Items tagged with Exploits

This one's important, so let's get right to it: a new security flaw in all versions of Windows opens the door for a wormable remote code execution vulnerability. That means it can be exploited by an automated worm with zero user... Read more...
Back in 2018, a team of security researchers from Akamai released a white paper detailing a malicious proxy system they dubbed UPnProxy that is now being leveraged in a new attack. The malicious proxy system draws its name from Universal... Read more...
It seems as though most (if not all) Internet users are awaiting the day when Adobe Flash is finally eradicated from the face of the earth. The Adobe Flash Player plugin has long been a security liability, resource nightmare and battery... Read more...
If our not-too-subtle hint a couple of weeks ago about the perils of having Java installed wasn't enough to convince you to uninstall, you should waste no time in heading on over to the official site and grabbing the latest version (7u13)... Read more...
No less than three different browser platforms have succumbed to zero-day exploits by the end of the first day of the three-day long, third-annual Pwn2Own contest being held at the CanSecWest 2009 digital security conference in Vancouver, British Columbia. Safari on Mac OS X was the first to... Read more...
How many times have you forgotten to lock your car, or a door? While that's bad enough, what about essentially leaving a back door open for hackers, by "forgetting" about an old administrative system?A hacker infiltrated an eBay server and disabled accounts of several members on Friday. Representatives of eBay say that the hacker used vestigial... Read more...