Recently, I posted a blog about analyzing PDF files. In that post, we covered some basics of the PDF format and…
Tag: vulnerability
Lock – Unlock, Biometrics Failure
I like gadgets, no, scratch that, I LOVE gadgets. With this in mind, I very often find myself an early adopter…
Linux Bank Trojan ‘Hand of Thief’ debuts
Sometimes it’s easy to forget that malware targets other Operating Systems besides Windows. However, it does exist, and is equally potent…
The Malware Archives: PDF Files
Chances are you’ve probably used Adobe Reader before to read Portable Document Format (PDF) files. Adobe Reader—formerly Acrobat Reader—remains the number…
Syrian Electronic Army Hacks Tango and Viber Servers
Over the last few days two popular VOIP apps, Tango and Viber, had their servers breached that compromised customer data and…
Tumblr Security Hole Reveals Passwords
Tumblr released an update for their iOS apps after a recently discovered security hole first reported by The Register discovered by one…
My Memory Isn’t What It Used To Be: Part 2
About a month ago, I wrote a blog post explaining how malware can use process memory to its advantage, changing dramatically…
UPDATE: New Android Vulnerability Affects 99 percent of Devices
Recently our Josh Cannell wrote about a troubling vulnerability that could exist in 99 percent of Android devices where malware could…
Microsoft Addresses Critical Vulnerabilities Tomorrow
Tomorrow on Patch Tuesday, Microsoft will be issuing security updates that address multiple vulnerabilities across several of its products. This information…
Hello Moto, do you really need all this info?
I was reading a fascinating blog entry by Ben Lincoln, a security professional, who in the course some security testing, stumbled…