HP’s Zero Day Initiative Announces Pwn2Own 2014

HP’s Zero Day Initiative Announces Pwn2Own 2014

A new challenge targeting Microsoft's EMET has been introduced this year

GitHub Launches Bug Bounty Program with Rewards of up to $5,000 / €3,700

GitHub Launches Bug Bounty Program with Rewards of up to $5,000 / €3,700

Check out the most important things you need to know about the bug bounty

Tor-Based Malware ChewBacca Used to Steal Card Data from POS Systems

Tor-Based Malware ChewBacca Used to Steal Card Data from POS Systems

Dozens of retailers from the US and other countries have been targeted

Experts Find 28 Security Issues in Oracle’s Java Cloud Service

Experts Find 28 Security Issues in Oracle’s Java Cloud Service

Researchers from Security Explorations have analyzed the platform

Scam Site Displays “You Don’t Belong Here” Message to Throw Off Suspicion

Scam Site Displays “You Don’t Belong Here” Message to Throw Off Suspicion

Blue Coat experts have come across the shady website

SpyEye Creator Wasn’t Too Good at Hiding His Tracks, Experts Say

SpyEye Creator Wasn’t Too Good at Hiding His Tracks, Experts Say

He used weak passwords such as “loveme,” “kissme” and “Danny000″

Bitdefender and the Romanian Police Analyze Servers Used by Police Ransomware

Bitdefender and the Romanian Police Analyze Servers Used by Police Ransomware

267,000 computers infected over a period of five months

Patnote Virus Used to Distribute ZeuS Trojan

Patnote Virus Used to Distribute ZeuS Trojan

Researchers from Trend Micro have analyzed the campaign

Java Bot Can Launch DDOS Attacks from Windows, Mac and Linux Machines

Java Bot Can Launch DDOS Attacks from Windows, Mac and Linux Machines

Kaspersky researchers have analyzed the cross-platform malware

Foursquare Flaw Could Have Been Exploited to Obtain Users’ Email Addresses

Foursquare Flaw Could Have Been Exploited to Obtain Users’ Email Addresses

The issue was addressed by the social media company shortly after being reported

Researchers Discover First Android Bootkit, 350,000 Devices Already Infected

Researchers Discover First Android Bootkit, 350,000 Devices Already Infected

Rogue firmware is believed to be used to distribute the threat

NetSky Worm Spreads via Email Attachments

NetSky Worm Spreads via Email Attachments

Different messages containing the threat are sent over and over to the same address

Israeli Government Organization Targeted by Palestinian Hacktivists

Israeli Government Organization Targeted by Palestinian Hacktivists

Seculert has been investigating an attack against Israel

Bug That Can Be Exploited to Open Websites in Thunderbird Tabs Remains Unfixed

Bug That Can Be Exploited to Open Websites in Thunderbird Tabs Remains Unfixed

The issue was reported to Mozilla by an expert in November 2011

Researcher Warns of Account Hijacking Flaws in “Connect with Facebook” Feature

Researcher Warns of Account Hijacking Flaws in “Connect with Facebook” Feature

The vulnerabilities will not be fixed any time soon

Mozilla Fixes Thunderbird Flaw That Allowed Hackers to Insert Malicious Code into Emails

Mozilla Fixes Thunderbird Flaw That Allowed Hackers to Insert Malicious Code into Emails

The issue was reported to Mozilla back in May 2013

Expert Finds Remote Code Execution Vulnerability in Yahoo Server – Video

Expert Finds Remote Code Execution Vulnerability in Yahoo Server – Video

Yahoo hasn’t determined if the flaw falls within the the bug bounty program, so the Hegazy's efforts remain unrewarded

 
Want more? Browse: