Browsing Category: Vulnerabilities

[img_assist|nid=2497|title=|desc=|link=none|align=left|width=100|height=100]The micro-blogging service rejects 370 passwords when new users sign up if
it thinks they are too easy to guess. However, bloggers recently discovered
that the list of banned passwords is embedded in the source code of the page
itself. Read the full article. [Telegraph UK]

Read more...

Categories: Vulnerabilities

[img_assist|nid=2498|title=|desc=|link=none|align=left|width=100|height=100]There is a new, targeted attack that is going after the Adobe Reader and Acrobat zero-day vulnerability that was disclosed last month. The attack uses a sophisticated JavaScript-based exploit that includes shell code that is just 38 bytes long.

Read more...

[img_assist|nid=2461|title=|desc=|link=none|align=right|width=88|height=100]Notorious hacker Albert Gonzalez pleaded guilty Dec. 29 to conspiracy to hack into the computer networks of Heartland Payment Systems, 7-11 and Hannaford Brothers and faces sentencing between 17 and 25 years on top of his previous guilty plea for the TJX breach and others. Read the full article. [eWEEK]

Read more...

[img_assist|nid=2439|title=|desc=|link=none|align=left|width=100|height=100]At the 26th Chaos Communication Congress in Berlin, security researcher Fabian Yamaguchi demonstrated a number
of vulnerabilities that can apparently be found in many average
communication networks and affect all levels from the access layer to
the application layer. Read the full article. [The H Security]

Read more...