21 Results for

aslr

Article

New zero-day vulnerability identified in all versions of IE

The flaw, which is being leveraged in "limited, targeted attacks," allows remote code execution, Microsoft warns.

By Apr. 27, 2014

Article

Android's Jelly Bean aims to be hard to hack

Google's latest Android mobile OS comes with features to divert hackers from installing malware that leads to information leakage, buffer overflows, and memory vulnerabilities.

By Jul. 17, 2012

Article

Stop using Microsoft's IE browser until bug is fixed, US and UK warn

In rare move that highlights severity of security hole in popular Internet Explorer, US Computer Emergency Readiness Team and UK counterpart say some IE users may want to "consider employing an alternate browser" till flaw is patched.

By Apr. 28, 2014

Article

New Apple guide details iOS security features

Quietly released guide outlines the security architecture, encryption, and data protection features on the mobile operating system.

By Jun. 1, 2012

Article

Microsoft defends IE8 following hacking contest

Microsoft stands behind the security and privacy of Internet Explorer 8 following a hacking contest that was able to exploit certain vulnerabilities in the browser.

By Mar. 29, 2010

Article

French researchers demo attack on Chrome

Security experts say they were able to bypass several security measures in Chrome running on Windows.

By May. 9, 2011

Article

New Internet Explorer weakness already exploited in attacks

Researchers say a previously unknown hole in IE has already been used to deliver a trojan in real-world attacks.

By Sep. 17, 2012

Article

New zero-day vulnerabilities found in Adobe Flash Player

Something similar to the zero-day exploit recently discovered in Adobe's Reader and Acrobat tools has been found for its Flash Player as well.

By Dec. 9, 2011

Article

IE8, Safari, iPhone, BlackBerry exploited in Pwn2Own contest

No efforts were made to attack Chrome, Firefox, Android, or Windows Phone 7 in the annual hacker contest at CanSecWest.

By Mar. 11, 2011

Article

Virtual PC hole could lead to attacks, security firm says

Microsoft is downplaying the problem, but Core Security says the vulnerability could allow an attacker to bypass security defenses to compromise virtualized Windows systems.

By Mar. 16, 2010