Free Republic 1st Quarter Fundraising Target: $88,000 Receipts & Pledges to-date: $19,365
22%  
Woo hoo!! And the first 22% is in!! Thank you all very much!!

Keyword: exploit

Brevity: Headers | « Text »
  • Pro-Abortion Democrat (Leaky Leahy) Shockingly Admits Abortion is Used to Exploit Women

    03/22/2017 4:58:20 PM PDT · by Morgana · 11 replies
    life news ^ | march 22, 2017 | Micaiah Bilger
    U.S. Senator Patrick Leahy appeared to be trying to support abortion during his questioning of U.S. Supreme Court nominee Neil Gorsuch on Wednesday. It may not have been intentional, but the Vermont Democrat’s testimony actually reinforced a pro-life point about how abortion often is used to exploit women. Leahy brought up a personal experience he had before Roe v. Wade with an abortionist who botched a young woman’s abortion and nearly killed her, along with her unborn child. That abortionist, he said, was Nazi-trained. The Washington Examiner reports: He discussed a case in which he, as a state’s attorney in...
  • Exploit that caused iPhones to repeatedly dial 911 reveals grave cybersecurity threat, say experts

    03/06/2017 1:01:17 PM PST · by Swordmaker · 16 replies
    9 to 5 Mac ^ | March 6, 2017 | By Ben Lovejoy
    We reported back in October on an iOS exploit that caused iPhones to repeatedly dial 911 without user intervention. It was said then that the volume of calls meant one 911 center was in ‘immediate danger’ of losing service, while two other centers had been at risk – but a full investigation has now concluded that the incident was much more serious than it appeared at the time.It was initially thought that a few hundred calls were generated in a short time, but investigators now believe that one tweeted link that activated the exploit was clicked on 117,502 times, each...
  • Vulnerability Exploitable via Printer Protocols Affects All Windows Versions

    07/13/2016 9:34:12 PM PDT · by Utilizer · 4 replies
    Softpedia ^ | Jul 12, 2016 21:05 GMT | Catalin Cimpanu
    Microsoft has patched today a critical security vulnerability in the Print Spooler service that allows attackers to take over devices via a simple mechanism. The vulnerability affects all Windows versions ever released. Security firm Vectra discovered the vulnerability (CVE-2016-3238), which Microsoft fixed in MS16-087. At its core, the issue resides in how Windows handles printer driver installations and how end users connect to printers. Exploit executes payload under SYSTEM user By default, in corporate networks, network admins allow printers to deliver the necessary drivers to workstations connected to the network. These drivers are silently installed without any user interaction and...
  • HummingBad: Chinese malware infects 10 million Android devices, experts warn

    07/05/2016 8:03:35 PM PDT · by Utilizer · 6 replies
    News (.com .au) ^ | July 6, 201611:31am (AUS) | Matthew Dunn
    Cybersecurity specialist Check Point has been tracking the malware called HummingBad since its discovery in February and claim there has been a spike in infected devices. In a new report, Check Point said the malware was a multistage attack chain with two main components, which first infected Androids when people visited certain websites. “The first component attempts to gain root access on a device with a rootkit [software] that exploits multiple vulnerabilities. If successful, attackers gain full access to a device,” the report read. “If rooting fails, a second component uses a fake system update notification, tricking users into granting...
  • Windows 10 zero day selling for $90,000 (how exploits are marketed on crime forums)

    06/01/2016 6:17:10 AM PDT · by dayglored · 9 replies
    The Register ^ | Jun 1, 2016 | Darren Pauli
    A Windows zero day vulnerability granting hackers deeper access to compromised machines is being sold for US$90,000. The local privilege escalation vulnerability is being sold on crime forum exploit.in and promises to help attackers who already have access to hacked machines. Seller BuggiCorp claims in a sales thread and proof-of-concept videos that the local privilege escalation works on Windows systems from version 2000 to the considerably more secure 10. It works in the presence of Microsoft's lauded enhanced mitigation toolkit which introduces many security features baked into Windows 10 to older platforms. Researchers from Trustwave's Spiderlabs team, who found the...
  • Hot Potato exploit mashes old vulns into Windows System 'sploit

    01/24/2016 7:36:54 PM PST · by Utilizer · 10 replies
    The Register ^ | 20 Jan 2016 at 08:39 | Darren Pauli
    Shmoocon Foxglove Security bod Stephen Breen has strung together dusty unpatched Windows vulnerabilities to gain local system-level access on Windows versions up to 8.1. The unholy zero-day concoction, reported to Microsoft in September and still unpatched, is a reliable way of p0wning Windows for attackers that have managed to pop user machines. Breen released exploit code for his attack dubbed Hot Potato following his talk at the Shmoocon conference in Washington over the weekend. "Hot Potato takes advantage of known issues in Windows to gain local privilege escalation in default configurations, namely NTLM relay -\- specifically HTTP-SMB relay - and...
  • Netgear router exploit detected

