Business Insider If You Want A Classic WW2 Rifle, The Government Is Selling Business Insider A Congressional document, leaked by Wikileaks , details how what was once a wholly, publicly owned and operated military wholesale program became this strange, incredibly rare “hybrid” company. Here's how it works: All the weapons, the M1 Carbines and …

WikiLeaks soldier to face US trial on February 4 AFP FORT MEADE, Maryland — US Army Private Bradley Manning will go on trial on February 4 of next year over charges he “aided the enemy” by passing a trove of classified documents to WikiLeaks , a judge said Thursday. The proceedings are scheduled to …

AFP Ecuador's President demands Sweden and Britain guarantee not to extradite … Herald Sun ECUADOR'S President Rafael Correa fears Julian Assange would not get a fair trial in the US and has insisted that Britain and Sweden guarantee they will not extradite the WikiLeaks founder

U.S. authorities have arrested a second member of the hacking group known as LulzSec in connection with a cyber attack against Sony Pictures Entertainment that saw the leaking of thousands of emails, phone numbers, passwords and other personal details of people who had entered Sony contests.

US military says WikiLeaks suspect broke rules before AFP FORT MEADE, Maryland — US military lawyers said Wednesday that Army Private Bradley Manning, who is accused of passing secret documents to WikiLeaks , knew his actions were wrong as he had broken similar rules before. A pre-trial hearing for ..

This Metasploit module exploits a vulnerability in Java 7, which allows an attacker to run arbitrary Java code outside the sandbox. The vulnerability seems to be related to the use of the newly introduced ClassFinder#resolveClass in Java 7, which allows the sun.awt.SunToolkit class to be loaded and modified. Please note this flaw is also being exploited in the wild, and there is no patch from Oracle at this point

Zero Day Initiative Advisory 12-153 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within Quicktime.qts when parsing the ‘sean’ atom