Post Thumbnail

Google's Pwnium challenge followed a familiar pattern in its first two years, with white hat hackers invariably finding a Chrome vulnerability and prompting a round of patches that ultimately made the software stronger. For the Chrome OS-focused Pwnium 3, there's been a slight hiccup: there were n...

2 years ago 0 Comments
March 8, 2013 at 6:28PM
Post Thumbnail

A team of Dutch researchers used a WebKit vulnerability in Mobile Safari to gain access to a fully patched iPhone 4S during a recent mobile Pwn2Own challenge. The attack circumvented Apple's code-signing requirements and grabbed the entire address book, photo and video database and web browsing h...

2 years ago 0 Comments
Post Thumbnail

It didn't manage to do it during the most recent Pwn2Own challenge, but VUPEN Security is now claiming that it has finally managed to hack Google's Chrome browser and crack its so-called "sandbox." According to the firm, the exploit relies on some newly discovered zero day vulnerabilities, work...

4 years ago 0 Comments
Post Thumbnail

A flaw in WebKit, the engine that underlies Safari, Mobile Safari, and several other browsers, was found to be vulnerable in this year's "Pwn2Own" competition, as reported by ZDNet and many others. This is noteworthy for several reasons: first, because the exploit did not use Flash. You will reme...

4 years ago 0 Comments
Post Thumbnail

Ahead of the most recent Pwn2Own, Google made a rather proud challenge: it'd pay $20,000 to any team or individual who could successfully hack Chrome. Two takers signed up for that challenge -- and then both backed down. One individual didn't show up and a second entry, known as Team Anon, decided ...

4 years ago 0 Comments
Post Thumbnail

So far, Chrome is the only browser of the big four -- Safari, Firefox, and Internet Explorer being the other three -- to escape the Pwn2Own hacking competition unscathed the past two years. (Sorry Opera aficionados, looks like there's not enough of you to merit a place in the contest... yet.) Evide...

4 years ago 0 Comments
Post Thumbnail

It's a story tailor-made for the fear-mongering subset of news media. This week, a pair of gentlemen lured an unsuspecting virgin iPhone to a malicious website and -- with no other input from the user -- stole the phone's entire database of sent, received and even deleted text messages in under 2...

5 years ago 0 Comments
Post Thumbnail

An iPhone got hacked in just 20 seconds at this week's Pwn2Own hacking contest at CanSecWest 2010, reports Ryan Naraine for ZDnet. Hackers Vincenzo Iozzo and Ralf Philipp Weinmann demoed an exploit that allowed them to send a target iPhone to a web site that they'd set up online, and then copied of...

5 years ago 0 Comments
Post Thumbnail

You may have noticed that I'm not a huge fan of Flash. My feelings pre-date the iPhone/iPad debate about whether or not Flash should be included on those devices. Even back when I was using Windows and Opera, one of the features I used most often was "Disable Plugins" -- which was really another wa...

5 years ago 0 Comments
Post Thumbnail

Sure seems like your handheld is a lot more secure than your computer, at least in some sense -- although the desktop versions of IE 8, Safari, and Firefox were each almost instantly cracked on the first day of the Pwn2Own contest, no one claimed the $10,000 bounty placed on each of the major smartp...

6 years ago 0 Comments
Post Thumbnail

Sure seems like your handheld is a lot more secure than your computer, at least in some sense -- although the desktop versions of IE 8, Safari, and Firefox were each almost instantly cracked on the first day of the Pwn2Own contest, no one claimed the $10,000 bounty placed on each of the major smartp...

6 years ago 0 Comments
Post Thumbnail

That didn't take long. One day into the Pwn2Own hacking competition at CanSecWest and already Apple, Microsoft, and Mozilla have been sent packing to their respective labs to work on security issues in their browsers. In a repeat performance, Charlie Miller pocketed a $5,000 cash prize and a fully...

6 years ago 0 Comments
Post Thumbnail

After a week full of Red Bulls, Fruit by the Foot and dreams of In-N-Out, the mighty Sony VAIO loaded with Linux stood as the only machine unhacked by the end of the PWN 2 OWN hacking contest at CanSecWest. As you're well aware by now, the MacBook Air on display was seized in two minutes by the pr...

7 years ago 0 Comments
Post Thumbnail

Once the second-day rules went into effect for the PWN2OWN competition, allowing browser or email exploits to be used, it didn't take more than a few minutes for Charlie Miller, Jake Honoroff and Mark Daniel from ISE to get their 0day vulnerability to work on the target MacBook Air; they walk away w...

7 years ago 0 Comments
Post Thumbnail

And just think -- last year you were singing Dino Dai Zovi's praises for taking control of a MacBook Pro in nine whole hours. This year, the PWN 2 OWN hacking competition at CanSecWest was over nearly as quickly as the second day started, as famed iPhone hacker Charlie Miller showed the MacBook Ai...

7 years ago 0 Comments