, including geolocation data, passwords, address book entries and email account information, all using just the public API.

Read more...

[img_assist|nid=2121|title=|desc=|link=none|align=left|width=100|height=100]An attacker with access to the target computer simply boots from a USB
flash drive and replaces the BitLocker bootloader with a substitute
bootloader which mimics the BitLocker PIN query process but saves the
PINs entered by the user to disk in unencrypted form. Read the full article. [The H Security]

Read more...

[img_assist|nid=2109|title=|desc=|link=none|align=right|width=100|height=100]Dennis Fisher talks with security researcher Robert “Rsnake” Hansen about his recent work on DNS rebinding attacks, the poor state of browser security and his new book “Detecting Malice.”

Read more...

Categories: Malware, Vulnerabilities

[img_assist|nid=2101|title=|desc=|link=none|align=right|width=100|height=100]Just two weeks after the release of exploit code
for a critical (remotely exploitable) security hole in its Internet
Explorer browser, Microsoft says a fix will be included in this month’s
batch of Patch Tuesday updates.

Read more...

[img_assist|nid=2105|title=|desc=|link=none|align=right|width=100|height=100]Although the combined number of reported data breaches in the
government and the military has dropped in 2009 compared to last year,
many more records were compromised in those breaches, according to
recent figures compiled by the Identity Theft Resource Center. Read the full article. [Government Technology]

Read more...