Home exploits
 

Keywords :   


Tag: exploits

Programmer exploits Windows vulnerability in cloud-based services

2013-09-13 14:32:21| InfoWorld: Top News

Windows data volumes (meaning virtual machine hard drives) in public clouds such as Amazon Web Services can be copied and have their access credentials modified, allowing a hacker to glean insights into the data, a programmer has reported.

Tags: services windows programmer vulnerability

 

Microsoft Xbox One Unboxing; IBM Exploits Human Brain; iPhone Shares Drop

2013-08-09 19:34:49| PC Magazine Desktops Product Guide

Topping tech headlines Thursday, Microsoft posts first Xbox One unboxing video, IBM draws inspiration from the human brain, and the iPhone loses ground to worldwide smartphone leader Android.

Tags: human microsoft drop xbox

 
 

Microsoft Xbox One Unboxing; IBM Exploits Human Brain; iPhone Shares Drop

2013-08-09 17:34:18| PC Magazine Cell Phones Product Guide

Topping tech headlines Thursday, Microsoft posts first Xbox One unboxing video, IBM draws inspiration from the human brain, and the iPhone loses ground to worldwide smartphone leader Android.

Tags: human microsoft drop xbox

 

Microsoft Xbox One Unboxing; IBM Exploits Human Brain; iPhone Shares Drop

2013-08-09 17:34:18| PC Magazine Notebooks Product Guide

Topping tech headlines Thursday, Microsoft posts first Xbox One unboxing video, IBM draws inspiration from the human brain, and the iPhone loses ground to worldwide smartphone leader Android.

Tags: human microsoft drop xbox

 

Researchers demo exploits that bypass Windows 8 Secure Boot

2013-08-02 14:00:19| InfoWorld: Top News

The Windows 8 Secure Boot mechanism can be bypassed on PCs from certain manufacturers because of oversights in how those vendors implemented the Unified Extensible Firmware Interface (UEFI) specification, according to a team of security researchers. The researchers Andrew Furtak, Oleksandr Bazhaniuk and Yuriy Bulygin demonstrated Wednesday at the Black Hat USA security conference in Las Vegas two attacks that bypassed Secure Boot in order to install a UEFI bootkit -- boot rootkit -- on affected computers.

Tags: windows secure demo researchers

 

Sites : [1] [2] [3] [4] [5] [6] [7] [8] next »