Zero Day Initiative Advisory 12-095 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XML elements within a TeXML file.

House debating RCC motion: Motion is smokescreen to hide … Times of Malta That meeting was not revealed for two years, until Wikileaks published a document … This motion, he said, stemmed from a document leaked by Wikileaks which ..

(Reuters) – Frustrated by their inability to stop sophisticated hacking attacks or use the law to punish their assailants, an increasing number of U.S. companies are taking retaliatory action. Known in the cyber security industry as “active defense” or “strike-back” technology, the reprisals range from modest steps to distract and delay a hacker to more controversial measures.

The Epoch Times Julian Assange Loses Another Round in Fight Against Extradition The Epoch Times WikiLeaks founder Julian Assange's bid to reopen his case against extradition from the U.K. to Sweden was turned down on Thursday.