New Europe US Congressmen influence EU Commission on Wikileaks New Europe According to Julian Assange of Wikileaks earlier this week, WikiLeaks released European Commission documents showing that, “Senator Lieberman and Congressman Peter T. King directly influenced decisions by PayPal, Visa and MasterCard to block …
Tags:
energy,
julian-assange,
tools,
wikileaks
Posted by deepcore under
Apple,
exploit,
facebook,
iphone,
m$,
OSX security tools,
Privacy,
Security,
tools,
twitter,
XSS (
No Respond)
This Metasploit module exploits a buffer overflow in Apple QuickTime 7.7.2. The stack based overflow occurs when processing a malformed Content-Type header. The module has been tested successfully on Safari 5.1.7 and 5.0.7 on Windows XP SP3.
Tags:
exploit,
Security,
tools,
twitter
Posted by deepcore under
Apple,
exploit,
facebook,
iphone,
m$,
OSX security tools,
Privacy,
Security,
software,
tools,
twitter,
XSS (
No Respond)
Apple WGT Dictionnaire version 1.3 suffers from a script code injection vulnerability.
Tags:
Apple,
Security,
tools,
Vulnerability
Posted by deepcore under
Apple,
exploit,
facebook,
iphone,
m$,
OSX security tools,
Privacy,
Security,
tools,
twitter,
XSS (
No Respond)
This Metasploit module exploits a vulnerability found in Apple QuickTime.
Tags:
Security,
twitter,
ubuntu
Posted by deepcore under
Apple,
exploit,
facebook,
iphone,
m$,
OSX security tools,
Privacy,
Security,
tools,
twitter,
XSS (
No Respond)
The Twitter 5.0 application for iPhone grabs images over HTTP and due to this, allows for a man in the middle attack / image swap. Proof of concept included.
Tags:
Apple,
iphone,
ubuntu
Posted by deepcore under
Apple,
exploit,
facebook,
iphone,
m$,
OSX security tools,
Privacy,
Security,
tools,
twitter,
XSS (
No Respond)
Apple QuickTime versions 7.7.2 and below suffer from a buffer overflow vulnerability in the handling of TGA files.
Tags:
Apple,
exploit,
linux,
Security,
Vulnerability
Posted by deepcore under
Apple,
exploit,
facebook,
iphone,
m$,
OSX security tools,
Privacy,
Security,
tools,
twitter,
XSS (
No Respond)
Zero Day Initiative Advisory 12-185 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Mac OSX. Authentication is not required to exploit this vulnerability.
Tags:
Apple,
iphone,
Security,
twitter,
xss
Guidelines for Pentesting a Joomla Based Site
Tags:
facebook,
obj-endobj,
papers,
sxx,
tools
The Spy Who Hacked Me The UCSD Guardian Online His mysteous force wages a secret war against MI6 using the anonymity of the Internet, with plenty of allusions to modern day cyberterrorism and WikiLeaks in tow. Bardem's golden blonde hair bears more than a passing resemblance to WikiLeak's …
Tags:
anonymous,
internet,
lifestyle,
tools,
wikileak
The New York Review of Books (blog) Cambodian Foreign Minister Hor Nam Hong in Phnom Penh, August 6, 2010 The New York Review of Books (blog) Third, regarding a 2002 US Embassy cable released by WikiLeaks last summer, His Excellency Hor Nam Hong has already sent a letter of protest to US Secretary of State Hillary Clinton on 18 July, 2011.
Tags:
article,
classifieds,
hacker,
Security,
twitter