The infamous worm is back, disguised as a Flash update purportedly needed for viewing a video distributed through direct messages on Facebook.
Malicious PDF files expert Didier Stevens posts a Proof of Concept showing he does not need to go through a vulnerability to run malicious code via a PDF file.
Researchers at McAfee have discovered that the Chinese hackers exploited a zero-day vulnerability found in Internet Explorer to conduct their attacks on Google and others.
A vulnerability has been reported in Adobe Reader and Acrobat, which can be exploited by malicious people to compromise a user's system.
pyrokinesis has discovered a vulnerability in Adobe Illustrator, which can be exploited by malicious people to compromise a user's system.
A critical flaw in the way that browsers handle Adobe Flash objects has been found by Mike Bailey of Foreground Security. Anyone who has Flash installed and visits a Website that allows for user content to be uploaded is vulnerable, even if the attacked site does not use Flash at all.
Websense Security Labs™ ThreatSeeker™ Network has detected that the site media-servers.net has been compromised and injected with malicious code. The Web site belongs to a high-profile advertiser on the Internet realm. It's important to note that media-servers.net serves advertising content from ad.media-servers.net, and that this site is clean. The injected code is part of an ongoing mass injection campaign that compromised thousands of legitimate Web sites. Websense Security labs have been tracking this campaign for months.