A Russian security firm says it's found an alarming 600,000 OS X machines infected with the Flashback trojan.
The firm, called Dr Web, first said that it had found half a million infected computers but later upped the number in a tweeted message, where it added that some of the bots are in Cupertino.
Apparently the Java exploits used in the Flashback Trojan is catching on and researchers are starting to see malware that appear to be making use of the same route of attack.
Here's an interesting weekend project - Nuno Alves has built himself his own $85 PDF password cracker using the BeagleBone, tapping into the power of it's 700 MHz ARM processor to do the cracking.
In a move aimed at helping users understand the real-world risks associated with security vulnerabilities in its products, Adobe is now adding “priority ratings” to its security bulletins.
The addition of priority ratings will differentiate between security vulnerabilities that are being targeted by live exploits; security flaws that are historically at elevated risk; and vulnerabilities that may be theoretically dangerous but are almost never targeted by attackers.
Some of us deal with a plethora of PDF documents. Perhaps we need to make various edits and comments to the documents, or maybe we need to convert the PDFs into a different format like a Word document. Unfortunately, depending on the sources that we acquire our PDFs from, some of the files may in fact be secured, meaning no edits or changes can be allowed on the document for content integrity reasons.