Advisories  

  •  
  • By Lucian Constantin
  • March 6th, 2009
No Click Required to Exploit 0-day Adobe Reader Vulnerability

No Click Required to Exploit 0-day Adobe Reader Vulnerability

Just hovering the mouse pointer over a malicious PDF file will do the trick

  •  
  • By Lucian Constantin
  • March 2nd, 2009
Cyber-Criminals Target Their Own Kind

Cyber-Criminals Target Their Own Kind

Vulnerabilities in crimeware kits are being exploited to steal the assets of the competition

  •  
  • By Lucian Constantin
  • February 25th, 2009
Adobe Releases Critical Flash Player Update

Adobe Releases Critical Flash Player Update

Several flaws facilitating remote code execution, clickjacking attacks and privilege escalation have been addressed

  •  
  • By Lucian Constantin
  • February 25th, 2009
Adobe Reader Critical Flaw Still Exploitable with JavaScript Disabled

Adobe Reader Critical Flaw Still Exploitable with JavaScript Disabled

An unofficial patch has been released by a security researcher

  •  
  • By Lucian Constantin
  • February 24th, 2009
Critical Flaw Found in Proxy Servers

Critical Flaw Found in Proxy Servers

It can facilitate unauthorized remote access to internal resources

  •  
  • By Lucian Constantin
  • February 20th, 2009
Adobe Reader 0-Day Critical Vulnerability Exploited in the Wild

Adobe Reader 0-Day Critical Vulnerability Exploited in the Wild

Malicious PDF files are used to execute arbitrary code on system running fully-patched Reader and Acrobat versions

  •  
  • By Lucian Constantin
  • February 7th, 2009
HP Patches Several LaserJet Printers and Digital Senders

HP Patches Several LaserJet Printers and Digital Senders

Newly released firmware updates address a vulnerability in the web administration interface

  •  
  • By Lucian Constantin
  • February 5th, 2009
Multiple Vulnerabilities Affecting Cisco WLAN Controllers

Multiple Vulnerabilities Affecting Cisco WLAN Controllers

Three facilitate DoS attacks and one privilege escalation

  •  
  • By Lucian Constantin
  • January 15th, 2009
Browser Vulnerability Opens Door to New Phishing Techniques

Browser Vulnerability Opens Door to New Phishing Techniques

The JavaScript engines of all major browsers are vulnerable

  •  
  • By Lucian Constantin
  • January 9th, 2009
Google Code Abused by Hackers

Google Code Abused by Hackers

Fake projects are used to distribute malware

  •  
  • By Lucian Constantin
  • January 7th, 2009
Fake LinkedIn Profiles Spread Malware

Fake LinkedIn Profiles Spread Malware

Bogus accounts for numerous celebrities have been created

  •  
  • By Lucian Constantin
  • December 23rd, 2008
Trend Micro HouseCall Scanner Poses Security Risk

Trend Micro HouseCall Scanner Poses Security Risk

A highly critical vulnerability can result in systems being compromised

  •  
  • By Lucian Constantin
  • October 3rd, 2008
A Buffer Overflow Vulnerability Affects the Most Popular IRC Client

A Buffer Overflow Vulnerability Affects the Most Popular IRC Client

A proof of concept exploit has been released for the latest version of mIRC

  •  
  • By Lucian Constantin
  • October 1st, 2008
Extremely Complex Windows Rootkit Discovered

Extremely Complex Windows Rootkit Discovered

Security researchers came across one of the most sophisticated computer worms ever found

  •  
  • By Lucian Constantin
  • September 26th, 2008
New Threat for Critical Infrastructure Systems

New Threat for Critical Infrastructure Systems

A buffer overflow vulnerability has been identified in a system used to control the national electric grid

  •  
  • By Lucian Constantin
  • September 25th, 2008
Cisco Releases Several Important Security Advisories

Cisco Releases Several Important Security Advisories

All of the advisories address significant vulnerabilities in several Cisco products

  •  
  • By Lucian Constantin
  • September 8th, 2008
Yet Another Chrome Security Flaw

Yet Another Chrome Security Flaw

A critical buffer-overflow vulnerability has been identified in Chrome

 
Want more? Browse: