Critical Zero-Day Vulnerabilities Disclosed in Mac OS X and iOS
A team of researchers have detailed their discovery of critical zero-day vulnerabilities in the Mac OS X and iOS operating systems that could allow a malicious application to steal passwords from...
View ArticleIt's Time to Kill the General Purpose Browser
Another week, another critical Adobe Flash vulnerability (CVE-2015-3113), complete with active exploit in the wild. Adobe encourages everyone to patch right away, but is there more you should do? In...
View ArticleOPM Suspends Background Check Portal Due to Vulnerability
The Office of Personnel Management (OPM) announced they are temporarily suspending the E-QIP system, a web-based platform used to complete and submit background investigation forms by federal agencies,...
View ArticleUnpatched Adobe Flash Use-After-Free Zero-Day Vulnerability
UPDATE: Patch is available, exploit detected in the wild. * * * US-CERT has issued an advisory (VU#561288) regarding an unpatched Adobe Flash use-after-free zero-day vulnerability in the...
View ArticleMore Unpatched Zero-Day Vulnerabilities in Adobe Flash Player
UPDATE: “Adobe has released security updates for Adobe Flash Player for Windows, Macintosh and Linux. These updates address critical vulnerabilities that could potentially allow an attacker to take...
View ArticleSixty Percent of Enterprise Application Vulnerabilities Go Unmitigated
A survey conducted at the recent Gartner Security and Risk Management Summit revealed that two-thirds of the more than 100 senior security professionals queried admit that sixty percent or more of the...
View ArticleHow to Reverse Engineer Android Applications
In computing, reverse engineering is the process of understanding how things work and reusing the information to do something. This is applicable even to Android apps. You might reverse engineer...
View ArticleZero-Day Vulnerability in Apple iTunes and AppStore Disclosed
German security researcher Benjamin Kunz Meyri, the founder of Vulnerability Lab, has disclosed a critical zero-day vulnerability in the Apple iTunes and AppStore platforms which allows the hijacking...
View ArticleMitigating Third-Party Vendor Risks
In everyday business, a complex set of external relationships is commonplace. Services, infrastructure, and even software live in the cloud, supplied by third-parties. An organization’s value is often...
View ArticleSecurity Predictables and Why You Should Join My Doomsday Cult
Predictions are a time-honored tradition in the security world where the best and greatest pundits throw down what they think will happen in the coming years. Which fits right in to the time-honored...
View Article
More Pages to Explore .....