Skip to content

Gotham Security Daily Threat Alerts

by on March 11, 2013

March 8, Softpedia – (International) Flash, Adobe Reader and Java hacked on the second day of Pwn2Own 2013. Researchers participating in the Pwn2Own 2013 competition discovered vulnerabilities in Flash, Adobe Reader, and Java. Source: http://news.softpedia.com/news/Flash-Adobe-Reader-and-Java-Hacked-on-the-Second-Day-of-Pwn2Own-2013-335660.shtml

March 8, The Register – (International) Leaked: The ‘secret OAuth app keys’ to Twitter’s VIP lounge. The private OAuth login keys used by Twitter to get preferential access have been uploaded to Github, potentially allowing the impersonation of legitimate clients. Source: http://www.theregister.co.uk/2013/03/08/twitter_oauth_leaked_keys/

March 8, Softpedia – (International) XSS vulnerability identified in Google Fusion Tables. A researcher found a cross-site scripting (XSS) vulnerability in Google Fusion Tables that could allow attackers to trick users into clicking malicious links. Source: http://news.softpedia.com/news/XSS-Vulnerability-Identified-in-Google-Fusion-Tables-Video-335573.shtml

March 8, V3.co.UK – (International) Hidden data trick could be malware writer’s boon. A new technique was identified that could allow up to 94MB of data onto a hard drive’s reserved or system area, allowing malware or hidden information to be stored covertly. Source: http://www.v3.co.uk/v3-uk/the-frontline-blog/2253176/hidden-data-trick-could-be-malware-writers-boon

March 7, The H – (International) Report: Android is home to 96% of new mobile malware. F-Secure’s latest Mobile Threat Report found that Android accounted for 96% of new mobile threats. Source: http://www.h-online.com/security/news/item/Report-Android-is-home-to-96-of-new-mobile-malware-1818594.html

March 7, Network World – (International) Freezedroid: Researchers discover cold temps can unblock secured Android phones. Researchers found a security cracking technique that can allow information to be gleaned from encrypted Android devices by putting the devices in very cold environments and then using custom recovery software. Source: http://www.networkworld.com/news/2013/030713-frost-267492.html

From → Security

Comments are closed.

%d bloggers like this: