Search Results

When a system compromise Trojan.Rodricter virus exploits a vulnerability CVE-2012-4681. The company “Doctor Web” reports on the distribution of malware Trojan.Rodricter, which at breaking the system exploits a vulnerability CVE-2012-4681 in the JRE. Recall that on 26 August, the company FireEye, Atif Mushtaq announced the active exploitation of this vulnerability. The expert also noted that […]

Security Explorations: security vulnerability has been discovered in an update, Java 7 Specialists in IT security of the Polish company Security Explorations reported finding security vulnerabilities in Java 7, an update, released less than a day ago. The company says that can be exploited to bypass the “sandbox” Java and execute potentially malicious code on […]

0-Day vulnerability in Flash Player will not be fixed in Windows 8 to 26 October this year. Adobe has confirmed the information that the operating system Windows 8, which is currently in beta stage of development, is vulnerable to many known vulnerabilities in Flash. These vulnerabilities are not removed before the official release of the […]

The company Panda Security announced the release of a new version of Panda Cloud Office Protection 6.70. This new version provides the technological and functional enhancements that can help small and medium businesses oppose increasing number of cyber attacks. According to PandaLabs, the research laboratory of Panda Security, cyber attacks on the networks of small […]

French company Vupen Security announced the successful creation of an exploit for Windows 8, connected by a chain of many 0-day vulnerabilities in Windows 8 and Internet Explorer 10. Naturally, the company does not intend to provide information on vulnerabilities in Microsoft. The business model Vupen Security, the firm sells oday-vulnerabilities and exploits customers among […]