<iframe src="//www.googletagmanager.com/ns.html?id=GTM-TT8R4P" height="0" width="0" style="display:none;visibility:hidden">

Sonatype Blog

Stay updated on the latest news from the makers of Nexus

VAO

Recent Posts by VAO:

Android home to 96% of all new mobile malware

Android is home to 96% of new mobile malware. F-Secure’s latest Mobile Threat Report found that Android accounted for 96% of new mobile threats.

Flash, Adobe Reader and Java Hacked ... again

Flash, Adobe Reader and Java hacked on the second day of Pwn2Own 2013.Researchers participating in the Pwn2Own 2013 competition discovered vulnerabilities in Flash, Adobe Reader, and Java.

Hacker Steals $12,000 Worth Of Bitcoins In Brazen DNS-Based Attack

A Bitcoin brokerage, Bitinstant was hit by hackers who used a bit of social engineering to take control of the company’s DNS servers and ultimately funnel out $12,000 worth of Bitcoins.

Proxy use among cybercriminals is on the rise

Cybercriminals likely to expand use of browser proxies. A technique used to capture and redirect browser traffic seen in attacks in Brazil is likely to be used more widely, security researchers warned.

Flaw in Kaspersky Internet Security 2013 leads to remote freeze

A security researcher released a proof-of-concept highlighting a vulnerability in Kaspersky Internet Security 2013 that could allow the operating system to be frozen remotely.

Browsers downed again on first day of Pwn2Own contest

Major browsers, Java hacked on the first day of Pwn2Own 2013.Researchers participating in the first day of Pwn2Own 2013 discovered security vulnerabilities in Firefox, Chrome, and Internet Explorer 10 Web browsers, as well as in Java.

Oracle confirms Java 7 Update 15

Oracle confirms Java 7 Update 15 vulnerability, but researchers are still unhappy. Researchers urged Oracle to reevaluate their submissions of weaknesses in the Java 7 Update 15 after the company acknowledged only one of the two vulnerabilities discovered regarding a full sandbox bypass is a concern, and simply determined the second vulnerability to be accepted behavior of the update.