• 25,450
  • +1,003
  • 2,796

Iphone and Blackberry fall...

  THE IPHONE 4 AND BLACKBERRY TORCH were hacked on day two of the Pwn2Own hacking contest in Vancouver, BC. Charlie Miller, a researcher who has successfully performed Apple smartphone hacks in previous years, broke into the Iphone 4. He had help from his Independent Security Evaluators colleague Dion Blazakis, taking advantage of a browser flaw which has now...

Joomla Component (com_file...

 ### # Title : Joomla Component (com_fileuploader) Upload File Vulnerability # Author : KedAns-Dz # E-mail : ked-h@hotmail.com # Home : HMD/AM (30008/04300) - Algeria -(00213555248701)...

Pwn2Own hacking contest ki...

  The popular Pwn2Own security contest kicked off at the CanSecWest security conference. The two-day hacking challenge pits security researchers against fully-patched versions of the latest desktop and smartphone web browsers and operating systems.   Aaron Portnoy, security research manager for contest sponsor DV Labs announced on Wednesday afternoon that...

Microsoft sets March 15th ...

  Microsoft will officially launch the latest version of its Internet Explorer browser at 5am GMT on March 15th at the South by South West (SXSW) Interactive festival in Austin. The new browser, IE9, will contain almost all of the features in the Release Candidate that went live in February but Internet Explorer senior director Ryan Gavin said in a blog...

Anonymous hacktivists: We&...

A member of Anonymous claims to have taken possession of code for the infamous Stuxnet virus. Topiary, an online activist affiliated with the 4-chan-spawned internet coalition, claimed on Twitter to have gained possession of the malware. He said: "Anonymous is now in possession of Stuxnet – problem, officer?" Anonymous claims to have lifted the...

Hacker group vows ‘c...

DALLAS — A leader of the computer hackers group known as Anonymous is threatening new attacks on major U.S. corporations and government officials as part of at an escalating “cyberwar” against the citadels of American power. “It’s a guerrilla cyberwar — that’s  what I call it,” said Barrett Brown, 29, ...

Major websites (gov,mil,ed...

The "traffic" probably stands for the number of records within the DB tables.  The "goods" in this case are probably the needed information for the "Level of Control."  For "full site admin" – probably the credentials and the URL of site administrator interface. The hacker is also selling info personally...

Microsoft to Patch 3 Windo...

  Microsoft has three fixes for Windows vulnerabilities on tap for Patch Tuesday, but other security holes remain open. Microsoft is kicking off 2011 with a small Patch Tuesday release that will feature fixes for three vulnerabilities in Windows. The bugs will be patched via two security bulletins, one of which is rated "critical" and affects all...

Facebook Hacker Cup

Hacking is a central part of Facebook's culture. Whether we're building the next big product at one of our Hackathons or creating a smarter search algorithm, we're always hacking to find a better way of doing things. We're starting the Hacker Cup to bring engineers from around the world together to compete in a multi-round programming...

Mobile users more vulnerab...

Security firm Trusteer has warned that mobile users are particularly vulnerable to phishing scams, identifying the small screen format of mobile devices as a contributing factor in preventing users spotting that a link is malicious. Trusteer gleaned its insights from an examination of several web servers hosting phishing web sites, which typically masquerade as...

Microsoft warns of Windows...

Microsoft warned today of a Windows vulnerability that could allow an attacker to take control of a computer if the user is logged on with administrative rights. To be successful, an attacker would have to send an e-mail with an attached Microsoft Word or PowerPoint file containing a specially crafted thumbnail image and convince the recipient to open it, Microsoft...

Microsoft and Google clash...

The release of a new tool that shows up to 100 Internet Explorer zero day flaws by a Google researcher has sparked a war of words over responsible disclosure. Michal Zalewski, a security researcher, employed by Google, has released a debugging tool called cross_fuzz from his blog which allows researchers to expose up to 100 flaws in Microsoft’s browser....

[0day?] sql-injection in p...

Hi folks, Exists an SQL-Injection on http://people.joomla.org http://people.joomla.org/events.html?groupid=1%20or%201=0%20union%20select%20all%201,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66,67,68,69,70;%20– I hope...

Page 7 of 8« First...45678