Zero Day Initiative Advisory 10-253 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required in that a target must open a malicious media file or visit a malicious page. The specific flaw exists within the application’s implementation of the LZW compression when opening a certain file format. The application will allocate a buffer for the image and then decompress image data into it. Due to explicitly trusting the decompressed data, a buffer overflow will occur. This can lead to memory corruption and code execution under the context of the application.
>> CATEGORY: Apple
Some Apple Mac users who rushed to upgrade their systems with the company’s latest security patch were left to scramble for help after a conflict with disk encryption software from…
Various blogs are reporting that it appears some iTunes customer accounts have been hacked and that funds from those accounts may have been used to purchase apps in the iTunes App Store.
Hacker Brings Android to the iPhone 3G, iPhone 3GS Up Next
Israel is banning the import of Apple’s iPad, for now at least,it might not meet the country’s national standards.
After more than 2 years of loyal service of my 2G iphone, was about time to get a new mobile. Of course 3Gs was the one I looked at first…
Dutch hacker accesses jailbroken iPhones, requests €5
We’ve been waiting for so long for this, Finally now we can use our iPhone as a USB Pendrive that too without installing any client-side application on our PC/MAC. All…
WatchOut! For Offenders is obviously meant to be a little satirical and probably aimed at girls who might be wondering if their new beau is also a child molester. The…
If you use Gmail, you have something to be excited about today, because you can finally have new email messages pushed directly to your iPhone when they arrive. To understand why…