Showing results 1 to 9 of 9

Lucas Lepri No-Gi Part One

This App includes 90 minutes of expert bjj instruction!STEP UP YOUR GAME LIKE NEVER BEFORE! Learn the techniques that made Lucas Lepri...

January 20, 2015 By Digitsu

Adobe releases urgent Flash Player security update

Adobe has urged PC, Mac, Linux and Android users to download a critical update for Flash Player, in order to mitigate an attack that has already been reported in the wild.According to Adobe, various vulnerabilities in Flash Player "could cause a crash and potentially allow an attacker to take control of the affected system".

September 22, 2011 by

'Evil Maid' USB stick attack keylogs TrueCrypt passphrases

Security researcher Joanna Rutkowska has released a PoC (proof of concept) of a keylogger that is capable of logging TrueCrypt's disk encryption passphrase enabling the attacker to successfully decrypt the hard drive's content.Dubbed, the 'evil maid' attack due to its 'plug-and-exploit' functionality requiring 1-2 minutes for the infection process to the take place, works with the latest TrueCrypt versions 6.

October 19, 2009 by

Battlefield Shooting 3D

Your help is needed to win the war. You will try different types of gun, shoot enemy soldiers, attack bases and defend our positions....

December 25, 2014 By VAPPLICA

Microsoft confirms Word attacks

Microsoft has confirmed reports of vulnerability in Word that allows an attacker to exploit a system via the Microsoft Jet Database Engine, which shares data with Access, Visual Basic and third party applications.Microsoft in its advisory said the potential for attack is "very limited.

March 23, 2008 by

Nokia: Bluetooth flaw gnaws at phone security

Nokia has confirmed that some of its Bluetooth-enabled mobile phones are vulnerable to "bluesnarfing," in which an attacker exploits a flaw to read, modify and copy a phone's address book and calendar without leaving any trace of the intrusion. Networking and security company AL Digital said on Monday that it had discovered a security flaw in Bluetooth, a wireless data standard, that could allow such an attack.

February 9, 2004 by

Battlefield Shooting 3D

Your help is needed to win the war. You will try different types of gun, shoot enemy soldiers, attack enemy bases and defend our positions....

December 8, 2014 By Vahagn Sargsyan

Trinoo becomes a Trojan

The denial-of-service tool known as Trinoo has been ported to Windows 9x/2000, announced several security and antivirus companies this week. The new versionof Trinoo, which will install itself on a user's computer if the user opens the program, allows an attacker to use the computer to attack other networks with a deluge of data likethe one that downed Yahoo!

February 22, 2000 by

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories