President Correa, Please Protect Julian Assange From My … – Huffington Post (blog)
WikiLeak’s Assange Seeks Asylum at Ecuador Embassy in UK – International Business Times
Yahoo! News UK WikiLeak's Assange Seeks Asylum at Ecuador Embassy in UK International Business Times WikiLeaks ' founder Julian Assange has asked for political asylum at Ecuador's embassy in London and officials in the South American nation are considering …
Tags: anonymous, hacker, hhu, iphone, wikileakJulian Assange Loses Another Round in Fight Against Extradition – The Epoch Times
The Epoch Times Julian Assange Loses Another Round in Fight Against Extradition The Epoch Times WikiLeaks founder Julian Assange's bid to reopen his case against extradition from the U.K. to Sweden was turned down on Thursday.
Tags: blackberry, business, iphone, united-kingdom, wikileakApple Security Advisory 2012-06-12-1
Apple Security Advisory 2012-06-12-1 – Multiple vulnerabilities exist in Java, the most serious of which may allow an untrusted Java applet to execute arbitrary code outside the Java sandbox. Visiting a web page containing a maliciously crafted untrusted Java applet may lead to arbitrary code execution with the privileges of the current user
Tags: Apple, exploit, iphone, Security, VulnerabilitySecunia Security Advisory 49542
Apple Security Advisory 2012-06-11-1
Apple Security Advisory 2012-06-11-1 – iTunes 10.6.3 is now available and addresses multiple issues. Importing a maliciously crafted .m3u playlist may lead to an unexpected application termination or arbitrary code execution Description: A heap buffer overflow existed in the handling of .m3u playlists. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in WebKit.
Tags: iphone, Vulnerability, xssApple iTunes 10.6.1.7 M3U Playlist Buffer Overflow
Zero Day Initiative Advisory 12-077
Zero Day Initiative Advisory 12-077 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the QuickTimeVR.qtx component
Tags: Apple, iphone, tools, Vulnerability, xss