vulnerability
0-day Microsoft Word flaw exploited in targeted attacks
Microsoft has issued a security advisory warning of a remote code execution vulnerability that is being exploited in “limited, targeted attacks directed at Microsoft …
Flaws in Android update mechanism could turn apps into malware
A group of researchers from Indiana University and Microsoft Research have unearthed six Android vulnerabilities that can be exploited to turn apparently harmless apps into …
Full Disclosure mailing list closure elicits mixed reactions
The Full Disclosure mailing list has long been the perfect place for security researchers to disclose and discuss newly found vulnerabilities. But John Cartwright, one of its …
Gang wielding ColdFusion exploits expands botnet of hacked e-commerce sites
A German website of French automaker Citro?«n is the latest of the wide array of higher-profile webshop sites that have been compromised by a hacker gang leveraging Adobe …
Backdoor in Samsung Galaxy devices discovered
The developers of Replicant, a “fully free/libre version of Android”, have discovered a backdoor in a number of Samsung Galaxy devices that could allow attackers …
Criminals rush to exploit IE 0-day before the announced fix
Last week Microsoft has announced that today’s Patch Tuesday will include a fix for the critical IE zero-day vulnerability that was found exploited in watering hole …
GnuTLS library flaw opens way for MitM attacks
A critical cryptographic bug similar to the one recently discovered in iOS and OS X has been revealed to exist in the GnuTLS code library, widely used in open source software …
300,000 routers compromised in DNS hijacking campaign
Some 300,000 confirmed – but most likely many more – small office/home office (SOHO) routers have been compromised and their DNS settings changed to use two IP …
Less risk, more reward: Managing vulnerabilities in a business context
Network security can be both an organization’s savior, and its nemesis. How often does security slow down the business? But security is something you can’t run …
Third-party programs responsible for 76% of vulnerabilities in popular software
Third-party programs are responsible for 76% of the vulnerabilities discovered in the 50 most popular programs in 2013, say the results of Secunia’s Vulnerability Review …
Tenable adds cloud management and multi-scanner support to Nessus
Tenable Network Security announced powerful cloud management capabilities will be delivered to Nessus users in a March 3rd update. Departments, teams and remote locations will …
Apple finally patches critical SSL flaw in OS X
Apple has released an update for OS X that, among other things, patches the infamous “gotofail” bug whose existence was publicly revealed last Friday. The flaw was …