High-severity bugs in 25 Symantec/Norton products imperil millions
If you use a Symantec or Norton product, now would be a good time to update. Much of the product line from security firm Symantec contains a raft of vulnerabilities thatRead More →
If you use a Symantec or Norton product, now would be a good time to update. Much of the product line from security firm Symantec contains a raft of vulnerabilities thatRead More →
IN THE PAST two years a group of researchers in Israel has become highly adept at stealing data from air-gapped computers—those machines prized by hackers that, for security reasons, areRead More →
Last week Apple cleared the air as to whether or not it intentionally released an unencrypted version of its iOS 10 beta kernel to the developer community, stating the moveRead More →
In a seeming response to the recent Check Point investigative report, the Nuclear Exploit Kit shut down its entire infrastructure and ceased operation. Background The Nuclear Exploit Kit, one ofRead More →
Millions of Office 365 business users likely effected. Starting June 22 at 6:44 a.m. UTC, Avanan’s Cloud Security Platform started to detect a massive attack against its customers that were usingRead More →
Lenovo fixed two flaws (CVE-2016-5249, CVE-2016-5248) in the Lenovo Solution Center, once again the company faces problems with pre-installed bloatware. Lenovo has fixed two high severity vulnerabilities, CVE-2016-5249, and CVE-2016-5248,Read More →
FOR YEARS HOLLYWOOD has waged a war on piracy, using digital rights management technologies to fight bootleggers who illegally copy movies and distribute them. For just as long, hackers haveRead More →
This post is aimed at those new to exploit development and wanting to understand the end-to-end process and types of techniques that need to be employed in order to realiseRead More →
written by Bob Baldwin who works at Facebook. This note was about Facebook launching it’s new feature of commenting using videos. eg. Now, users were allowed to upload a videoRead More →
The DUBNIUM campaign in December involved one exploit in-the-wild that affected Adobe Flash Player. In this blog, we’re going to examine the technical details of the exploit that targeted vulnerabilityRead More →