The Dumb Politics Of Benghazi – BuzzFeed
BuzzFeed The Dumb Politics Of Benghazi BuzzFeed Over the past month, the right's impressive effort to exploit Benghazi has stretched from the House Oversight Committee on Capitol Hill — whose Republican majority has employed Wikileak -like tactics in their zeal to blow up Obama, releasing scores of ... and more
Secunia Security Advisory 51157
Secunia Security Advisory - Two vulnerabilities have been reported in Apple Safari, which can be exploited by malicious people to compromise a user's system.
Secunia Security Advisory 51162
Secunia Security Advisory - A weakness and multiple vulnerabilities have been reported in Apple iOS, which can be exploited by malicious people with physical access to bypass certain security restrictions and by malicious people to disclose certain system information and compromise a vulnerable device.
Apple Security Advisory 2012-11-01-2
Apple Security Advisory 2012-11-01-2 - Safari 6.0.2 is now available and addresses multiple arbitrary code execution vulnerabilities.
Apple Security Advisory 2012-11-01-1
Apple Security Advisory 2012-11-01-1 - iOS 6.0.1 is now available and addresses an information disclosure issue, a Passbook bypass, an arbitrary code execution vulnerability, and more.
[papers] – [Hebrew] Digital Whisper Security Magazine #37
[Hebrew] Digital Whisper Security Magazine #37
Apple QuickTime Player 7.7.2 Crash
Apple QuickTime Player version 7.7.2 division by zero crash proof of concept exploit.
[dos] – Apple QuickTime Player 7.7.2 Crash PoC
Apple QuickTime Player 7.7.2 Crash PoC
DropBox iOS / Android App File Theft
DropBox version 1.4.6 on iOS, 2.0.1 on Android, and Google Drive version 1.0.1 on iOS suffer from a file theft vulnerability due to allowing arbitrary javascript to be executed inside of the privileged file zone.
Secunia Security Advisory 50942
Secunia Security Advisory - Apple has issued an update for Java for Mac OS X. This fixes multiple vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and potentially compromise a vulnerable system.