Serial bughunter Mark Dowd found a hole where it *really* wasn’t wanted. In the text messaging software on the “absolute privacy” Blackphone…![]()
Tag Archives: Exploit
Adobe gets second Flash zero-day patch ready 2 days early!
Good news from Adobe about CVE-2015-0311, the unpatched zero-day in Flash. The patch is now ready via auto-update – 2 days early!![]()
SCADA programmers? It’s time for security by default! 60 Sec Security [VIDEO]
Here’s the latest episode of our weekly 60-second security video. Enjoy the news in just one minute…![]()
Adobe issues emergency fix for Flash zero-day
Crooks are reportedly using a new Flash vulnerability called CVE-2015-0310. Adobe has a fix already, so grab it while it’s hot!![]()
Big bag of fixes: Oracle’s Critical Patches for Jan 2015 close 160 holes, 93 remotely exploitable
Big bag of fixes! Oracle’s Critical Patches for Jan 2015 fix 160 holes in 48 products, with 93 of those vulnerabilities remotely exploitable.![]()
SSCC 181 – The Security Duel: “Bug reports at 15 paces” [PODCAST]
Microsoft vs. Google – Google vs. Users – Hackers vs. US Army – the fight is on in the latest episode of our weekly security podcast! Enjoy…![]()
Patch Tuesday wrap-up, December 2014 – why “Important” can be Critical…
Adobe and Microsoft put forth their respective Patch Tuesday updates this week, bringing you their last scheduled patches of 2014. Paul Ducklin digs in…![]()
Adobe publishes out-of-band Flash update – provides “booster dose” for October’s patches
Adobe has published a Flash update, dubbed APSB14-26. The new patch offers additional protection against a vulnerability that was originally addressed in October 2014.![]()
SSCC 175 – “My, what an ENORMOUS malware infection you have!” [PODCAST]
Here’s the latest episode of our weekly security podcast. For your listening pleasure – the news you can use!![]()
WordPress issues critical security fixes, closing remote anonymous compromise bug and more
WordPress has just published a critical security release. If you’re still on WordPress 3, this is about as critical as it gets, because one of the fixes closes a “remote anonymous compromise” bug.![]()
