Google Android Master Key Vulnerability Exploit Code Circulates
Proof-of-concept code for exploiting a Google Android master key vulnerability that can be used to Trojanize legitimate apps is making the round on the Internet.
Proof-of-concept code for exploiting a Google Android master key vulnerability that can be used to Trojanize legitimate apps is making the round on the Internet.
The Directive on attacks against information systems builds on rules that have been in force since 2005 (Council Framework Decision 2005/222/JHA). While retaining a number of curr…
The patch that will get the most news attention is likely to be CVE-2013-3660, which is a memory management problem in win32k.sys – the Windows Kernel. Code to exploit this flaw w…
Darkleech is back. Or maybe it never left. Either way, it's a growing problem. A campaign that forces sites running the Apache Web server to install highly malicious software on v…
If you're a Mac user and watch video files on your computer, consider downloading Apple's Security Update 2013-003 sooner rather than later. A vulnerability in QuickTime makes it …