Judge in WikiLeaks case lets 2 charges stand – Kansas City Star
Judge in WikiLeaks case lets 2 charges stand Kansas City Star Prosecutors say the now 24-year-old Manning gave hundreds of thousands of classified diplomatic cables and war logs to the secret-sharing website WikiLeaks . Lawyers for Manning and the government on Monday began a five-day hearing to discuss a ...
WikiLeaks case focuses on Manning’s ‘intent’ – DAWN.com
DAWN.com WikiLeaks case focuses on Manning's 'intent' DAWN.com 28808520http%3A%2F%2Fdawn.com%2F2012%2F07%2F17%2Fwikileaks-case-focuses-on-mannings-intent%2F WikiLeaks +case+focuses+on+Manning%27s+%27intent%272012-07-17+04%3A16%3A09Affan+Tajhttp%3A%2F%2Fdawn.com%2F%3Fp% ...
CPU cache controller bug exploit (Remote code exec mod poc)
This bug won’t be updated unless...
Zero Day Initiative Advisory 12-125
Zero Day Initiative Advisory 12-125 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
Forensic Analysis Of iPhone Backups
This article explains the technical procedure and challenges involved in extracting data and artifacts from iPhone backups.
WikiLeaks says it has obtained 2.4 million emails from Syria, claims … – Fox News
Neon Tommy WikiLeaks says it has obtained 2.4 million emails from Syria, claims ...
strongSwan IPsec Implementation 5.0.0
strongSwan is a complete IPsec implementation for the Linux, Android, Maemo, FreeBSD, and Mac OS X operating systems. It interoperates with with most other IPsec-based VPN products via the IKEv2 or IKEv1 key exchange protocols. The focus of the strongSwan project is on strong authentication mechanisms using X.509 public key certificates and optional secure storage of private keys on smartcards through a standardized PKCS#11 interface
Apple QuickTime TeXML Stack Buffer Overflow
This Metasploit module exploits a vulnerability found in Apple QuickTime.
Zero Day Initiative Advisory 12-108
Zero Day Initiative Advisory 12-108 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
Zero Day Initiative Advisory 12-109
Zero Day Initiative Advisory 12-109 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file