Day: October 29, 2013

Apache Magicka Code Execution

Apache and PHP remote command execution exploit that leverages php5-cgi…….


Irony alert: Intel to make quad-core 64-bit ARM chip

Intel will make quad-core chips for a customer that uses technology from rival chip designer ARM…….


LinkedIn execs downplay Intro security controversy

“We recognize the current climate and sensitivity around products like this,” admitted LinkedIn’s CEO…….


Ubuntu Security Notice USN-2009-1

Ubuntu Security Notice 2009-1 – Multiple memory safety issues were discovered in Firefox. If a user were tricked in to opening a specially crafted page, an attacker could possibly exploit these to cause a denial of service via application crash, or potentially execute arbitrary code with the privileges of the user invoking Firefox. Jordi Chancel…


Strap an iPhone to your head for a window into your mind

Neurocam is an iPhone and EEG headband that automatically records footage of things that interest you. Advertisers would love everyone to wear it…….


Adobe Breach Compromised Over 38 Million Users, Photoshop Source Code

rjmarvin writes “Adobe’s investigation into the massive data breach they were hit with this past August has revealed that over 38 million active users, not to mention inactive accounts, had their user IDs and passwords pilfered by hackers. An Adobe spokesperson confirmed the number, along with the theft of Adobe Photoshop source code. The initial…


Apple sued over alleged iMac screen dimming issues

New lawsuit that seeks class action says Apple’s 2009 to 2011 iMacs have an issue that causes one half of the screen to go dark, and that’s not covered under warranty…….


Man forgets he once bought $25 of Bitcoins — now worth $848K

A Norwegian man bought 5,000 Bitcoins in 2009. Suddenly, he wonders what they’re now worth. A lot, is the answer. In fact, he’s already bought an apartment with some of it…….


Red Hat Security Advisory 2013-1474-01

Red Hat Security Advisory 2013-1474-01 – The Simple Protocol for Independent Computing Environments is a remote display protocol for virtual environments. SPICE users can access a virtualized desktop or server from the local system or any system with network access to the server. SPICE is used in Red Hat Enterprise Linux for viewing virtualized guests…


Google+ boosts photo, chat features

The social network is flexing new photo and video muscles to lure in content creators. Also, Amazon sells cheap e-books with the MatchBook program…….