Tuesday, April 21st, 2009
Firefox 3.0.9 fixes several security issues found in Firefox 3.0.8:
Firefox allows Refresh header to redirect to javascript: URIs
POST data sent to wrong site when saving web page with embedded frame
Malicious search plugins can inject code into arbitrary sites
Same-origin violations in XMLHttpRequest and XPCNativeWrapper.toString
XSS hazard using third-party stylesheets and XBL bindings
Same-origin violations ...
Posted in Internet, Linux, Privacy, Security, Software, Windows | No Comments
Friday, March 20th, 2009
Computer security researchers have devised a new Twitter attack that they say could spread virally, much like a worm on the microblogging service.
The attack, posted online Thursday by researchers at Secure Science is an innocuous proof of concept that forces users to send out a predetermined twitter message, but it ...
Posted in Internet, Security | 1 Comment
Tuesday, March 3rd, 2009
Gmail is Google's "free webmail service. It comes with built-in Google search technology and over 2,600 megabytes of storage (and growing every day). You can keep all your important messages, files and pictures forever, use search to quickly and easily find anything you're looking for, and make sense of it ...
Posted in Coding, Internet, Security | No Comments
Saturday, January 3rd, 2009
DaiMon has once more discovered a new critical cross-site scripting vulnerability which affects the Facebook "Reset Password" page. Malicious users can inject code to phish credentials and other sensitive personal information from millions of Facebook members.
We hope that this serious flaw gets fixed quickly as is usually the case with ...
Posted in Coding, Internet, Privacy, Security | 3 Comments
Tuesday, July 29th, 2008
Cybercriminals increasingly are employing no-tech or low-tech techniques for making big money online -- no exploits or sophisticated hacker tools required.The techniques themselves aren’t new -- some have been around for nearly a decade. But the Web model has made these schemes that capitalize on so-called business logic flaws more ...
Posted in Internet, Privacy, Security | No Comments
Page 3 of 9«12345...»Last »