Home Code Snippets Oracle Reference Oracle Functions Oracle Error Codes Forum Oracle Jobs Oracle Blogs

Tag Archives: exploit

Twitter Exploit Soils The Internet

A security flaw is curently being exploited on Twitter, AKA The Confetti Of The Internet. Reportedly it's just blocking access to accessing user's Twitter home pages and also auto-retweeting the exploit code whenever you move your mouse over parts of the page. However, there have also been reports (not surprisingly) of the exploit being used […]

Posted in Uncategorized | Also tagged , , , Comments Off

A Vulnerability In IE8? I’m So Shocked!

A serious data-stealing vulnerability in IE8 has come to light, but it's not new- it's been quietly stealing data (possibly yours) since at least December 2009 (and perhaps much longer than that, too. Now, get ready to put on your "shocked face",  because it turns out that Microsoft has known about it for at least […]

Posted in Uncategorized | Also tagged , Comments Off

Lazy Programmer Creates QuickTime Vulnerability

Ruben Santamarta, a Spanish security researcher from Wintercore, published an article detailing a new vulnerability he's uncovered in Apple's QuickTime software. The beauty of this flaw is two-fold: it can bypass both ASLR and DEP in XP, Windows 7, and Vista so as to give an attacker complete control of a PC, and the bug […]

Posted in Uncategorized | Also tagged , Comments Off

Free Malware, Courtesy of Network Solutions

Sometimes you have to wonder if key people at large companies just are asleep at the switch, or if anyone is even at the switch. Or if there's even a switch to begin with. Word comes from Net-Security.org that Network Solutions, one of the largest registrars in the world, has been serving up heapin' helpings […]

Posted in Uncategorized | Also tagged , 1 Comment

Facebook Hacked Again? Say It Isn’t So!

Since news of new Facebook hacks continue to appear with the regularity of the rising Sun, we'll soon be changing the name of this blog to "Daily Facebook Hacks". Or maybe "Facebook Hack Of The Hour". Yes, gentle reader, shocking as it may be, another Facebook exploit was just announced. This time it's a spam […]

Posted in Uncategorized | Also tagged , , 1 Comment

At Siemens, We Just Don’t Care

Bad News for users of Siemens devices that run the WinCC operating system: Siemens deliberately made their system running WinCC deeply vulnerable, knew about the problem for 2 or more years, and made a command decision to do….nothing. That's right: Siemens built a seriously stupid vulnerability into their systems and then ignored it for over […]

Posted in Uncategorized | Also tagged , , Comments Off

Dude, You’re Getting A Trojan!

As an added (but unwanted) service, it appears that computer maker Dell is shipping motherboards that come pre-infected with a firmware-based trojan. Dell has confirmed that some of the firm's PowerEdge R410 server motherboards "contain spyware of unspecified function". "Dude, you're getting a Trojan!"

Posted in Uncategorized | Also tagged , , 1 Comment

YouTube Stung By HTML Injection Attack

YouTube users got a special treat on July 4th- a large-scale attack was done against thousands of pages on the site using a simple HTML injection vulnerability in the comment system. The attack caused effects such as blacked out pages with enormous text scrolling across them, blanked out pages, and lots of redirects to "shock […]

Posted in Uncategorized | Also tagged , , Comments Off

Basic Security Guidelines for Programming In Any Language

If you have a website, it's being attacked, probably on a daily basis. Looking at your server logs will almost undoubtedly show you many, many attempts at gaining entry by password-guessing bots or by repeated attempts to exploit your web forms. Expect that every form you use will be attacked mindlessly over and over by […]

Posted in Uncategorized | Also tagged , , , , Comments Off

Massive SQL Injection Attack Nails Sites Running IIS

There's a massive attack currently taking place that's targeting servers running Microsoft's IIS. The attack results in infecting the sites with a malicious script, and has already compromised "tens of thousands" of sites already, according to an article on threatpost.com. The attack was first noticed earlier this week and has  affected a number of high-profile […]

Posted in Uncategorized | Also tagged , , , Comments Off