    10/09/2015 10:56:42 PM PDT · by WhiskeyX · 17 replies
    BBC ^ | 9 October 2015 | Chris Baraniuk, Technology reporter
    A security researcher in the US has said his Netgear router was hacked after attackers exploited a flaw in the machine. Joe Giron told the BBC that he discovered altered admin settings on his personal router on 28 September. The compromised router was hacked to send web browsing data to a malicious internet address. Netgear says the vulnerability is "serious" but affects fewer than 5,000 devices. Mr Giron found that the Domain Name System (DNS) settings on his router had been changed to a suspicious IP address. "Normally I set mine to Google's [IP address] and it wasn't that, it...
  • Rivlin: Radicals Have Hijacked Ramadan

    07/05/2015 3:39:52 PM PDT · by Eleutheria5 · 8 replies
    Arutz Sheva ^ | 5/7/15 | Yaakov Levi
    At an event marking the end of the Ramadan fast on Sunday, President Reuven Rivlin spoke with Arabic language mediaand discussed a number of issues, chief among them the relations between Arabs and Jews in Israel. At the outset, Rivlin noted that both Jews and Muslims had fasted on Sunday – the latter for Ramadan, and the former for the Seventeenth Day of Tammuz, commemorating the events leading up to the destruction of the Holy Temples in Jerusalem. A common fast, said Rivlin, could help build a bridge to understanding to both communities. “I am aware of the distress and...
  • Microsoft won't fix Internet Explorer zero-day

    06/26/2015 7:36:19 PM PDT · by Utilizer · 47 replies
    iTnews (AUS) ^ | Jun 24, 2015 9:27 AM (AUS) | Allie Coyne, Juha Saarinen
    HP researchers have published details and proof-of-concept exploit code for a number of zero-day vulnerabilities in Microsoft's Internet Explorer web browser which allow attackers to bypass a key exploit mitigation. The researchers - part of HP's zero-day initiative team - have a policy to only disclose details of bugs reported to vendors after patches are issued. But the team decided to go public after being informed by Microsoft that it did not intend to fix the bugs as the company feels the vulnerabilities don't affect enough users. The flaws were serious enough, however, for Microsoft to earlier award the HP...
  • Remote exploit vulnerability in bash CVE-2014-6271

    09/25/2014 10:47:12 AM PDT · by zeugma · 26 replies
    CSOonline ^ | Sep 24, 2014 | Dave Lewis
    A remotely exploitable vulnerability has been discovered by Stephane Chazelas in bash on Linux and it is unpleasant. The vulnerability has the CVE identifier CVE-2014-6271 and has been given the name Shellshock by some. This affects Debian as well as other Linux distributions. You will need to patch ASAP. Bash supports exporting shell variables as well as shell functions to other bash instances. This is accomplished through the process environment to a child process.  The major attack vectors that have been identified in this case are HTTP requests and CGI scripts.  From Akamai:  Akamai has validated the existence of the vulnerability...
  • This thumbdrive hacks computers. “BadUSB” exploit makes devices turn “evil”

    07/31/2014 10:16:53 AM PDT · by Utilizer · 18 replies
    ars technica ^ | July 31 2014, 6:21am -0700 | Dan Goodin
    This thumbdrive hacks computers. “BadUSB” exploit makes devices turn “evil” Per FR posting rules, ars technica can not be posted, so a link to the article referring to USB thumbdrives hacking computers is listed instead. Ignore the "source url", it just points back to the FR website. Article here: http://arstechnica.com/security/2014/07/this-thumbdrive-hacks-computers-badusb-exploit-makes-devices-turn-evil/
  • Microsoft patches Internet Explorer bug for Windows XP

    05/02/2014 6:29:50 AM PDT · by JoeProBono · 8 replies
    telegraph ^ | 02 May 2014 | Sophie Curtis
    Microsoft has issued a patch for a security vulnerability in Internet Explorer to all versions of Windows, including Windows XP, despite claiming it would release no more patches for the outdated operating system after 8 April 2014. Earlier this week, both the UK and US governments advised citizens to consider using alternatives to Microsoft’s Internet Explorer browser, after the company discovered a vulnerability that could allow hackers to gain access to users' computers and steal their data. The vulnerability made headlines because it coincided with the end of support for Windows XP, meaning that anyone still running the 13-year-old operating...
  • MS Windows Local Privilege Escalation Zero-Day in The Wild

