Apple QuickTime Security Bypass
Security Explorations does not agree with Apple's evaluation of a vulnerability they reported. They have decided to release proof of concept code to demonstrate a bypass vulnerability in Apple QuickTime Java extensions.
Senator: Amazon.com pulls plug on WikiLeaks site after inquiries – Puget Sound Business Journal (blog)
Senator: Amazon.com pulls plug on WikiLeaks site after inquiries Puget Sound Business Journal (blog) Days after reports emerged that the WikiLeaks website had found safe haven in Amazon.com's...
Zero Day Initiative Advisory 12-095
Zero Day Initiative Advisory 12-095 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XML elements within a TeXML file.
Repressive Ecuador odd choice for WikiLeaks’ Julian Assange’s … – Fox News
Repressive Ecuador odd choice for WikiLeaks ' Julian Assange's ...
President Correa, Please Protect Julian Assange From My … – Huffington Post (blog)
Zee News President Correa, Please Protect Julian Assange From My ... Huffington Post (blog) WikiLeaks has made a tremendous contribution to exposing U.S.
Wikileaks Julian Assange tells iPhone, Blackberry and Gmail users … – Mirror.co.uk
Mirror.co.uk Wikileaks Julian Assange tells iPhone, Blackberry and Gmail users ... Mirror.co.uk WikiLeaks founder Julian Assange has warned smartphone and email users:
House debating RCC motion: Motion is smokescreen to hide … – Times of Malta
House debating RCC motion: Motion is smokescreen to hide ... Times of Malta That meeting was not revealed for two years, until Wikileaks published a document ... This motion, he said, stemmed from a document leaked by Wikileaks which ..
Hacked companies fight back with controversial steps
(Reuters) - Frustrated by their inability to stop sophisticated hacking attacks or use the law to punish their assailants, an increasing number of U.S. companies are taking retaliatory action. Known in the cyber security industry as "active defense" or "strike-back" technology, the reprisals range from modest steps to distract and delay a hacker to more controversial measures.
UK hacking suspect will fight extradition to US
The lawyer for a British suspect linked to the Lulz Security hacking collective said Friday that she'd fight any moves to have her client tried in an American court.
Julian Assange Loses Another Round in Fight Against Extradition – The Epoch Times
The Epoch Times Julian Assange Loses Another Round in Fight Against Extradition The Epoch Times WikiLeaks founder Julian Assange's bid to reopen his case against extradition from the U.K. to Sweden was turned down on Thursday.