↧
Sure you can use my security context – exploit me!
I recently blogged about the fact that the initial reports of the Google Aurora attack focused on Internet Explorer version 6. Some comments on the Information Security Community Group on LinkedIn got...
View ArticleWhak-a-mole testing for Microsoft DLL exploit
HD Moore of Metasploit fame has created a tool to identify applications which exhibit the DLL hijack flaw about which Microsoft recently released a security advisory. This tool in HD Moore’s own words...
View ArticleDLL hole also affects EXE files
According to a Heise Media report, the DLL binary planting vulnerability is not just limited to DLL files but affects EXE files. The example given: An HTML file is saved along with a copy of a file...
View Article
More Pages to Explore .....