Romanian member of the Anonymous activist group: in Romania there is the … HotNews.co The Anonymous group, which crashed the Visa and Mastercard websites on December 8, 2010 as a sign of protesc against the arrest of Julian Assange, Wikileaks … and more
>> CATEGORY: Security
Apple Security Advisory 2010-12-16-1 – Multiple vulnerabilities have been addressed in Time Capsule and the Airport Base Station.
Operation Payback 2.0? HSToday Members of Anonymous , as Wikileaks ' self-proclaimed cyber-supoorters are codenamed, posted new versions of open source distributed denial of service (DDoS) … and more
Here is the original post: Anonymous Hierachy Emerges
See the original post: DIY Biotech Hacker Space Opens In NYC
The Guardian WikiLeaks : Anonymous hierarchy emerges The Guardian But inside Anonymous , the Guardian has found that the organisation is more hierarchical – with a hidden cabal of around a dozen highly skilled hackers … and more
Reuters India …
Operation Payback's next DDoS target: Fax machines Netcraft Operation Payback has begun a new fax-based campaign against some of the companies who decided to distance themselves from WikiLeaks. … and more
Zero Day Initiative Advisory 10-258 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the Quicktime.qts module responsible for parsing media files. While handling 3GP streams a function within this module a loop trusts a value directly from the media file and uses it during memory copy operations. By supplying a large enough value this buffer can be overflowed leading to arbitrary code execution under the context of the user accessing the file.
iDefense Security Advisory 12.07.10 – Remote exploitation of a memory corruption vulnerability in Apple Inc.’s QuickTime media player could allow attackers to execute arbitrary code in the context of the targeted user. The vulnerability specifically exists in the way specially crafted PICT image files are handled by the QuickTime PictureViewer. When processing specially crafted PICT image files, Quicktime PictureViewer uses a set value from the file to control the length of a byte swap operation. The byte swap operation is used to convert big endian data to little endian data. QuickTime fails to validate the length value properly before using it. When a length value is larger than the actual buffer size supplied, it will corrupt heap memory beyond the allocated buffer, which could lead to an exploitable condition. QuickTime Player versions prior to 7.6.9 are vulnerable.