Security Corner:

Zero-day exploit

1

October 23, 2010  11:21 PM

Bogus EFTPS Failure Notices are Result of AWeber Hack



Posted by: Ken Harthun
Hacking, spam, Spear phishing, Zero-day exploit, Zero-day vulnerability

I just got this from a friend of mine, Arindam Chakraborty, who is also a fellow Internet marketer: Warning About EFTPS Tax Phishing Emails!Like me and many, many other marketers, he uses AWeber Communications email...

December 16, 2008  9:21 PM

Microsoft Announces Out-of-band Patch for Zero-day Flaw



Posted by: Ken Harthun
Critical update, Internet Explorer, Microsoft Windows, Security, Security bulletin, Zero-day exploit, Zero-day vulnerability

Microsoft issued today "Microsoft Security Bulletin Advance Notification for December 2008." The actual security bulletin will be released on December 17, 2008:

Microsoft Security Bulletin Advance...


December 12, 2008  9:44 PM

Internet Explorer Targeted by Zero-day Attack



Posted by: Ken Harthun
Critical update, Firefox, Internet Explorer, Malware, Opinion, Remote Code Execution, Security, Security bulletin, Vulnerabilities, Zero-day exploit, Zero-day vulnerability

Even though Microsoft released the biggest batch of patches ever on Tuesday--28 flaws affecting Windows, Office, Internet Explorer, Visual Basic Active Controls and Windows Media Player, 23 of them rated “critical”--there's no fix for a zero-day XML parser vulnerability that surfaced the same...


October 29, 2008  3:04 PM

Opera Zero-day Vulnerability



Posted by: Ken Harthun
Browsers, Opera, Remote Code Execution, Security bulletin, Zero-day exploit, Zero-day vulnerability

Just as Opera completed patches for critical vulnerabilities in its browser, researchers discovered another remote code execution bug. In its recent article, "Opera scrambles to quash zero-day bug in...

Bookmark and Share     0 Comments     RSS Feed     Email a friend


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: