Articles about exploit

Sparrow Racing League Record Book To Be Fixed
Where there is a will, there is a way. No matter how good a programmer or developer is, there will certainly be some gamers out there who are proficient at pointing out flaws within the game’s system or environment, and exploit it to their benefit. Destiny players have figured out a loophole concerning the Sparrow Racing League Record Book, and obviously a fix from Bungie as soon as possible would […]

Google Glass Suffers First Exploit Giving Full Remote Access To Hackers
We’ve seen a lot of firsts for the Google Glass ever since Google released its Explorer Edition of the wearable specs to those who were willing to pay for them. We’ve seen a number of applications already become available, and some truly amazing life experiences caught through the power of Google Glass. Unfortunately, Google Glass has gone through another first we hoped would have taken a bit longer to occur: its first […]

Galaxy Note 2 Exploit Surfaces Using Ticker To Access Browser
Last week, we highlighted a video that showed a way the Samsung Galaxy Note 2’s homescreen can be exploited in order launch programs and directly dial some contacts on your phone, even though the process takes some quick finger work. The process is done through the emergency contacts area of the lock screen, and is once again being used to give access to portions of a locked Galaxy Note 2.The […]

HTML5 Exploit Can Allow Websites To Fill Up Your Hard Drive
Browsing websites on the Internet could be a great experience, depending on what kind of content you’re searching for. Conducting research for a term paper may not be as rewarding as browsing Reddit, but the process is still the same: input a website address, get to said website. But a recently revealed HTML5 exploit shows some websites can fill your computer’s hard drive with junk data. A lot of junk […]


GingerMaster Android malware exploits root access
Heads up Android users, it appears that yet another Android malware has been spotted and this one is apparently has the ability to gain root access on your device through a known exploit.

Adobe fixes Flash Player with an update
We know that Google was one of the first few developers to address the zero day expoit in Flash in their Chrome browser, but that left plenty of other people out there who do not use Chrome vulnerable to a potentially dangerous exploit. Good news then – Adobe has announced that they just rolled out an update for their Flash Player, where it will vanquish the critical security flaw once […]

HDCP Exploit Released And Is Capable Of Decrypting 1080p Video In Real-time
The HDCP exploit that surfaced recently has given birth to a new open-source software created by Rob Johnson, allowing users to be able to decrypt HDCP videos. The software will require a relatively powerful system, and the the developer claims that a high-end, multi-core 64-bit CPU will be able to decrypt 30FPS, 1080p content using two cores and about 1.6GB of RAM. Such a move would allow interested parties to […]

Twitter onMouseOver JavaScript Affecting
If you’re a user that accesses Twitter via the website you might want to take note of a rather serious JavaScript exploit that has affected the site at the moment. The JavaScript onMouseOver exploit means that if you hover your mouse over a specially crafted tweet, it will be able to redirect your browser to a website that contains malicious code, or in some cases, adult websites. The good […]

Microsoft working to fix hole in a 64-bit Windows 7 graphics display component
Microsoft is currently working hard to fix hole in a 64-bit Windows 7 graphics display component which could potentially be exploited by those with nefarious motives, where it is able to crash the system or even take control of the computer by running code remotely. This vulnerability affects 64-bit versions of Windows 7 and Windows Server 2008 R2, and Itanium-based Windows Server 2008 R2, and Microsoft hopes to have a […]

A Rather Unpleasant iPhone Security Threat Has Surfaced
Sure, we had a rather irritating “iPhone Rickrolling” issue a few months back, but that wasn’t all that harmful, not to mention you needed to jailbreak your iPhone and not change the default password for SSH to make it work. Now a more serious exploit has surfaced, involving security certificates. The iPhone allows settings and configuration files to be installed over-the-air through Safari, which is mainly used by enterprise businesses […]