A critical buffer overflow vulnerability patched this week in the widely used open-source cURL library (libcurl) has the potential to expose a large number of applications and systems to remote code execution attacks. View full post on The Hacker News For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or…
Chinese Hackers exploiting Internet Explorer Zero Day vulnerability for Cyber Espionage
Web site for the Council on Foreign Relations was compromised and recently hit by a drive-by attack that was detected earlier this week. Hacker are suspected to be from China , who are exploiting a zero day Internet Explorer vulnerability for Cyber Espionage attack against one of American most elite foreign policy…
EXCLUSIVE : Hotmail and Outlook Cookie Handling Vulnerability allow account Hijacking
This Friday I was with my co-security researcher “Christy Philip Mathew” and we were there in THN Lab for analyzing Cookie Handling Vulnerability in the most famous email services, Hotmail and Outlook. Both are merged now and belongs to same parent company – Microsoft. Vulnerability allow attacker to Hijack accounts in…
[webapps] – Manhali v1.8 Local File Inclusion Vulnerability
Manhali v1.8 Local File Inclusion Vulnerability View full post on Exploit-DB updates For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com View full post on National Cyber Security
Critical buffer overflow vulnerability in Photoshop CS6
Adobe has released an update for Photoshop CS6 that closes a critical heap-based buffer overflow vulnerability (CVE-2012-4170) in its popular graphics editing program. Both the Mac and Windows versions of Photoshop CS6 (aka Photoshop 13.0) contain a critical vulnerability that could allow an attacker to take control of affected systems.<!– adsense…
Black Hat: Most Java malware exploits “type confusion” vulnerability
A researcher investigated Java exploits, and drew on one well-know example, to explain how one of the most common classes of attack spreads. View full post on Latest articles from SC Magazine News For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com View full post on National Cyber…
NYTimes.com XSS Vulnerability Allows Attacker to Post Fake Story
Sir Cumv3nt Virtual Threat (Contributing Writer) In this day and age we all depend heavily on the Internet and social networking to stay informed about important happenings around the world and in our own communities. What many people may not […] ↓ Read the rest of this entry… View full…
MySQL vulnerability allows attackers to bypass password verification
Security researchers have released details about a vulnerability in the MySQL server that could allow potential attackers to access MySQL databases without inputting proper authentication credentials. View full post on Security – Infoworld View full post on National Cyber Security
Security vulnerability reporting framework upgraded for researchers
The security industry’s Common Vulnerability Reporting Framework (CVRF) framework for reporting and sharing security vulnerabilities in a machine-readable format has been given a promised revamp to make it easier to use for third-party researchers. View full … View full post on National Cyber Security » Computer Hacking
Security vulnerability reporting framework upgraded for reserchers
The security industry’s Common Vulnerability Reporting Framework (CVRF) framework for reporting and sharing security vulnerabilities in a machine-readable format has been given a promised revamp to make it easier to use for third-party researchers. View full … View full post on National Cyber Security