Browsing Category: Vulnerabilities

[img_assist|nid=3990|title=|desc=|link=none|align=right|width=100|height=100]Latest spam report from Messaging Anti-Abuse Working Group (MAAWG) now includes data from European users. More than half (57%) of survey adults
have responded to spam in such a way that it supports the perpetrators
of the spam. This includes opening attachments to an email, forwarding
an email or clicking on links. Read the full article. [The H Security]

Read more...

[img_assist|nid=3992|title=|desc=|link=none|align=left|width=100|height=100]A new invention developed by Dr. Jacob Scheuer of Tel Aviv University’s
School of Electrical Engineering promises an information security
system that can beat today’s hackers — and the hackers of the future —
with existing fiber optic and computer technology. Transmitting binary
lock-and-key information in the form of light pulses, his device ensures
that a shared key code can be unlocked by the sender and receiver, and
absolutely nobody else. Read the full article. [ScienceDaily]

Read more...

Categories: Vulnerabilities

Charlie Miller won his third consecutive Pwn2Own contest at the CanSecWest conference in Vancouver this week. In this video he talks about the contest, the state of Apple security and the bug-finding and reporting process.

Read more...

[img_assist|nid=3979|title=|desc=|link=none|align=right|width=100|height=100]On Thursday, investigators in France arrested an unemployed 25-year old man who appears to have been responsible for the spectacular attacks on Twitter accounts that included those of US President Barack Obama and pop singer Britney Spears. Read the full article. [The H Security]

Read more...

Categories: Malware, Vulnerabilities

[img_assist|nid=3980|title=|desc=|link=none|align=left|width=94|height=144]VANCOUVER, BC — Jumping through a series of anti-exploit roadblocks, Dutch hacker Peter Vreugdenhil pulled off an impressive CanSecWest Pwn2Own victory here, hacking into a fully patched 64-bit Windows 7 machine using a pair of Internet Explorer vulnerabilities.

Read more...

Categories: Malware, Vulnerabilities

[img_assist|nid=3981|title=|desc=|link=none|align=right|width=100|height=100]VANCOUVER, BC — The first day of the CanSecWest Pwn2Own hacker
challenge wrapped up here today with a familiar face going after a
familiar target.
And, for the second year in a row, a German hacker known simply as
“Nils” exploited a previously unknown vulnerability in Mozilla Firefox
to take complete control of a 64-bit Windows 7 machine.

Read more...

Categories: Malware, Vulnerabilities

[img_assist|nid=3982|title=|desc=|link=none|align=left|width=100|height=100]VANCOUVER, BC — For the third year in a row, Charlie Miller has
hacked into a MacBook by exploiting a critical Safari browser
vulnerability. At the CanSecWest Pwn2Own hacker contest here, Miller performed a clean drive-by download against Safari to get a full command shell on the MacBook. 

Read more...

[img_assist|nid=3959|title=|desc=|link=none|align=left|width=100|height=100]Google has added a nifty new security feature to warn GMail users when there are suspicious log-ins to their e-mail accounts.The feature, now being rolled into Firefox and Internet Explorer, will flag GMail log-ins from multiple locations and flash the following warning to an affected user:

Read more...

[img_assist|nid=3904|title=|desc=|link=none|align=left|width=120|height=68]A computer security professional who sold Internet Explorer exploit
code to credit card hacker Albert Gonzalez was sentenced Tuesday to three years probation and a $10,000 fine. Jeremy Jethro, 29, was paid $60,000 by Gonzalez for a zero-day
exploit against Microsoft’s browser, “the purpose and function of which
was to … enable the conspirators to unlawfully gain access to, and
redirect, individual’s computers,” according to court records. Read the full article, [Wired]

Read more...