Items tagged with vulnerabilities

Conventional wisdom in years past was that hackers didn’t bother to exploit Apple’s OS X operating system because its relatively insignificant market share didn’t warrant wasting resources to exploit it. The reasoning was, why bother with OS X when Windows was pushing over 90 percent of the worldwide OS market? However, in recent years, Apple has seen an uptick in Mac sales and pretty much dominates the field when it comes to notebooks priced over $1,000. The higher sales profile for Macs running OS X also means more attention from nefarious parties that are ready to strike. The latest report from... Read more...
We talked earlier this week about all of the software that lost their battles against the hackers at the Pwn2Own competition in Vancouver, Canada, but lest we forget about the sister competition, Pwnium 3. This particular competition was heavily sponsored by Google, with the company paying well more than $100,000 per exploit discovered against its Chrome browser. Examples would be a system compromise delivered via a webpage while in guest mode or even better - an exploit that results in device persistence (lasting through the reboots). Well, while Chrome fell at Pwn2Own - despite Google patching... Read more...
File this one under “Worst News of the Day”. According to a report from Cenzic, a staggering 99% of all web-based and mobile apps it tested have security vulnerabilities that can be exploited by cybercriminals, and the median number of vulnerabilities per app is thirteen. The included infographic shows the areas of vulnerability that exist, and the report details the type, frequency, and severity of these issues as they pertain to web- and cloud-based and mobile applications. Cross-scripting is the most common type of vulnerability. For their part, mobile applications are vulnerable... Read more...
It seems, sometimes, that a new phishing scam crops up every day, no matter how much security is improved.That's not just your imagination.IBM today released its annual IBM X-Force 2009 Trend and Risk Report, which showed threats that include phishing and document format vulnerabilities, among others, are on the rise.The areas are of most concern, the report showed:Malicious Web links, which result in malware or viruses being downloaded onto the clicker's computerPhishing scams, where messages from a seemingly legit organization or company fool users into turning over sensitive informationVulnerabilities... Read more...