• Hak5 - PDF Exploits
  • The Top 5 Exploits in WoW
  • The Force Feed - Game Exploits Sexually Frustrated Men
  • Black Ops 2: Exploiting Flaws (41 Kill TDM)

Archive for the ‘exploits’ Category

11 August 2008 @ 10:43Steve Jobs confirms the iPhone application kill switch

Nick Wingfield with The Wall Street Journal gets confirmation that a plan is in place for Apple to remotely kill certain iPhone / iPod touch applications if they are found to be malicious. Mr. Jobs confirmed such a capability exists, but argued that Apple needs it in case it inadvertently allows a malicious program — [...]
Read the rest of this entry »

by | 2 comments | Tags: , , , , , ,
Posted in apple, exploits, iphone, ipod touch, security

23 June 2008 @ 16:29ARDAgent Vulnerability

Intego is reporting that Apple Remote Desktop (specifically ARDAgent) is vulnerable to a root exploit. This vulnerability takes advantage of the fact that ARDAgent, a part of the Remote Management component of Mac OS X 10.4 and 10.5, has a setuid bit set. Any user running such an executable gains the privileges of the user [...]
Read the rest of this entry »

by | Add a comment | Tags: , , , ,
Posted in exploits, security

3 April 2008 @ 8:16Protect yourself against phishing emails

If you were to ask people if they felt vulnerable to phishing scams, they would most likely tell you, “No.” However, if phishing emails were not profitable to someone, our inboxes would not be filled with them. I get a lot of phishing emails, and for the most part they are for companies and services [...]
Read the rest of this entry »

by | Add a comment | Tags: , , ,
Posted in email, exploits

6 March 2008 @ 8:12FireWire exploit available for Mac and Win

firewire.jpgThe latest exploit affects both Macs and Windows machines. The vulnerability lies in the way FireWire handles Direct Memory Access (DMA). Theoretically, this exploit could be extended to other I/O that use DMA. This exploit is apparently not new, but is receiving more attention due to the recent memory attacks demoed by a few Princeton [...]
Read the rest of this entry »

by | Add a comment | Posted in exploits, firewire, security

22 February 2008 @ 10:49Cold Boot Attacks on Encryption Keys

A group of Princeton computer scientists has published a paper(pdf) demonstrating a method for accessing a computer’s memory to gain access to encryption keys. Contrary to popular belief, RAM contents are not immediately erased once a computer is shut down. It can take 2.5 to 35 seconds for the data to fade away. This time [...]
Read the rest of this entry »

by | Add a comment | Posted in exploits, security

13 February 2008 @ 11:12Caller-ID spoofing

This article on Digg caught my attention, but in the end turned out to be less interesting than I had expected. To cut to the chase — Don’t trust the information in your caller-ID. The interesting part came from a commenter: I was a victim of this caller id spoofing just last week. Bank of [...]
Read the rest of this entry »

by | Add a comment | Posted in exploits, hack

21 December 2007 @ 8:15When Is a Brick Not a Brick?

When Computerworld says it’s a “brick”. Computerworld is reporting that an exploit has been found that affects HP and Compaq computers and results in the computer being “bricked”. According to the article, “the Software Update bugs let an attacker corrupt Windows’ kernel files, making the laptop unbootable, or with a little more effort, allow hacks [...]
Read the rest of this entry »

by | Add a comment | Posted in exploits, security

10 December 2007 @ 17:45Leopard Integer Overflow

Heise Security is reporting that a vulnerability has been found in the load_threadstack function in mach_loader.c when processing Mach-O binaries, which can lead to a kernel panic. Single user systems should not be at risk as the bug can only be exploited by users logged onto a system. The bug does, however, represent a problem [...]
Read the rest of this entry »

