exploits

exploits

App developer calls critic "f*cken little know it all"; site goes down

Google slates Pwnium 3 contest for March 7, offers up to $3.14159m for vulnerabilities in Chrome OS

thenextweb.com
Google on Monday announced it is hosting its third Pwnium competition, aptly named Pwnium 3, on March 7. The security contest’s main focus will be Chrome OS, for which the company will be offering up to a total of $3.14159 million in rewards for security researchers (Google loves using geeky...
Google slates Pwnium 3 contest for March 7, offers up to $3.14159m for vulnerabilities in Chrome OS

Report: Passwords, Email Contents Of Millions Of Android Users At Risk

www.fastcompany.com
German researchers have discovered a serious Android security lapse that is possibly exposing the passwords, bank account information, and email contents of as many as 185 million users. According to a joint team at the University of Marburg and Leibniz University of Hannover, 41 applications available via Google's Play Market...
Report: Passwords, Email Contents Of Millions Of Android Users At Risk

Cybercriminals are increasingly abusing .eu domains in attacks

www.pcworld.com
Cybercriminals are increasingly using .eu domain names in their attack campaigns, according to data from multiple security companies. "Numerous malicious .eu domains have been registered during November which are being used to infect PCs with malware via the Blackhole exploit kit," said Fraser Howard, principal virus researcher at security...
Cybercriminals are increasingly abusing .eu domains in attacks

Oracle's emergency Java patch blocks zero-day exploits, researchers confirm

www.computerworld.com
Oracle today issued an emergency update to patch the critical vulnerabilities hackers have been using in increasing numbers to hijack Windows PCs....
Oracle's emergency Java patch blocks zero-day exploits, researchers confirm

Two-Step Verification Dances Around the Issue

pandodaily.com
Last June, millions of LinkedIn accounts were hacked. In July, 400,000 Yahoo accounts were hacked. On Friday, one tech writer, Mat Honan, had his Apple and Amazon accounts hacked through cracks in their customer service, bringing down the rest of his digital identity, as well as wiping years’ worth of...
Two-Step Verification Dances Around the Issue

Hacker publishes alleged zero-day remote code execution exploit for older Plesk versions

www.pcworld.com
A hacker released what he claims is a zero-day exploit for older versions of the Parallels Plesk Panel, a popular Web hosting administration software package, that could allow attackers to inject arbitrary PHP code and execute rogue commands on Web servers.The hacker uses the alias "Kingcope" and has published...
Hacker publishes alleged zero-day remote code execution exploit for older Plesk versions

Microsoft's Great Patent Application: Xbox Achievements For Watching Advertising

www.techdirt.com
You may recall the concern some have raised over Smart TVs, those internet connected glowing boxes with cameras ripe for exploits that would allow hackers to watch you watch TV. Supposedly less nefarious were concerns over technology that would allow those same Smart TVs to recognize when you had...
Microsoft's Great Patent Application: Xbox Achievements For Watching Advertising

Cryptome.org hacked--and inadvertently spreads infection

news.cnet.com
Infected files on the site were downloading exploits from the Blackhole Toolkit that target Windows....
Cryptome.org hacked--and inadvertently spreads infection

Browser-controlled robot lets you skip stones remotely, mentally escape the concrete jungle

www.engadget.com
Can't unwind without the aid of open spaces? Skippy the robot might be able to help you out. The aptly named bot lets you remotely skip stones across an Idaho pond using a simple web interface. After waiting for your turn in a virtual queue, the machine lets you...
Browser-controlled robot lets you skip stones remotely, mentally escape the concrete jungle

Exploits of unpatched IE6, IE7 flaw on the rise

arstechnica.com
An unpatched flaw in Internet Explorer versions 6 and 7 is increasingly being exploited. The flaw, first reported two weeks ago, was initially used in limited, targeted attacks. It is now evolving into something more widespread and indiscriminate. Security researchers for antivirus company AVG are now reporting tens of...
Exploits of unpatched IE6, IE7 flaw on the rise

TNW's Daily Dose: Java, Best Buy, and the TwitPic dude is back

thenextweb.com
Java gets whacked, Groupon goes payments on Android, Best Buy has a flat holiday season, and TwitPic’s dude is back. You can catch The Daily Dose every Monday through Friday right here on The Next Web. Be sure to hit the subscription button of your choice below to get The...
TNW's Daily Dose: Java, Best Buy, and the TwitPic dude is back

