Home Code Snippets Oracle Reference Oracle Functions Oracle Error Codes Forum Oracle Jobs Oracle Blogs

Tag Archives: exploit

Brand New Flash Vulnerability “in the wild”

Adobe late Friday warned that attackers are exploiting a "critical vulnerability" in the company's most widely-used software: Flash Player and Adobe Reader. The zero-day vulnerability is similar to one Adobe patched in July 2009. Amusingly, this one comes just days after the company's head of security admitted that hackers have its software in their crosshairs. […]

Posted in General | Also tagged , , Comments Off

Another Exploit Just For Facebook

It seems like Facebook is the hacking community's wet dream, the sunny playland that's always packed with childlike users who are easily convinced to hand over the keys to their privacy and security. For about the last day or so a series of attacks have exploited Facebook's 'Like' feature through a simple clickjacking exploit. Using […]

Posted in Uncategorized | Also tagged , Comments Off

A Fun New Exploit Called “Tab-napping”

Named with a nod to the word "kidnapping", Brian Krebs details a nifty new exploit that's bound to make it's way to your browser sooner or later. This new phishing exploit relies on user inattention and your trust in browser tabs, and  is likely to fool even the most security-savvy web surfers. Mozilla Firefox creative […]

Posted in Uncategorized | Also tagged , , , 1 Comment

The Newest Hacking Threat: Rogue Subdomains

It seems that in their never-ending quest to find new ways to avoid detection, hackers have have ramped up the use of an exploit technique that has, up to now, not been widely used. The technique involves modifying a (compromised) site's DNS settings to use add "hidden" subdomains that serve up malware, either directly or […]

Posted in General | Also tagged , , Comments Off

Critical Flaw Found In Almost All Anti-Virus Software

From the Now-It's-Time-To-Panic department: The Register just published an article claiming that Matousec, a software security  testing service, has uncovered a relatively simple way to bypass nearly all antivirus software (McAfee, Trend Micro, AVG, BitDefender, and others).  The trick is based on sending non-malicious code to the antivirus driver hooks, and then swapping it out […]

Posted in Uncategorized | Also tagged , Comments Off

Gumblar Botnet Gets Trickier

A report from ThreatPost.com says the Gumblar botnet is shifting tactics in order to evade detection, but also to try and keep botnet researchers from obtaining and analyzing the new versions of Gumblar. Apparently, the newer versions perform a test to see what country a newly-infected machine is located in. This geolocation check happens during […]

Posted in General | Also tagged , , Comments Off

Little Bobby Tables

If you don't get the reference to the title of this post, maybe this will help: This probably made you laugh, but the "Little Bobby Tables" problem illustrates a real-world exploit that is used by hackers and malicious users every single day. The formal name for this kind of exploit is "SQL Injection", and it's […]

Posted in General | Also tagged , , , , 1 Comment