Android trojan steals keystrokes using phone movements
Computer scientists have devised an attack that logs phone numbers, Social Security IDs, and personal identification numbers entered into smartphones by monitoring the devices’ integrated motion...
View ArticleMore Trojan malware targeting Mac OS X spotted
CBR Staff Writer Published 16 April 2012 A basic backdoor Trojan horse that doesn’t require any user interaction to infect a system Sophos and Kaspersky have identified a new malware targeting at Mac...
View ArticleOrchids, dandelions and an intriguing set of genes
Lynne Malcolm: Hi, Lynne Malcolm with you and I’m very glad to bring you RN’s new season of All in the Mind. For the next 12 weeks we’ll explore a diversity of fascinating ideas and stories about our...
View ArticleA New Variant of Malware Takes Aim at Mac Users
Earlier this month, security researchers discovered a new piece of malware had infected more than half a million Apple computers in what was the largest-scale attack on Apple’s Mac OS X operating...
View ArticleBits: A New Variant of Malware Takes Aim at Mac Users
Earlier this month, security researchers discovered a new piece of malware had infected more than half a million Apple computers in what was the largest-scale attack on Apple’s Mac OS X operating...
View ArticleVMWare ESXi / ESX weak permissions
<!– VMWare ESXi / ESX weak permissions –> VMWare ESXi / ESX weak permissions news / advisories / forum / software / advertising / search / exploits BUGTRAQSecurityVulns ID:12346Type:VMWARE :...
View ArticlePlixer Scrutinizer NetFlow and sFlow Analyzer multiple security vulnerabilities
<!– Plixer Scrutinizer NetFlow and sFlow Analyzer multiple security vulnerabilities –> Plixer Scrutinizer NetFlow and sFlow Analyzer multiple security vulnerabilities news / advisories / forum...
View ArticleHP ProCurve switches compact flash cards virus
<!– HP ProCurve switches compact flash cards virus –> HP ProCurve switches compact flash cards virus news / advisories / forum / software / advertising / search / exploits...
View ArticleAstaro Security Gateway crossite scripting
<!– Astaro Security Gateway crossite scripting –> Astaro Security Gateway crossite scripting news / advisories / forum / software / advertising / search / exploits BUGTRAQSecurityVulns...
View ArticleAstaro Command Center crossite scripting
<!– Astaro Command Center crossite scripting –> Astaro Command Center crossite scripting news / advisories / forum / software / advertising / search / exploits BUGTRAQSecurityVulns...
View ArticleInspIRCd buffer overflow
<!– InspIRCd buffer overflow –> InspIRCd buffer overflow news / advisories / forum / software / advertising / search / exploits BUGTRAQSecurityVulns ID:12341Type:INSPIRCD : InspIRCd...
View ArticleAndroid information leakage
<!– Android information leakage –> Android information leakage news / advisories / forum / software / advertising / search / exploits BUGTRAQSecurityVulns ID:12340Type:sumanj_(at)_gmail.com,...
View ArticleAsterisk multiple security vulnerabilities
<!– Asterisk multiple security vulnerabilities –> Asterisk multiple security vulnerabilities news / advisories / forum / software / advertising / search / exploits BUGTRAQSecurityVulns...
View ArticleMicrosoft Windows multiple security vulnerabilities, updated since 11.04.2012
<!– Microsoft Windows multiple security vulnerabilities –> Microsoft Windows multiple security vulnerabilities news / advisories / forum / software / advertising / search / exploits...
View ArticleRuggedCom SCADA equipment backdoor
<!– RuggedCom SCADA equipment backdoor –> RuggedCom SCADA equipment backdoor news / advisories / forum / software / advertising / search / exploits BUGTRAQSecurityVulns...
View ArticleOpenSSL memory corruption, updated since 22.04.2012
<!– OpenSSL memory corruption –> OpenSSL memory corruption news / advisories / forum / software / advertising / search / exploits BUGTRAQSecurityVulns ID:12332Type:OPENSSL : OpenSSL 0.9...
View ArticleHacking no Longer the Domain of Geeks
Like us on Facebook While most people have heard of Anonymous and its attacks on a huge amount of government and commercial targets, no one has a clear idea of who they are and how they manage to...
View ArticleBug bounty hunters weigh in on Google's vulnerability reporting program
Google gets praise from VRP hall of famers — but could learn a lesson or two from Mozilla Follow @tsamson_IW Google this week announced that in celebration of the success of its VRP (Vulnerability...
View ArticleGoogle Vulnerability Reward Program increases, Microsoft unfazed
Google has increased the bounty for reporting vulnerabilities that could allow for code execution to $20,000 as part of a larger change to the rules of its Vulnerability Reward Program. Meanwhile,...
View ArticleGoogle's Vulnerability Program ups the ante for helpful hackers
This is not your ordinary rewards program, it’s Google’s way of paying it forward… to hackers. After celebrating the one year anniversary of its unique initiative this past November — in which the...
View Article
More Pages to Explore .....