OverviewThis post explores an old but wonderful vulnerability that enables us to really showcase the (oft underestimated) power of the use-after-free vulnerability class.We’re going to take a ste
Day: May 5, 2017
Enlarge (credit: Sean Gallup / Getty Images)
The “Google Docs” phishing attack that wormed its way through thousands of e-mail inboxes earlier this week exploited a threat that ha
Enlarge (credit: Arp et al.)
Almost a year after app developer SilverPush vowed to kill its privacy-threatening software that used inaudible sound embedded into TV commercials to covertly tra
On Wednesday, Kenneth Lipp, a contributor to the Daily Beast, was doing what amounts to a random search on the security search engine Shodan when he discovered what appears to be a Web console for