Tag: facebook

Appleexploitfacebookiphonem$OSX security toolsPrivacySecuritytoolstwitterXSS

Zed Attack Proxy 2.2.1 Mac OS X Release

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.
AndroidAppleDDOSfacebookiphonem$PrivacySecuritytwitterWikileak

Julian Assange bid for Senate seat fails – one percent of Victorians voted for him – TechGeek

TechGeek Julian Assange bid for Senate seat fails – one percent of Victorians voted for him TechGeek In other Senate races, the Wikileaks Party has made some traction but not enough to win a Senate seat. The party is polling at 0.81 percent of the total vote in New South Wales (with more than 68 percent of the votes counted, at the time of writing ...
AndroidApplebankingblackberryDDOSfacebookiphonem$PrivacySecuritysoftwaretoolstwitterWikileak

Julian Assange’s WikiLeaks Party Underwhelms Everyone With Australian … – Business Insider

Business Insider Julian Assange's WikiLeaks Party Underwhelms Everyone With Australian ... Business Insider While the votes in the Australian election are still coming in, it looks early enough to say that conservative Tony Abbott has trounced liberal Kevin Rudd — and that Julian Assange's specially formed Wikileaks Party may not have done very well at all ... Australian election: Landslide victory for Abbott, Assange may miss out on ...
Appleexploitfacebookiphonem$OSX security toolsPrivacySecuritytoolstwitterXSS

Packet Storm Advisory 2013-0827-1 – Oracle Java ByteComponentRaster.verify()

The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a memory corruption vulnerability that allows bypassing of "dataOffsets[]" boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file