malware
New Member
- Joined
- Nov 7, 2004
- Messages
- 5,422 (0.74/day)
- Location
- Bulgaria
Processor | Intel Core 2 Quad Q6600 G0 VID: 1.2125 |
---|---|
Motherboard | GIGABYTE GA-P35-DS3P rev.2.0 |
Cooling | Thermalright Ultra-120 eXtreme + Noctua NF-S12 Fan |
Memory | 4x1 GB PQI DDR2 PC2-6400 |
Video Card(s) | Colorful iGame Radeon HD 4890 1 GB GDDR5 |
Storage | 2x 500 GB Seagate Barracuda 7200.11 32 MB RAID0 |
Display(s) | BenQ G2400W 24-inch WideScreen LCD |
Case | Cooler Master COSMOS RC-1000 (sold), Cooler Master HAF-932 (delivered) |
Audio Device(s) | Creative X-Fi XtremeMusic + Logitech Z-5500 Digital THX |
Power Supply | Chieftec CFT-1000G-DF 1kW |
Software | Laptop: Lenovo 3000 N200 C2DT2310/3GB/120GB/GF7300/15.4"/Razer |
Researchers from Google have documented serious vulnerabilities in Adobe Flash content which leave tens of thousands of websites susceptible to attacks that steal the personal details of visitors. The security bugs reside in Flash applets, the ubiquitous building blocks for movies and graphics that animate sites across the web. Also known as SWF files, they are vulnerable to attacks in which malicious strings are injected into the legitimate code through a technique known as cross-site scripting, or XSS. Currently there are no patches for the vulnerabilities, which are found in sites operated by financial institutions, government agencies and other organizations. "Lots of people are vulnerable, and right now there are no protections available other than to remove those SWFs and wait for the authoring tools and/or Flash player to be updated," says Alex Stamos, an author of the Hacking Exposed Web 2.0 book. "In the mean time, people will have to think: 'What kind of flash am I using on my site,' and manually test for vulnerabilities."
View at TechPowerUp Main Site
View at TechPowerUp Main Site