Browsing Category: Vulnerabilities

[img_assist|nid=2797|title=|desc=|link=none|align=left|width=100|height=100]A now published hole in Windows allows users with restricted access to
escalate their privileges to system level – and this is believed to be
possible on all 32-bit versions of Windows from Windows NT 3.1 up to,
and including Windows 7. Read the full article. [The H Security]

Read more...

[img_assist|nid=2786|title=|desc=|link=none|align=right|width=100|height=100]Web site domain registrar and hosting provider Network Solutions acknowledged that hackers had broken into its servers and defaced hundreds of customer Web sites. The hackers appear to have replaced each site’s home page with anti-Israeli sentiments and pictures of masked militants and armed with rocket launchers and rifles, along with the message “HaCKed by CWkomando.” Read the full article. [KrebsonSecurity]

Read more...

Categories: Vulnerabilities

[img_assist|nid=2783|title=|desc=|link=none|align=left|width=100|height=100]Apple’s first Mac OS X security update for 2010 is out, providing cover for at least 12 serious vulnerabilities.The update, rated critical, plugs security holes that could lead to code execution vulnerabilities if a Mac user is tricked into opening audio files or surfing to a rigged Web site.

Read more...

[img_assist|nid=2774|title=|desc=|link=none|align=right|width=100|height=100]According to a statement by D-Link, firmware updates for its DIR-635
(HW-Revision B), DIR-655 (HW-Revision A1-A4) and DIR-855 (HW-Revision
A2) router models are now available to download at to close the
recently discovered hole in the Home Network Administration Protocol
(HNAP) of these devices. Read the full article. [The H Security]

Read more...

[img_assist|nid=2760|title=|desc=|link=none|align=right|width=100|height=100]Four people from North Texas indicted last week by a federal grand jury in Dallas were arrested Friday morning in Cancun, Mexico, according to the FBI. Michael Faulkner, 36, and his wife, Chastity Faulkner, 34, both of Southlake, were central figures in the 19-person indictment brought by U.S. Attorney James Jacks. Read the full article. [Dallas Morning News]

Read more...

[img_assist|nid=2757|title=|desc=|link=none|align=right|width=100|height=100]The developers behind the OAuth protocol have developed a new variant called OAuth WRAP that is simpler and easier to implement. It’s a stop-gap solution that will enable broader OAuth adoption while
OAuth 2.0, the next generation of the specification, is devised by a
working group that is collaborating through the Internet Engineering
Task Force (IETF). Read the full article. [Ars Technica]

Read more...

[img_assist|nid=2730|title=|desc=|link=none|align=right|width=100|height=100]Booby-trapped PDF files, posing as messages from the US Department
of Defense, were emailed to US defence contractors last week. The
document refers to a real conference due to be held in Las Vegas in
March. Read the full article. [The Register]

Read more...