Home exploits
 

Keywords :   


Tag: exploits

Obama: NSA to Disclose Security Exploits Except for 'National Security' Needs

2014-04-14 00:34:26| PC Magazine Security Product Guide

If the NSA discovers a big Internet exploit, the President has indicated that it should disclose the issue for the greater good except when there's a greater national security or law enforcement need.

Tags: national security needs disclose

 

New Hybrid Solar Device Exploits the Best of Both Worlds

2014-04-08 14:15:00| Climate Ark Climate Change & Global Warming Newsfeed

Scientific American: The two most common ways of generating power from the sun both have their drawbacks. Photovoltaic cells, which absorb photons from sunlight and convert them to electricity, operate with only 20 percent efficiency. That is because they can use only photons within a certain range of wavelengths to excite electrons. Solar-thermal systems, which turn sunlight into heat and then into electricity, are more efficient than photovoltaics--because they can use the entire solar spectrum, they can reach efficiencies...

Tags: of device hybrid solar

 
 

Firefox is still the least secure web browser, falls to four zero-day exploits at Pwn2Own

2014-03-17 14:09:23| Extremetech

At Pwn2Own 2014, an annual computer hackfest in Vancouver, Mozilla's Firefox has proven yet again that it's the least secure major web browser. While all four major web browsers -- Chrome, Internet Explorer, Firefox, and Safari -- were successfully exploited, for a grand total of $850,000 in prize money awarded to successful security researchers, Firefox was by far the least secure browser, racking up no less than four zero-day vulnerabilities. These vulnerabilities, if they were in the wild, would allow a hacker to do just about anything with your computer if you visited a specially crafted website.

Tags: to web browser secure

 

Report: Half of all exploits target Java

2014-03-06 14:19:13| InfoWorld: Top News

Once upon a time, Microsoft was the favorite target of malware developers. As Microsoft improved the defenses in its software, though, cybercrooks moved on to easier pickings. Adobe was a prime target for a while, but Adobe followed Microsoft's lead and made its software more secure as well. According to data from the 2014 IBM X-Force Threat Intelligence Quarterly Report, the favorite target is now Java.

Tags: report half target java

 

Security Firm Publishes Dual Snapchat Exploits

2013-12-27 20:54:08| PC Magazine Security Product Guide

An Australian security team this week published two new Snapchat exploits, claiming that hackers can easily get their hands on users' personal data and create hoards of dummy accounts.

Tags: security firm dual publishes

 

Sites : [1] [2] [3] [4] [5] [6] [7] [8] next »