Page Rank is one of the many criteria webmasters use to assess popularity and worth of any website. There are many tools available on the web to measure Page Rank like Google Toolbar, one of the popular browser addon also accompanying with Page Rank tool. But here arises some problems: You have to install this […]
Category: Vulnerabilities
Apple iPhone 2.0.2, in some configurations, allows physically proximate attackers to bypass intended access restrictions, and obtain sensitive information or make arbitrary use of the device, via an Emergency Call tap and a Home double-tap, followed by a tap of any contact’s blue arrow. Details: SecurityTracker Alert ID: 1020763 SecurityTracker URL: http://securitytracker.com/id?1020763 CVE Reference: CVE-2008-3876 […]
A Polish hacker and self professed security expert claims to have discovered vulnerabilities in the mobile Java technology implemented by Nokia in its mid-range S40 devices, potentially putting millions of handsets at risk. Adam Gowdiak, who is in the process of setting up a security research firm, Security Explorations, claims the bugs affect around 140 […]
Microsoft released patches to fix 26 vulnerabilities in the company’s software, including major issues in its Internet Explorer browser and Office suite of productivity applications. The eleven patches, published on Microsoft’s monthly schedule, included six fixes rated Critical — Microsoft’s highest rating of severity — and five updates rated Important — the company’s second highest. […]