Friday, October 28, 2016
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Alphabet Reports Strong Sales As Mobile Search and Video Ads Drive Revenue Growth
New Radeon Pro 400 Series Graphics Power 15-inch MacBook Pro
LG ULtrafine 5K/4K Displays Offer Performance and Integration With MacBook And New MacBook Pro
Sony Brings PlayStation Vue To Android TVs
Apple unveils new MacBook Pro Featuring Touch Bar, Ultra-thin Design
Apple unveils new TV app for Apple TV, iPhone and iPad
Uber Lays Out Plans Future of On-Demand Urban Air Transportation
Facebook Offers Halloween-themed Face Filters for Live videos
Active Discussions
Which of these DVD media are the best, most durable?
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
Help make DVDInfoPro better with dvdinfomantis!!!
menu making
Optiarc AD-7260S review
cdrw trouble
 Home > News > General Computing > Securit...
Last 7 Days News : SU MO TU WE TH FR SA All News

Friday, March 14, 2014
Security Researchers Pocket $850K In Pwn2Own Contest

The second and final day of HP-sponsored Pwn2Own 2014 competition saw successful attempts by seven entrants against five products, with $450,000 paid to researchers. This brings the two-day payout total to $850,000.

The following vulnerabilities were successfully presented on Thursday in the Pwn2Own competition:

An anonymous participant on Thursday attacked Google Chrome by taking advantage of an arbitrary read/write bug to bypass the browser's sandbox and execure its code. Upon review, contest judges declared this a partial win due to one portion of the presentation's collision with a vulnerability presented earlier at Pwnium.

Sebastian Apelt and Andreas Schmidt attacked Microsoft Internet Explorer. They discovered two "use-after-free" and a kernel bug.

Liang Chen of Keen Team worked on Apple Safari and a heap overflow along with a sandbox bypass resulted in code execution.

PlayStation modder and one-time Apple employee, George Hotz attacked Mozilla Firefox and used an flaw in Firefox to achieve "out-of-bound read/write resulting in code execution",

Team VUPEN attacked Google Chrome with "a use-after-free causing object confusion in the broker, resulting in sandbox bypass".

Last but not least, Zeguang Zhou of team509 and Liang Chen of Keen Team took on with Adobe Flash, and a heap overflow with a sandbox bypass resulted in code execution.

More information on Pwn2Own's first day results is available here.

Sprint Expands No-Contract Plan Offers with Sprint Prepaid        All News        Google Smartwatch Specifications Leak Online
Google Docs Users Targeted by Phishing Scam     General Computing News      Zuckerberg "Frustrated" By U.S. Government Spying

Get RSS feed Easy Print E-Mail this Message

Related News
Multiple Banks Attacked by Hacker Group, Symantec Says
U.S. Blames Russia For Cyber Attacks To Disrupt Election Process
Hackers Probed Voting Systems, U.S. Says
Hackers Accesssed Customer Credit Card Data From Acer Store
Mark Zuckerberg's Social Media Accounts Were Hacked
Hackers Target Banks in the Middle East
Hackers Steal, Sell Verizon Enterprise Customer Data
U.S IRS Discovers More Data Had Leaked In Last Year's Cyberattack
Hackers Hit Homeland Security And FBI
T-Mobile Customers Exposed in Experian Breach
Cisco Routers Vulnerable To Attack: researchers
Hackers Stole Data From Bugzilla

Most Popular News
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2016 - All rights reserved -
Privacy policy - Contact Us .