A rash of compromised WordPress websites is behind this week’s surge in Neutrino Exploit Kit traffic
Tag Archives: Vulnerabilities
Ambiguous new Windows 10 update ‘improves functionality’
The new Windows 10 update doesn’t offer any detail as to what it fixes or improves, leaving many to question why the tech giant has been so vague.
The post Ambiguous new Windows 10 update ‘improves functionality’ appeared first on We Live Security.
![]()
Holes Patched in Online Bookmarking App Pocket
Developers with the service Pocket recently fixed some vulnerabilities that could have allowed users to exfiltrate data, including sensitive information regarding web services, internal IP addresses, and more.
Inside the Unpatched OS X Vulnerabilities
Italian researcher Luca Todesco explains how exploiting two vulnerabilities in OS X gain enable root access for a hacker. He won’t, however, say why he went public with details and exploit code before Apple patched.
Emergency IE Patch Fixes Vulnerability Under Attack
Microsoft released an out-of-band patch for an Internet Explorer vulnerability under attack.
Core Infrastructure Initiative Launches Open Source Security Badge Program
The Core Infrastructure Initiative, which has funded OpenSSL among other open source security projects, announced a badge program that evaluates secure development best practices.
Adobe Patches XXE Vulnerability in LiveCycle Data Services
Adobe pushed out a hotfix for LiveCycle Data Services patching an XXE vulnerability in BlazeDS.
Using BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks
Researchers warn several BitTorrent protocols can be leveraged to carry out distributed reflective denial of service (DRoS) attacks.
Apple Patches Critical OS X DYLD Flaw in Monster Update
Apple released hordes of patches for OS X, iOS, Safari and iOS Server, including fixes for the DYLD vulnerability disclosed in July.
OwnStar Attack Now Aimed at BMW, Chrysler, Mercedes Cars
The OwnStar attack that hacker Samy Kamkar revealed late last month can be used against not only GM vehicles, but cars manufactured by Mercedes-Benz, BMW, and Chrysler, as well. The attack allows Kamkar to intercept the traffic from nearby mobile phones that have specific apps open that control safety and security features on their vehicles. […]