27 Results for

metasploit

Article

Metasploit adds iPhone/iPod Touch hacks

Exploits are released based on a recent TIFF image-rendering flaw.

By Oct. 17, 2007

Article

Internet Explorer exploit release could trigger a surge in attacks

While Microsoft has yet to issue a permanent patch for a known exploit, the code could become widely available to cybercriminals after being integrated into an open-source testing tool.

By Oct. 1, 2013

Article

New Internet Explorer weakness already exploited in attacks

Researchers say a previously unknown hole in IE has already been used to deliver a trojan in real-world attacks.

By Sep. 17, 2012

Article

Microsoft offers advice to deal with IE security bug

With no fix available yet, Microsoft has a few words of wisdom for users who don't want to be bit by the newly-discovered bug.

By Sep. 18, 2012

Article

Skype for Mac requires manual update to fix security vulnerability

Pure Hacking's Gordon Maddern, a tech security writer, has uncovered a zero-day vulnerability affecting Mac users of the popular chat platform Skype.

By May. 9, 2011

Article

Microsoft to fix four holes in Windows, Office

Patch Tuesday for March will include a "critical" bulletin affecting Windows and "important" bulletins for Windows and Office.

By Mar. 3, 2011

Article

Microsoft explains seven-year patch delay

The software giant says that fixing the flaw earlier would have broken customer network applications.

By Nov. 13, 2008

Article

Microsoft warns about application security flaw

The software maker says that it is looking into an issue that may leave many Windows programs subject to an attack mechanism known as DLL preloading, or binary planting.

By Aug. 23, 2010

Article

Windows 7, Vista zero-day flaw reported

Security researcher says vulnerability in Windows 7 could lead to an attack causing a critical system error, or "blue screen of death."

By Sep. 8, 2009

Article

New Web exploit targets multiple platforms

While Windows, OS X, and Linux platforms may be affected, this effort is a crude and easily detectable attempt.

By Jul. 10, 2012