Blogs

How do I erase my private information before donating/recycling my mobile phone?

http://www.recellular.com/recycling/data_eraser/default.asp

Just like donating or recycling a computer, it is best to remove your personal data from your mobile phone before giving it up.  Depending on your phone manufacturer, there are different ways and methods to do this.

Vulnerability in Microsoft Office PowerPoint Could Allow Remote Code Execution 969136

http://www.microsoft.com/technet/security/advisory/969136.mspx

Microsoft Security Advisory (969136)

"An attacker who successfully exploited this vulnerability could gain
the same user rights as the local user. Users whose accounts are
configured to have fewer user rights on the system could be less
affected than users who operate with administrative user rights."

Vulnerability in Microsoft Office PowerPoint Could Allow Remote Code Execution 969136

http://www.microsoft.com/technet/security/advisory/969136.mspx

Microsoft Security Advisory (969136)

"An attacker who successfully exploited this vulnerability could gain
the same user rights as the local user. Users whose accounts are
configured to have fewer user rights on the system could be less
affected than users who operate with administrative user rights."

Vulnerability in Microsoft Office PowerPoint Could Allow Remote Code Execution 969136

http://www.microsoft.com/technet/security/advisory/969136.mspx

Microsoft Security Advisory (969136)

"An attacker who successfully exploited this vulnerability could gain
the same user rights as the local user. Users whose accounts are
configured to have fewer user rights on the system could be less
affected than users who operate with administrative user rights."

Oracle Java SE Critical Patch Update (CPU) Advisory

Oracle released a CPU advisory addressing 17 security
vulnerabilities in Java SE. Nine of the vulnerabilities were rated at
10.0 on the CVSS scale (10.0 being the most severe scoring). Only one of
the remaining vulnerabilities was rated below 5.0.

Java users are recommended to upgrade to Java 6 Update 26 (v1.6.0.26)
as soon as possible.

Adobe Reader 7, 8 and 9 code execution through buffer overflow

http://www.adobe.com/support/security/advisories/apsa09-01.html

A buffer overflow in Adobe Reader allows for code execution when a user
opens a malicious PDF file.

Adobe will be releasing updates to v9 on March 11, 2009. Version 8 and
7 patches will follow soon after.

The exploit is currently active and uses Javascript embedded in the PDF
file to inject its payload into the heap.

Adobe Reader 7, 8 and 9 code execution through buffer overflow

http://www.adobe.com/support/security/advisories/apsa09-01.html

A buffer overflow in Adobe Reader allows for code execution when a user
opens a malicious PDF file.

Adobe will be releasing updates to v9 on March 11, 2009. Version 8 and
7 patches will follow soon after.

The exploit is currently active and uses Javascript embedded in the PDF
file to inject its payload into the heap.

Adobe Reader 7, 8 and 9 code execution through buffer overflow

http://www.adobe.com/support/security/advisories/apsa09-01.html

A buffer overflow in Adobe Reader allows for code execution when a user
opens a malicious PDF file.

Adobe will be releasing updates to v9 on March 11, 2009. Version 8 and
7 patches will follow soon after.

The exploit is currently active and uses Javascript embedded in the PDF
file to inject its payload into the heap.

Pages