    11/30/2013 10:10:25 AM PST · by Utilizer · 35 replies
    fireeye ^ | November 27, 2013 | Xiaobo Chen and Dan Caselden
    FireEye Labs has identified a new Windows local privilege escalation vulnerability in the wild. The vulnerability cannot be used for remote code execution but could allow a standard user account to execute code in the kernel. Currently, the exploit appears to only work in Windows XP. This local privilege escalation vulnerability is used in-the-wild in conjunction with an Adobe Reader exploit that appears to target a patched vulnerability. The exploit targets Adobe Reader 9.5.4, 10.1.6, 11.0.02 and prior on Windows XP SP3. Those running the latest versions of Adobe Reader should not be affected by this exploit. Post exploitation, the...
  • Democrats Love to Exploit Sandy Hook Atrocities (Video)

    04/02/2013 8:21:17 PM PDT · by publius321 · 5 replies
    Innocent lives mean Nothing to Obama, Pelosi, Reed, Schumer, Franken & Wasserman Schultz. They are lovers of death and have the blood of 50 million innocent babies on their hands. Their blood lust is insatiable and they rejoice inside when these murders occur. They may not directly cause them but they probably would as often as possible if they were certain they would get away with it... (Video)
  • Child Abuse & The Obama Campaign

    10/30/2012 8:51:07 PM PDT · by publius321
    Some troubling observations & "Jonesian" similarities. (video)
  • Zagat trying to exploit 9/11 for profit

    09/10/2011 8:50:12 AM PDT · by NowApproachingMidnight · 5 replies
    Email | 9/10/11 | Self
    9/11: Stories of Courage, Heroism and Generosity We are pleased to announce 9/11: Stories of Courage, Heroism and Generosity with an introduction from Tim Zagat, Co-founder and CEO of Zagat Survey, along with contributions from former New York City Mayor Rudy Giuliani and former New York Governor George Pataki. Upon reflection of the 9/11 attacks, the random acts of kindness displayed by selfless individuals are too often overlooked. As the 10-year anniversary of this fateful day approaches, Zagat honors these heroes for their contributions to rebuilding and uniting a country in the wake of destruction. Order Now: Regular Price: $24.95...
  • Warning: E-mail virus spreading (DHS investigating?)

    09/09/2010 1:57:15 PM PDT · by Rutles4Ever · 35 replies
    Twitter ^ | 09/09/2010 | Jason Ryan
    "Here You Have" Virus Email spreading. DHS US-CERT Computer Emergency Readiness Team looking into issue. will issue bulletin.
  • "Millions" Of Home Routers Vulnerable To Web Hack

    07/16/2010 9:38:35 AM PDT · by ShadowAce · 18 replies · 3+ views
    Forbes ^ | 13 July 2010 | Andy Greenberg
    The upcoming Black Hat security conference in Las Vegas offers an annual parade of security researchers revealing new ways to break various elements of the Internet. But few of the talks have titles quite as alarming as one on this year's schedule: "How to Hack Millions of Routers."Craig Heffner, a researcher with Maryland-based security consultancy Seismic, plans to release a software tool at the conference later this month that he says could be used on about half the existing models of home routers, including most Linksys, Dell, and Verizon Fios or DSL versions. Users who connect to the Internet through...
  • IBM unleashes virus on AusCERT delegates

    05/21/2010 8:14:34 PM PDT · by smokingfrog · 11 replies · 527+ views
    itnews.com.au ^ | May 21, 2010 | Nate Cochrane
    Malware-infected USB key the culprit. Delegates to AusCERT, Australia's premier information security event held this week on the Gold Coast, have taken home a little of the stuff they spent the week agonising over - a virus. In an email this afternoon, IBM advised visitors to its AusCERT booth that its complimentary USB key was infected with a virus. An IBM spokesman and conference organisers confirmed the email was genuine. It is the second time in two years that clumsy exhibitors have infected their customers with viruses. "At the AusCERT conference this week, you may have collected a complimentary USB...
  • Arianna Huffington Exploits Coal Mining Tragedy, Cries for Bigger Government

    04/14/2010 7:17:56 AM PDT · by 198ml · 23 replies · 491+ views
    Newsbusters ^ | 04/14/10 | Anthony Kang
    The co-founder of progressive blog The Huffington Post, Arianna Huffington, has attributed the West Virginia mining disaster, along with virtually every other accident under the sun, as a direct result of small-government and corporate greed in the April 13 Huffpo column "The West Virginia Mining Disaster and the Financial Crisis Have the Same Root Cause." "Officials say it's too soon to pinpoint the exact cause of the tragic explosion at the Upper Big Branch mine in West Virginia that took the lives of 29 miners, but we certainly know enough to identify the root cause," Huffington began. "It's the same...