WikiLeaks posts 400 gigabytes of encrypted ‘insurance’ data online – RT (blog)
What Could Be In Wikileak’s Giant 349GB ‘Insurance’ File? – Gizmodo Australia
What Could Be In Wikileak's Giant 349GB 'Insurance' File? Gizmodo Australia It's not uncommon for Wikileaks to post an encrypted “insurance” file from time to time, with the key to follow on a latter date if at all, just in case. But 349GB is nothing to sneeze at; that's a huge chunk of something.
Tags: australia, celebrity, gamesWikileaks Just Released A Massive ‘Insurance’ File That No One Can Open – Business Insider
Wikileaks Just Released A Massive 'Insurance' File That No One Can Open Business Insider You can download the files via torrent but since they are encrypted — and Wikileaks has not yet provided the key — you won't be able to open them. We can garner at least one thing of note from the file names alone: They probably have a very high … and more
Tags: banking, facebook, Security, small-businessWhat Could Be In Wikileak’s Giant 349GB "Insurance" File? – Gizmodo
Manning "demande pardon" pour les fuites de WikiLeaks – Le Nouvel Observateur
Le Nouvel Observateur Manning “demande pardon” pour les fuites de WikiLeaks Le Nouvel Observateur L'accusé de 25 ans a toujours reconnu avoir transmis 700.000 documents militaires et diplomatiques au site internet WikiLeaks qui les a publiés, mais il nie catégoriquement avoir voulu nuire aux Etats-Unis et dit avoir espéré provoquer un débat mondial.
Tags: Apple, twitter, wikileaksPacket Storm Advisory 2013-0813-1 – Oracle Java IntegerInterleavedRaster.verify()
The IntegerInterleavedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of “dataOffsets[0]” boundary checks. This vulnerability allows for remote code execution
Tags: javascript, Security, ubuntu, windowsPacket Storm Exploit 2013-0813-1 – Oracle Java IntegerInterleavedRaster.verify() Signed Integer Overflow
The IntegerInterleavedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of “dataOffsets[0]” boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program.
Tags: facebook, Security, twitter