Tuesday, October 21, 2014
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
China Denies Apple's iCloud Hack Allegations
Samsung Galaxy KNOX Devices Approved for U.S. Government Classified Use
iPhone 6 Demand Help ARM's Growth
SK Hynix Develops High Density 16GB NVDIMM
Samsung Mass Produces 8-Gigabit DDR4 Based on 20 Nanometer Process Technology
Strong iPhone, Mac And App Store Sales Drive Apple's Record September Quarter Revenue And Earnings
Apple iOS 8.1 Available For Download
E FUN To Relase $179 Windows tablet
Active Discussions
Copied dvd's say blank in computer only
How to generate lots of different CDs quickly
Yamaha CRW-F1UX
help questions structure DVDR
Made video, won't play back easily
Questions durability monitor LCD
Questions fungus CD/DVD Media, Some expert engineer in optical media can help me?
CD, DVD and Blu-ray burning for Android in development
 Home > News > General Computing > Securit...
Last 7 Days News : SU MO TU WE TH FR SA All News

Friday, March 14, 2014
Security Researchers Pocket $850K In Pwn2Own Contest


The second and final day of HP-sponsored Pwn2Own 2014 competition saw successful attempts by seven entrants against five products, with $450,000 paid to researchers. This brings the two-day payout total to $850,000.

The following vulnerabilities were successfully presented on Thursday in the Pwn2Own competition:

An anonymous participant on Thursday attacked Google Chrome by taking advantage of an arbitrary read/write bug to bypass the browser's sandbox and execure its code. Upon review, contest judges declared this a partial win due to one portion of the presentation's collision with a vulnerability presented earlier at Pwnium.

Sebastian Apelt and Andreas Schmidt attacked Microsoft Internet Explorer. They discovered two "use-after-free" and a kernel bug.

Liang Chen of Keen Team worked on Apple Safari and a heap overflow along with a sandbox bypass resulted in code execution.

PlayStation modder and one-time Apple employee, George Hotz attacked Mozilla Firefox and used an flaw in Firefox to achieve "out-of-bound read/write resulting in code execution",

Team VUPEN attacked Google Chrome with "a use-after-free causing object confusion in the broker, resulting in sandbox bypass".

Last but not least, Zeguang Zhou of team509 and Liang Chen of Keen Team took on with Adobe Flash, and a heap overflow with a sandbox bypass resulted in code execution.

More information on Pwn2Own's first day results is available here.




Previous
Next
Sprint Expands No-Contract Plan Offers with Sprint Prepaid        All News        Google Smartwatch Specifications Leak Online
Google Docs Users Targeted by Phishing Scam     General Computing News      Zuckerberg "Frustrated" By U.S. Government Spying

Get RSS feed Easy Print E-Mail this Message

Related News
China Denies Apple's iCloud Hack Allegations
iSIGHT Discovers Windows Server Vulnerability Used in Russian Cyber-espionage Campaign
JPMorgan Hack Is Among Biggest Breaches in History
Hackers Exploit 'Shellshock' Cyber Thread
JPMorgan Servers Hacked in June
Health Data Stolen in Cyber Attack from China
Hackers Stole Over 1 Billion Records
Hackers Can Use USB Devices in Attacks
U.S. Arrests Russian Accused Of Hacking Retail Systems
Montana State Says 1.3 Million Records Exposed in Data Breach
Hackers Used YouTube To Sell Stolen Credit Card Data
Hackers Attack Dominos Pizza, Steal Customers' Data

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2014 - All rights reserved -
Privacy policy - Contact Us .