Nothing's anonymous in a WikiLeak world Technology Spectator The two most prominent examples, of course, are the cases of the collective Anonymous releasing more than 10 gigabytes of data from local sheriffs' departments last week and WikiLeaks , specifically Julian Assange's publication of more than 250000 US …

Zero Day Initiative Advisory 11-259 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the way QuickTime handles corrupt Sample Size atoms

Zero Day Initiative Advisory 11-257 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple’s QuickTime Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within how the application parses a frame within an H.264 encoded movie

Zero Day Initiative Advisory 11-256 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.