exploit ▼


Galaxy Note 2 Exploit Surfaces Using Ticker To Access Browser

03/12/2013, Last week, we highlighted a video that showed a way the Samsung Galaxy Note 2′s homescreen can be exploited in order launch programs and directly dial some contacts on your phone, even though the process takes some quick finger work. The process is...

HTML5 Exploit Can Allow Websites To Fill Up Your Hard Drive

03/01/2013, Browsing websites on the Internet could be a great experience, depending on what kind of content you’re searching for. Conducting research for a term paper may not be as rewarding as browsing Reddit, but the process is still the same: input a...

Siri requires piracy on non-iPhone 4S devices

10/12/2011, You might think that the Dev Team is almighty when it comes to making everything and anything work with your iDevice, but bear in mind that just like how Hal Jordan in the 2011 movie Green Lantern put it, “We have a saying on earth, that is,...

GingerMaster Android malware exploits root access

08/19/2011, Heads up Android users, it appears that yet another Android malware has been spotted and this one is apparently has the ability to gain root access on your device through a known exploit.

Adobe fixes Flash Player with an update

03/22/2011, We know that Google was one of the first few developers to address the zero day expoit in Flash in their Chrome browser, but that left plenty of other people out there who do not use Chrome vulnerable to a potentially dangerous exploit. Good news then...

Adobe Flash under zero-day exploit shadow

03/15/2011, Adobe recently published a security advisory concerning a critical flaw that was unearthed in the latest Flash Player, where the vulnerability actually affects Flash Player for Windows, Mac OS X, Linux, Solaris, and Android platforms – now...

Hack Chrome and get $20k from Google (Pwn2Own)

02/03/2011, During the upcoming Pwn2Own hacking conference (March 9-11), Google will challenge hackers to break into its Chrome web browser, and reward success with a $20,000 check. In the previous edition, Internet Explorer and the iPhone, among other products, were...

Firesheep bypassed thanks to DIY defence

11/15/2010, Remember the Firesheep HTTP hijacker that is capable of sniffing out important and confidential information on another notebook over a public Wi-Fi network? Well, since news of it hit the stands, BlackSheep has proved to be one tried-and-tested line of...

Twitter onMouseOver JavaScript Affecting Twitter.com

09/21/2010, If you’re a user that accesses Twitter via the twitter.com website you might want to take note of a rather serious JavaScript exploit that has affected the site at the moment. The JavaScript onMouseOver exploit means that if you hover your mouse...

Adobe issues warning of Reader and Acrobat bug

09/08/2010, Adobe has fired a warning to users of its hugely popular Reader and Acrobat PDF viewing and creation software, touting that some malicious code out there has started to exploit an unpatched bug in both software after learning of the attacks yesterday....