Monday, March 02, 2015
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Crafted from Metal and Glass, Samsung Galaxy S6 and Galaxy S6 Edge Are Here
MWC: SanDisk Introduces New Mobile Flash Drives, iNAND 7132 Storage Solution And 200GB microSDXC Card
MWC: New Tablets By Lenovo
Firefox OS Expands with More Partners, Devices
MWC: MediaTek Releases SoCs For Smartphones And Tablets
HP Introduces The Spectre x360 Convertible PC
Acer Unveils Windows Phone 10-ready smartphone At MWC
New ZTE Grand S3 Smartphone Offers EyeVerify Authentication
Active Discussions
Need serious help!!!!
burning
nvidia 6200 review
Hello
Burning Multimedia in track 0
I'm lazy. Please help.
sanyo e6 camera
need help on some cd burning...
 Home > News > General Computing > Securit...
Last 7 Days News : SU MO TU WE TH FR SA All News

Friday, March 14, 2014
Security Researchers Pocket $850K In Pwn2Own Contest


The second and final day of HP-sponsored Pwn2Own 2014 competition saw successful attempts by seven entrants against five products, with $450,000 paid to researchers. This brings the two-day payout total to $850,000.

The following vulnerabilities were successfully presented on Thursday in the Pwn2Own competition:

An anonymous participant on Thursday attacked Google Chrome by taking advantage of an arbitrary read/write bug to bypass the browser's sandbox and execure its code. Upon review, contest judges declared this a partial win due to one portion of the presentation's collision with a vulnerability presented earlier at Pwnium.

Sebastian Apelt and Andreas Schmidt attacked Microsoft Internet Explorer. They discovered two "use-after-free" and a kernel bug.

Liang Chen of Keen Team worked on Apple Safari and a heap overflow along with a sandbox bypass resulted in code execution.

PlayStation modder and one-time Apple employee, George Hotz attacked Mozilla Firefox and used an flaw in Firefox to achieve "out-of-bound read/write resulting in code execution",

Team VUPEN attacked Google Chrome with "a use-after-free causing object confusion in the broker, resulting in sandbox bypass".

Last but not least, Zeguang Zhou of team509 and Liang Chen of Keen Team took on with Adobe Flash, and a heap overflow with a sandbox bypass resulted in code execution.

More information on Pwn2Own's first day results is available here.




Previous
Next
Sprint Expands No-Contract Plan Offers with Sprint Prepaid        All News        Google Smartwatch Specifications Leak Online
Google Docs Users Targeted by Phishing Scam     General Computing News      Zuckerberg "Frustrated" By U.S. Government Spying

Get RSS feed Easy Print E-Mail this Message

Related News
Hackers Stole More Than 300M Dollars From Banks: report
RadioShack Reaches Asset Purchase Agreement with Sprint To Acquire Its Stores
Health Insurer Anthem Hacked
Sony Pictures Entertainment Remains in a State of Breach, Says Research Firm
Sprint To Take Over RadioShack Stores: report
Smart TVs Could Be Hackers' Next Target
Malaysia Airlines And Russian Dating Sites Topface Websites Hacked
Man Arrested in U.K On Suspicion of Christmas Xbox, Playstation Hacks
Military Twitter Accounts And YouTube Sites Hacked
Anonymous Hackers Declare War To Jihadists
Group Claims Responsibility For Attacks Against German Government Websites
Anonymous Declares War on Lizard Squad Hacker Team Who Took Down Playstation And Xbox Networks

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2015 - All rights reserved -
Privacy policy - Contact Us .