ESET researchers have spotted fake patch apps for Android – probably the first ever malicious mobile apps masquerading as a patch for a recently discovered vulnerability.
The HTTPS landscape is changing. Now, tech giants, like Google and Mozilla, have decided that each and every website must adopt this security protocol. But this isn’t always a good thing.
Hong Kong-based Bitcoin exchange ‘Bitfinex’ that lost around $72 Million worth of its customers’ Bitcoins last week is now offering a reward of $3.5 Million to anyone who can provide information that leads to the recovery of the stolen Bitcoins.
Bitfinex revealed on August 2 that the cryptocurrency exchange had suffered a major security breach, which resulted in the loss of nearly 120,000 BTC
A use after free vulnerability exists in Adobe Acrobat and Reader. The vulnerability is due to an error in the way Adobe Acrobat and Reader handles objects in memory. A remote attacker can exploit this vulnerability by enticing the user to open a specially crafted PDF file.
BOPing is a network scanner for computers where the Back Orifice remote administration program is installed. Use of this scanner might be a preliminary step before attempting to take control over the system using the Back Orifice program.This protection detects and blocks use of the BOPing scanner.
A remote code execution vulnerability exists in Adobe Acrobat and Reader. The vulnerability is due to a use-after-free error in Adobe Acrobat and Reader while handling a specially crafted PDF file. A remote attacker can exploit this vulnerability by enticing a target user to open a specially crafted PDF file.
A memory corruption vulnerability exists in Adobe Acrobat and Reader. The vulnerability is due to an error while handling a specially crafted PDF file that leads to out-of-bounds memory access. A remote attacker can exploit this vulnerability by enticing a target user to open a specially crafted PDF file.