Researchers Find New Mac Keylogging Trojan on Site About Dalai Lama

betabeat.com
Dockster is a recently discovered Mac-based malware program that functions as a keylogger, among other things. It’s also a trojan, which means it can hide on a host computer quietly recording every keystroke before it contacts a remote server for further instructions. Dockster is considered “low risk,” but it has...
Researchers Find New Mac Keylogging Trojan on Site About Dalai Lama

Why the TrackingPoint 'lock and launch' sniper rifle is disgusting

venturebeat.com
Earlier today, VentureBeat published an article about a new sniper rifle and scope technology that appeared at the Consumer Electronics Show in Las Vegas last week. Made by a company called TrackingPoint, the technology gives you a “lock and launch” experience that is similar to that used by fighter pilots who...
Why the TrackingPoint 'lock and launch' sniper rifle is disgusting
New zero-day exploits in industrial software channel the ghost of Microsoft Bob

Flash update fixes active exploits for both OS X and Windows

reviews.cnet.com
Two new zero-day vulnerabilities are addressed by the latest update to Adobe's popular Flash plug-in. [Read more]...
Flash update fixes active exploits for both OS X and Windows
7 reasons you can't take social networks for granted
Sony exploits Trinitron and Walkman legacy to promote Xperia Z

Adobe Launches Sandboxed Flash Player for Firefox, Hopes for Fewer Exploits

www.pcworld.com
Adobe has released a beta version of Flash Player for Firefox, which has better protection against vulnerability exploits because of a new sandboxed......
Adobe Launches Sandboxed Flash Player for Firefox, Hopes for Fewer Exploits
Digg and Milk founder Kevin Rose heads to Google
Google Wallet prepaid service re-enabled after security fix

Moneto's $30 Android mobile payment kit goes on sale, brings contactless payments to four Samsungs

www.engadget.com
Not everyone's smartphone has NFC, and of those that do, an even smaller subset have official Google Wallet support. It would seem Mountain View's complacency is Moneto's gain, as the outfit's recently put up for sale its $30 NFC-enabled microSD card -- enabling plebes everywhere sans contactless circuitry to...
Moneto's $30 Android mobile payment kit goes on sale, brings contactless payments to four Samsungs

Google offers $1 million reward to hackers who exploit Chrome

arstechnica.com
Google has pledged cash prizes totaling $1 million to people who successfully hack its Chrome browser at next week's Pwn2Own hacker contest. Google will reward winning contestants with prizes of $60,000, $40,000, and $20,000 depending on the severity of the exploits they demonstrate on Windows 7 machines running the...
Google offers $1 million reward to hackers who exploit Chrome
Elgato Game Capture HD records your gaming feats, supports timeshifting
Behind The Scenes Of The iPhone 5 Jailbreak
After so many hacks, why won't Java just go away?

Cisco Hits Record Quarterly Revenue

www.pcworld.com
Crediting a strategy that exploits users' move to cloud computing, Cisco Systems on Thursday reported record net sales of US$11.6 billion for the quarter ending......
Cisco Hits Record Quarterly Revenue

Researchers release new exploits to hijack critical infrastructure

arstechnica.com
Researchers have released two new exploits that attack common design vulnerabilities in a computer component used to control critical infrastructure, such as refineries and factories. The exploits would allow someone to hack the system in a manner similar to how the Stuxnet worm attacked nuclear centrifuges in Iran, a...
Researchers release new exploits to hijack critical infrastructure

Hacker finds Chrome vulnerability, closes in on $60K prize

www.techhive.com
It appears the hacker known as "Pinkie Pie" produced the first Chrome vulnerability at the Hack In the Box conference on Wednesday, just ahead of the deadline for the competition this afternoon. Google security officials said they are in the process of verifying the vulnerability, which if valid, will...
Hacker finds Chrome vulnerability, closes in on $60K prize

Five Reasons Why Chatroulette is Addictive, and Worth a Try

www.wired.com
Everyone (from the mainstream media to celebrities) is obsessing over Chatroulette, the website that randomly connects users via one-on-one videochat with strangers around the world. Why is it so addictive? As Wired’s resident Chatroulette expert (I’ve been using the service since it was created in late 2009), I think I...
Five Reasons Why Chatroulette is Addictive, and Worth a Try
× Just a test of the new info bar. What do you think?