Author: IA Zen

  • Google researchers expose unpatched flaws in Adobe Reader | Application security – InfoWorld

    Two Google security researchers have accused Adobe of failing to fix various reported vulnerabilities in Adobe Reader in a timely manner and are using the delay as justification to publicize details behind the security holes. The duo also has recommended that users avoid Reader until Adobe rolls out patches. via Google researchers expose unpatched flaws…

  • Chromium Blog: The road to safer, more stable, and flashier Flash

    A little more than two years ago, engineers on the Chrome team began a very ambitious project. In coordination with Adobe, we started porting Flash from the aging NPAPI architecture to our sandboxed PPAPI platform. With last week’s Chrome Stable release, we were finally able to ship PPAPI Flash to all Windows Chrome users, so…

  • #35336 libunwind-headers build fails – MacPorts

    Having an issue since upgrading to Mountain Lion with libunwind-headers.  All you have to do is run the following to accept the license agreement and it works. sudo xcodebuild -license via #35336 libunwind-headers build fails – MacPorts.

  • Microsoft: Windows, Mac malware gets in via Adobe, Java, Office | ZDNet

    Microsoft has been doing some research into all the recent cross-platform malware 1, 2, 3 that attacks Windows, Macs, and sometimes even Linux. The company has concluded that current attacks exploit third-party vulnerabilities in software on these platforms. There are two ways the malicious code is being delivered, according to the software giant: via the…

  • Microsoft: Update Java or kill it | ZDNet

    Microsoft has decided is enough is enough: Java-based malware sees no end and its time to do something about it. The software giant points to two type-confusion vulnerabilities CVE-2012-0507 and CVE-2012-1723 that have been very actively exploited in recent months. Redmond thus wants you to do one of three things: update Java, disable it, or…

  • Signed Malware: You Can Run, But You Can’t Hide | Blog Central

    Digitally signed malware has received a lot of media attention recently. Indeed more than 200,000 new and unique malware binaries discovered in 2012 have valid digital signatures. via Signed Malware: You Can Run, But You Can’t Hide | Blog Central.

  • Web exploit figures out what OS victim is using, customizes payload | Ars Technica

    Security researchers have found a live Web exploit that detects if the target is running Windows, Mac OS X, or Linux and drops a different trojan for each platform. The attack was spotted by researchers from antivirus provider F-Secure on a Columbian transport website, presumably after third-party attackers compromised it. The unidentified site then displayed…

  • Sykipot is back – Alienvault Labs

    It has been a while since we published information about Sykipot. The last time we blogged about it, we discovered a variant that was able to bypass two-factor authentication to access protected resources on the victim’s network. We have detected a new wave of Sykipot campaigns that has been running during the past weeks. There…

  • New Mac OS X Backdoor Being Used for an Advanced Persistent Threat Campaign

    Cyberthreats targeting the Mac OS X platform continue to appear in various types of attacks and techniques. On June 27, 2012, Kaspersky Lab’s experts intercepted a new wave of Mac OS X attacks targeting Uyghur activists that were part of an Advanced Persistent Threat (APT) campaign. The APT attackers were sending customized emails to a…

  • Layer 8: FBI busts 24 in massive international online financial crime takedown

    The FBI today said it directed what it called the largest coordinated international law enforcement action in its history directed at online “carding” crimes typically involving stolen credit card, bank account or personal identification information of hundreds of thousands of victims around the world. The FBI said the allegations unsealed in New York today “chronicle…