- By Lucian Constantin
- March 6th, 2009
No Click Required to Exploit 0-day Adobe Reader Vulnerability
Just hovering the mouse pointer over a malicious PDF file will do the trick
- By Lucian Constantin
- March 2nd, 2009
Cyber-Criminals Target Their Own Kind
Vulnerabilities in crimeware kits are being exploited to steal the assets of the competition
- By Lucian Constantin
- February 25th, 2009
Adobe Releases Critical Flash Player Update
Several flaws facilitating remote code execution, clickjacking attacks and privilege escalation have been addressed
- By Lucian Constantin
- February 25th, 2009
Adobe Reader Critical Flaw Still Exploitable with JavaScript Disabled
An unofficial patch has been released by a security researcher
- By Lucian Constantin
- February 24th, 2009
Critical Flaw Found in Proxy Servers
It can facilitate unauthorized remote access to internal resources
- By Lucian Constantin
- February 20th, 2009
Adobe Reader 0-Day Critical Vulnerability Exploited in the Wild
Malicious PDF files are used to execute arbitrary code on system running fully-patched Reader and Acrobat versions
- By Lucian Constantin
- February 7th, 2009
HP Patches Several LaserJet Printers and Digital Senders
Newly released firmware updates address a vulnerability in the web administration interface
- By Lucian Constantin
- February 5th, 2009
Multiple Vulnerabilities Affecting Cisco WLAN Controllers
Three facilitate DoS attacks and one privilege escalation
- By Lucian Constantin
- January 15th, 2009
Browser Vulnerability Opens Door to New Phishing Techniques
The JavaScript engines of all major browsers are vulnerable
- By Lucian Constantin
- January 9th, 2009
Google Code Abused by Hackers
Fake projects are used to distribute malware
- By Lucian Constantin
- January 7th, 2009
Fake LinkedIn Profiles Spread Malware
Bogus accounts for numerous celebrities have been created
- By Lucian Constantin
- December 23rd, 2008
Trend Micro HouseCall Scanner Poses Security Risk
A highly critical vulnerability can result in systems being compromised
- By Lucian Constantin
- October 3rd, 2008
A Buffer Overflow Vulnerability Affects the Most Popular IRC Client
A proof of concept exploit has been released for the latest version of mIRC
- By Lucian Constantin
- October 1st, 2008
Extremely Complex Windows Rootkit Discovered
Security researchers came across one of the most sophisticated computer worms ever found
- By Lucian Constantin
- September 26th, 2008
New Threat for Critical Infrastructure Systems
A buffer overflow vulnerability has been identified in a system used to control the national electric grid
- By Lucian Constantin
- September 25th, 2008
Cisco Releases Several Important Security Advisories
All of the advisories address significant vulnerabilities in several Cisco products
- By Lucian Constantin
- September 8th, 2008
Yet Another Chrome Security Flaw
A critical buffer-overflow vulnerability has been identified in Chrome