Video Games Are Making Us Too Comfortable With the Modern… – The New Republic
Video Games Are Making Us Too Comfortable With the Modern... The New Republic And while this mission looked and sounded real, an eerie precursor to WikiLeak's infamous “Collateral Murder” video, it came with built-in safeguards that immediately failed players who shot at civilians.
Good For Enterprise 2.2.2.1611 Cross Site Scripting
Good for Enterprise iOS application versions 2.2.2.1611 and below suffer from a cross site scripting vulnerability.
Apple Security Advisory 2013-09-20-1
Apple Security Advisory 2013-09-20-1 - Apple TV 6.0 is now available and addresses 57 different vulnerabilities.
Apple Security Advisory 2013-09-18-3
Apple Security Advisory 2013-09-18-3 - Xcode 5.0 is now available and addresses a security issue in Git. When using the imap-send command, git did not verify that the server hostname matched a domain name in the X.509 certificate, which allowed a man-in-the-middle attacker to spoof SSL servers via an arbitrary valid certificate. This issue was addressed by updating git to version 1.8.3.1.
Apple Security Advisory 2013-09-18-2
Apple Security Advisory 2013-09-18-2 - iOS 7 is now available and addresses Certificate Trust Policy, Core Graphics, Core Media, Data Protection, and various other issues and vulnerabilities.
Personal Address Book 2.0 File Upload
Personal Address Book version 2.0 for iOS suffers from an unauthenticated file upload vulnerability.
Apple Security Advisory 2013-09-06-1
Apple Security Advisory 2013-09-06-1 - AirPort Base Station Firmware Update 7.6.4 is now available and addresses a security issue. An associated client may be able to cause an unexpected base station system termination.
Revelations From Snowden White House "Black Budget" Leak – Bustle
Revelations From Snowden White House "Black Budget" Leak Bustle The leak is unprecedented, and the Post certainly won't have made any friends in the White House by leaking it: like every WikiLeak -esque disclosure of private intelligence, it will invite criticism that giving terrorists knowledge of antiterrorism ... and more
Packet Storm Exploit 2013-0827-1 – Oracle Java ByteComponentRaster.verify() Memory Corruption
The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program.