Quantcast
Channel: exploits – National Cyber Security
Browsing all 104 articles
Browse latest View live

Android trojan steals keystrokes using phone movements

Computer scientists have devised an attack that logs phone numbers, Social Security IDs, and personal identification numbers entered into smartphones by monitoring the devices’ integrated motion...

View Article



More Trojan malware targeting Mac OS X spotted

CBR Staff Writer Published 16 April 2012 A basic backdoor Trojan horse that doesn’t require any user interaction to infect a system Sophos and Kaspersky have identified a new malware targeting at Mac...

View Article

Orchids, dandelions and an intriguing set of genes

Lynne Malcolm:  Hi, Lynne Malcolm with you and I’m very glad to bring you RN’s new season of All in the Mind.  For the next 12 weeks we’ll explore a diversity of fascinating ideas and stories about our...

View Article

A New Variant of Malware Takes Aim at Mac Users

Earlier this month, security researchers discovered a new piece of malware had infected more than half a million Apple computers in what was the largest-scale attack on Apple’s Mac OS X operating...

View Article

Bits: A New Variant of Malware Takes Aim at Mac Users

Earlier this month, security researchers discovered a new piece of malware had infected more than half a million Apple computers in what was the largest-scale attack on Apple’s Mac OS X operating...

View Article


VMWare ESXi / ESX weak permissions

<!– VMWare ESXi / ESX weak permissions –> VMWare ESXi / ESX weak permissions   news / advisories / forum / software / advertising / search / exploits   BUGTRAQSecurityVulns ID:12346Type:VMWARE :...

View Article

Plixer Scrutinizer NetFlow and sFlow Analyzer multiple security vulnerabilities

<!– Plixer Scrutinizer NetFlow and sFlow Analyzer multiple security vulnerabilities –> Plixer Scrutinizer NetFlow and sFlow Analyzer multiple security vulnerabilities   news / advisories / forum...

View Article

HP ProCurve switches compact flash cards virus

<!– HP ProCurve switches compact flash cards virus –> HP ProCurve switches compact flash cards virus   news / advisories / forum / software / advertising / search / exploits...

View Article


Astaro Security Gateway crossite scripting

<!– Astaro Security Gateway crossite scripting –> Astaro Security Gateway crossite scripting   news / advisories / forum / software / advertising / search / exploits   BUGTRAQSecurityVulns...

View Article


Astaro Command Center crossite scripting

<!– Astaro Command Center crossite scripting –> Astaro Command Center crossite scripting   news / advisories / forum / software / advertising / search / exploits   BUGTRAQSecurityVulns...

View Article

InspIRCd buffer overflow

<!– InspIRCd buffer overflow –> InspIRCd buffer overflow   news / advisories / forum / software / advertising / search / exploits   BUGTRAQSecurityVulns ID:12341Type:INSPIRCD : InspIRCd...

View Article

Android information leakage

<!– Android information leakage –> Android information leakage   news / advisories / forum / software / advertising / search / exploits   BUGTRAQSecurityVulns ID:12340Type:sumanj_(at)_gmail.com,...

View Article

Asterisk multiple security vulnerabilities

<!– Asterisk multiple security vulnerabilities –> Asterisk multiple security vulnerabilities   news / advisories / forum / software / advertising / search / exploits   BUGTRAQSecurityVulns...

View Article


Microsoft Windows multiple security vulnerabilities, updated since 11.04.2012

<!– Microsoft Windows multiple security vulnerabilities –> Microsoft Windows multiple security vulnerabilities   news / advisories / forum / software / advertising / search / exploits...

View Article

RuggedCom SCADA equipment backdoor

<!– RuggedCom SCADA equipment backdoor –> RuggedCom SCADA equipment backdoor   news / advisories / forum / software / advertising / search / exploits   BUGTRAQSecurityVulns...

View Article


OpenSSL memory corruption, updated since 22.04.2012

<!– OpenSSL memory corruption –> OpenSSL memory corruption   news / advisories / forum / software / advertising / search / exploits   BUGTRAQSecurityVulns ID:12332Type:OPENSSL : OpenSSL 0.9...

View Article

Hacking no Longer the Domain of Geeks

Like us on Facebook    While most people have heard of Anonymous and its attacks on a huge amount of government and commercial targets, no one has a clear idea of who they are and how they manage to...

View Article


Bug bounty hunters weigh in on Google's vulnerability reporting program

Google gets praise from VRP hall of famers — but could learn a lesson or two from Mozilla Follow @tsamson_IW Google this week announced that in celebration of the success of its VRP (Vulnerability...

View Article

Google Vulnerability Reward Program increases, Microsoft unfazed

Google has increased the bounty for reporting vulnerabilities that could allow for code execution to $20,000 as part of a larger change to the rules of its Vulnerability Reward Program. Meanwhile,...

View Article

Google's Vulnerability Program ups the ante for helpful hackers

This is not your ordinary rewards program, it’s Google’s way of paying it forward… to hackers. After celebrating the one year anniversary of its unique initiative this past November — in which the...

View Article
Browsing all 104 articles
Browse latest View live




Latest Images