Friday, March 14th, 2014
Security researchers demonstrated zero-day exploits against Google Chrome, Microsoft Internet Explorer, Apple Safari, Mozilla Firefox and Adobe Flash Player during the second day of the Pwn2Own hacking competition Thursday, racking up total prizes of US$450,000.
A team from French vulnerability research firm Vupen hacked Google Chrome by exploiting a use-after-free vulnerability ...
Posted in Internet, Privacy, Security, Software, Windows | No Comments
Wednesday, March 5th, 2014
A source code mistake in the GnuTLS library an open-source software building block used in a large number of different Linux distributions to handle secure Internet connections could prove a serious threat to the privacy of Linux users, as developers rush to patch the vulnerability.
Nikos Mavrogiannopolous, the developer of GnuTLS, ...
Posted in Internet, Linux, Privacy, Security | No Comments
Saturday, February 22nd, 2014
A major flaw in Apple Inc software for mobile devices could allow hackers to intercept email and other communications that are meant to be encrypted, the company said on Friday, and experts said Mac computers were even more exposed.
If attackers have access to a mobile user's network, such as by ...
Posted in Internet, Mobile, Privacy, Security | No Comments
Friday, February 21st, 2014
Tripwire has analyzed the security provided by the most popular wireless routers used in many small and home offices and found that 80 percent of Amazon’s top 25 best-selling SOHO wireless router models have security vulnerabilities.
Of these vulnerable models, 34 percent have publicly documented exploits that make it relatively simple ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments
Thursday, February 20th, 2014
Microsoft published 147 vulnerabilities in 2013 that were rated as Critical. Critical, however, is a relative term, and there is one simple thing anyone can do that would guard against almost every single Critical vulnerability according to a new report from Avecto.
In its 2013 Microsoft Vulnerabilities Study, Avecto found that you could ...
Posted in Internet, Privacy, Security, Windows | No Comments