Posted by deepcore under
Apple,
exploit,
facebook,
iphone,
m$,
OSX security tools,
Privacy,
Security,
tools,
twitter,
XSS (
No Respond)
The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing.
Tags:
tools,
ubuntu,
web
Posted by deepcore under
Apple,
exploit,
facebook,
iphone,
m$,
OSX security tools,
Privacy,
Security,
software,
tools,
twitter,
XSS (
No Respond)
Apple Security Advisory 2013-01-28-2 – Apple TV 5.2 is now available and addresses multiple security vulnerabilities.
Tags:
exploit,
iphone,
ubuntu
Posted by deepcore under
Apple,
exploit,
facebook,
hhu,
iphone,
m$,
OSX security tools,
Privacy,
Security,
software,
tools,
twitter,
XSS (
No Respond)
Apple Security Advisory 2013-01-28-1 – iOS 6.1 Software Update is now available and addresses multiple security vulnerabilities.
Tags:
Apple,
exploit,
iphone,
Security,
xss
Nielsen Reports Growth in Hispanic Moviegoers Hollywood Reporter THR's Live Google Hangout With ' Wikileaks ' Filmmaker Alex Gibney.
Tags:
anonymous,
author,
facebook,
twitter,
wikileak
Posted by deepcore under
Apple,
exploit,
facebook,
iphone,
m$,
OSX security tools,
Privacy,
Security,
software,
tools,
twitter,
XSS (
No Respond)
Apple QuickTime Player Windows version 7.7.3 suffers from an out of bounds read vulnerability.
Tags:
Apple,
iphone,
tools,
ubuntu,
Vulnerability
Posted by deepcore under
Apple,
exploit,
facebook,
iphone,
m$,
OSX security tools,
Privacy,
Security,
software,
tools,
twitter,
XSS (
No Respond)
Secunia Security Advisory – Apple has acknowledged a vulnerability in Apple TV, which can be exploited by malicious people to compromise a user’s device.
Tags:
iphone,
javascript,
tools
Posted by deepcore under
Apple,
exploit,
facebook,
iphone,
m$,
OSX security tools,
Privacy,
Security,
software,
tools,
twitter,
XSS (
No Respond)
Secunia Security Advisory – Two security issues and multiple vulnerabilities have been reported in Apple iOS, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user’s device.
Tags:
exploit,
Security,
ubuntu
Contactmusic.com Julian Assange Denounces Wikileaks Movie, The Fifth Estate, as “Lie Upon Lie” Contactmusic.com But Wikileak's central figure, a certain Julian Assange, branded the film as “a lie upon lie,” telling the audience at the university's Oxford Union debating club that, “The movie is a massive propaganda attack on WikiLeaks and the character of my staff. Filming Begins on the Wikileaks Movie, The Fifth Estate About – News & Issues all 499 news articles
Tags:
julian-assange,
movie-trailers,
videos,
wikileak
Filming Begins on the Wikileaks Movie, The Fifth Estate About – News & Issues Twilight: Breaking Dawn Parts 1 & 2 director Bill Condon is busy at work on his new project, The Fifth Estate, which DreamWorks just announced has begun principal photography. The dramatic film delves into the backstory of the Wikileaks website and its … and more
Tags:
entertainment,
soundtrack-news,
wikileak
NewsClick Keep Pentagon Out of India's MoD NewsClick This fact came up when Wikileak exposed a 2009 US Embassy cable addressed to Hillary Clinton that blamed India's civilian leadership and bureaucracy for adding road blocks to the fruition of Indo-US strategic partnership – “slowing down a relationship …
Tags:
exploit,
hacker,
indian,
twitter