Exploit+data

Showing results 1 to 20 of 24

Report Inverter for Excel

Report Inverter for Excel is an add-in that enables you to convert text reports into a data table by using a true user-friendly interface....

January 3, 2011 by Databilio

New exploit found in PSN restore

Just days after most services for the PlayStation Network (PSN) were brought back online, it appears a new exploit has been discovered that allows hackers to change users' passwords with the data stolen during the break-in to the service last month.

May 18, 2011 by

Apple patches iPhone SMS flaw

Apple has plugged an SMS flaw that would enable an attacker to take complete control over an iPhone.Researchers Charlie Miller and Collin Mulliner said at the Black Hat security conference that an attacker could use the SMS exploit to make calls, swipe data and send text messages.

July 31, 2009 by

Attackers pounce on Microsoft PowerPoint zero-day

Attackers are using rigged PowerPoint files to exploit an unpatched vulnerability in Microsoft's presentation software, according to warning late Thursday from the software maker.In a pre-patch advisory, Microsoft described the attacks as "limited and targeted," the kind of language that suggests it is being used to steal data from corporate or government networks.

April 2, 2009 by

Microsoft confirms Word attacks

Microsoft has confirmed reports of vulnerability in Word that allows an attacker to exploit a system via the Microsoft Jet Database Engine, which shares data with Access, Visual Basic and third party applications.Microsoft in its advisory said the potential for attack is "very limited.

March 23, 2008 by

IBM and Kapow on how enterprises exploit application mashups and lightweight data access

This current wave is really driven by line of business getting IT in their own hands. They’ve started using it, and that’s created the chaos, but chaos is created because there is a need. The best thing that’s happening now is acknowledging that line-of-business people need to do their own thing. We need to give them the tools, environments and infrastructure so they can do it in a controlled way -- in an acceptable, secured way.

January 17, 2008 by

Developing enterprise applications for mobile devices remains way too hard

These nifty clients should go quite a way to making enterprise mobility far easier by allowing developers to exploit them with fewer interface and connectivity variables to manage. But the converged client still needs a back-end or middleware counterpart to help coordinate an enterprise's data, logic, and security needs. Sybase is hard at work on what may prove to be a game changer for such enterprise mobility middleware -- especially when coupled with a converged device such as the iPhone.

September 21, 2007 by

Guide to hardware-based DEP protection

When the WMF exploit hit the wild and existing workarounds were tacky and the official Microsoft patch a week away, the DEP or Data Execution Prevention feature shined through when it was completely enabled and supported by NX or XD capable hardware.  While NX and XD also support other operating systems like Windows 2003 Server with SP1, BSD, and Linux, the vast majority of users will use it through Windows XP SP2.

January 22, 2006 by

Update on WMF exploit

Some new approaches have emerged for reducing the risk of being affected by this exploit. One approach involves using Data Execution Prevention (DEP).

December 29, 2005 by

Experts warn of IE Gopher hole

A security company says Gopher, a nearly obsolete protocol for fetching data on remote servers but still supported by IE, can be used to exploit a buffer overflow bug.

June 5, 2002 by

TI chief: Keep it simple

Mobile device makers should exploit multimedia for added features - but not too much, says Texas Instruments' chief executive. It's all about access to data

May 1, 2001 by

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories