Monday, March 24th, 2014
Attackers are exploiting a newly discovered vulnerability in Microsoft Word that makes it possible to remotely seize control of computers, the company warned.
The in-the-wild attacks work by creating booby-trapped documents in the Rich Text Format (RTF) that exploit a vulnerability in the 2010 version of Microsoft Word, Microsoft warned in ...
Posted in Internet, Security, Windows | No Comments
Sunday, March 23rd, 2014
With every website you visit, you’re vulnerable to malicious hackers out to steal your surfing history, passwords, email access, bank account numbers, medical info, and more. And the “big browsers” don’t do enough to stop it.
But now you can protect yourself before you go on the Web – with WhiteHat ...
Posted in Internet, Privacy, Security, Software, Windows | No Comments
Friday, March 14th, 2014
Security researchers demonstrated zero-day exploits against Google Chrome, Microsoft Internet Explorer, Apple Safari, Mozilla Firefox and Adobe Flash Player during the second day of the Pwn2Own hacking competition Thursday, racking up total prizes of US$450,000.
A team from French vulnerability research firm Vupen hacked Google Chrome by exploiting a use-after-free vulnerability ...
Posted in Internet, Privacy, Security, Software, Windows | No Comments
Thursday, February 20th, 2014
Microsoft published 147 vulnerabilities in 2013 that were rated as Critical. Critical, however, is a relative term, and there is one simple thing anyone can do that would guard against almost every single Critical vulnerability according to a new report from Avecto.
In its 2013 Microsoft Vulnerabilities Study, Avecto found that you could ...
Posted in Internet, Privacy, Security, Windows | No Comments
Thursday, February 20th, 2014
Adobe has released security updates to address a vulnerability in Adobe Flash Player 12.0.0.44 or earlier versions for Windows and Macintosh and Adobe Flash Player 11.2.202.336 or earlier versions for Linux. Exploitation of this vulnerability could allow an attacker to take control of an affected system.
US-CERT recommends that users and administrators review ...
Posted in Internet, Linux, Security, Software, Windows | No Comments