by | Add a comment | Posted in exploits, leopard

28 November 2007 @ 17:20A Sick Feeling in My Gut

Idiotic stuntOver the past week some Mac sites (four that I know of) were defaced by someone calling himself “malcor”. This, in turn, brought about some panic in the security and WordPress communities. A couple security firms blogged about the incident (Avert Labs, Blogvis.com) which only served to increase the awareness/panic. The so-called hacker named “malcor” [...]
Read the rest of this entry »

by | 6 comments | Posted in exploits, security, stupid

26 November 2007 @ 11:28QuickTime 7.3 Buffer Overflow Exploit

Secunia has issued a security advisory (SA27755) for a buffer overflow exploit in QuickTime and has labeled it as “extremely critical”. The vulnerability is caused due to a boundary error when processing RTSP replies and can be exploited to cause a stack-based buffer overflow via a specially crafted RTSP reply containing an overly long “Content-Type” [...]
Read the rest of this entry »

by | Add a comment | Posted in apple, exploits, security


1  2  3  4  5  6  7  8  9  10   Next >>  

Corman's World: Exploits of a Hollywood Rebel
Mfc: 20th Century Fox
Price: $22.99
Store:  J&R
Corman's greatest legacy might be the incredible roster of talent he nurtured: Scorsese, De Niro, Jonathan Demme, Bruce Dern, John...

Life and Exploits of a Jehovah
Mfc: Kessinger Publishing, LLC
Price: $24.95
Store:  Amazon
Introduction of a limited number of the ancient beliefs regarding Jehovah and his earthly representatives that are not to be found in the Christian Bi [more info..]


Mfc: Listening Library Audio
Store:  Amazon

Case Closed - The Exploits of Genius (Season 2 Vol. 1)
Mfc: Funimation Prod
Brand: FUNIMATION PRODUCTIONS, LTD
Price: $2.89
Store:  Amazon
Murder is in the air and life is cheap on the streets??? Luckily, Conan Edogawa finds value in the truth, and won???t let any bad deed go unpunished. [more info..]

Blue Jackets; or, Chips of the Old Block: A Narrative of the Gallant Exploits of British Seamen, and of the Principal Events in the Naval Service, ... of Her Most Gracious Majesty Queen Victoria
Mfc: Adamant Media Corporation
Price: $19.99
Store:  Amazon
This Elibron Classics book is a facsimile reprint of a 1854 edition by Grant and Griffith, London.

The Menopause Industry: How the Medical Establishment Exploits Women
Mfc: Hunter House
Price: $14.95
Store:  Amazon
Veteran health investigator Sandra Coney presents compelling evidence that how we perceive menopause is shaped and, in large measure, distorted by tho [more info..]

Frost on my Moustache: The Arctic Exploits of a Lord and a Loafer
Mfc: St. Martin's Griffin
Price: $13.68
Store:  Amazon
Guided by the fastidious journals of an eminent Victorian adventurer by the name of Lord Dufferin, Time Moore sets off to prove his mettle in the [more info..]

The Exploits of Arsene Lupin
Mfc: Wildside Press
Price: $11.64
Store:  Amazon
The first collection of Arsene Lupin's incredible exploits sets the stage for the later novels, with such classic crime adventures as: "The Arrest of [more info..]


Mfc: Da Capo Press
Store:  Amazon

Exploits and Adventures of Brigadier Gerard (New York Review Books Classics)
Mfc: NYRB Classics
Price: $15.29
Store:  Amazon
Having killed off Sherlock Holmes, Sir Arthur Conan Doyle began a new series of tales on a very different theme. Brigadier Gerard is an officer in Nap [more info..]

1  2  3  4  5  6  7  8  9  10   Next >>  
Sign up for PayPal and start accepting credit card payments instantly.

Staples Logo

Get fed!

rss icon subscribe to Geek stuff

rss icon Geek stuff in your inbox

Add the "Geek stuff" Google Gadget to your homepage

Add the "Daily Deals" Google Gadget to your homepage

Apparel

Search Amazon

Search Amazon.com
Search Amazon.co.uk

Recent Forum Topics

    Advert

    Web hosting by ICDSoft