Welcome to Smokey's Security Forums.
Guests only have limited access to the board and it's features, please consider registering to gain full access!
Registration is free and it only takes a few moments to complete.

Smokey's Security Forums

Please login or register.

Login with username, password and session length
Advanced search  

News:

What is a computer worm and how does it spread?

A computer worm is a form of malware, just like its more notorious cousin, the virus.
Where a worm differs from a virus is that it typically doesn’t infect or manipulate files on its own.
Instead, it simply clones itself over and over again and spreads via a network (say, the Internet, a local area network at home, or a company’s intranet) to other systems where it continues to replicate itself.

What is a computer worm and how does it spread?

Malware Log Analysis & Removal Help * Ransomware Encryption & Decrytion Techniques * Official Jetico Inc. Support Forums

Share this topic on FacebookShare this topic on MySpaceShare this topic on RedditShare this topic on TwitterAuthorTopic: Mozilla Fixes Critical Vulnerability in Firefox 22 Hours After Discovery  (Read 75 times)

0 Members and 1 Guest are viewing this topic.

QuizmasterTopic starter

  • Flying Nurse
  • Seasonal Competition Team
  • *
  • Offline Offline
  • location: USA - Miami,FL
  • Posts: 22391
  • .: Surf Queen
    • WWW
Mozilla Fixes Critical Vulnerability in Firefox 22 Hours After Discovery
20 March 2017, 11:37 pm

When you have a lot of manpower, patching security vulnerabilities happens quickly. In fact, it took Mozilla only 22 hours to patch a zero day vulnerability identified within Firefox at the Pwn2Own hacking competition that took place last week. 

The new Firefox version 52.0.1 which was released late on Friday contains the patch for the flaw discovered by hackers in the competition. The fix was confirmed via Twitter by Asa Dotzler, Mozilla participation director for Firefox OS, as well as Daniel Veditz, security team member at Mozilla. 

The bug was discovered by the Chaitin Security Research Lab from China. The hackers managed to escalate privileges in an exploit during the hacking competition by combining the bug with an initialized buffer in the Windows kernel. The bug bounty for this particular vulnerability was of $30,000 indicating that it w... (read more)

Source: Softpedia News / Security

>> To obtain the full Softpedia Security News article, click the link in the first post line <<
 

* Permissions
You can't post new topics.
You can't post replies.
You can't post attachments.
You can't modify your posts.
BBCode Enabled
Smilies Enabled
[img] Enabled
HTML Disabled


Except where otherwise stated, all content, graphics, banners and images included © 2006 - 2017 Smokey Services™ -- All rights reserved
Design board graphics, banners and images by Meg&Millie - Emma aka Tinker

This site does not store profiling-, tracking-, third-party and/or any other non-essential cookie(s) on client computers and is fully compliant with the EU ePrivacy Directive
Smokey's does not use any Web Analytics/Analysis Service, and also does not use any browser fingerprinting techniques

    

  

Smokey's also provides free fully qualified FRST (Farbar Recovery Scan Tool) Log / Malware Analysis & Removal Help and System Health Checks
rifle
rifle
rifle
rifle