Researchers say BlackNurse attacks are low bandwidth (18Mbps) and can still knock offline many of today’s firewalls.
![OAuth 2.0 Hack Exposes 1 Billion Mobile Apps to Account Hijacking OAuth 2.0 Hack Exposes 1 Billion Mobile Apps to Account Hijacking](https://xploiter.com/wp-content/uploads/sites/6/2015/10/background-05-e1661167538754.jpg)
OAuth 2.0 Hack Exposes 1 Billion Mobile Apps to Account Hijacking
Mobile app developers need to be aware of improper OAuth 2.0 implementations that have put one billion mobile apps at risk to takeover.
![Siemens Discloses Local Privilege Escalation Bug in SCADA Gear Siemens Discloses Local Privilege Escalation Bug in SCADA Gear](https://xploiter.com/wp-content/uploads/sites/6/2015/10/background-05-e1661167538754.jpg)
Siemens Discloses Local Privilege Escalation Bug in SCADA Gear
Siemens is warning customers of a local privilege escalation vulnerability that leaves over a dozen models of its SCADA equipment open to attack.
![iOS WebView Problem Allows Attackers to Initiate Phone Calls iOS WebView Problem Allows Attackers to Initiate Phone Calls](https://xploiter.com/wp-content/uploads/sites/6/2015/10/background-05-e1661167538754.jpg)
iOS WebView Problem Allows Attackers to Initiate Phone Calls
An issue in iOS WebView that is trivial to exploit can give an attacker the ability to trigger phone calls from a targeted device, researcher Collin Mulliner said.
![Google to Red Flag ‘Repeat Offender’ Websites Google to Red Flag ‘Repeat Offender’ Websites](https://xploiter.com/wp-content/uploads/sites/6/2015/10/background-05-e1661167538754.jpg)
Google to Red Flag ‘Repeat Offender’ Websites
Google’s Safe Browsing program expands to include “Repeat Offender” websites in blacklisting program.
![Locky Targets OPM Breach Victims Locky Targets OPM Breach Victims](https://xploiter.com/wp-content/uploads/sites/6/2015/10/background-05-e1661167538754.jpg)
Locky Targets OPM Breach Victims
A phishing campaign is targeting some of the 22 million victims of the massive United States Office of Personnel Management breaches of 2014 and 2015.
![Microsoft Tears off the Band-Aid with EMET Microsoft Tears off the Band-Aid with EMET](https://xploiter.com/wp-content/uploads/sites/6/2015/10/background-05-e1661167538754.jpg)
Microsoft Tears off the Band-Aid with EMET
Microsoft extended the end of life deadline on EMET to July 2018, but experts say its usefulness as a mitigation toolkit has been limited for some time.
![Risk of Election Day Cyberattacks Low According To Experts Risk of Election Day Cyberattacks Low According To Experts](https://xploiter.com/wp-content/uploads/sites/6/2015/10/background-05-e1661167538754.jpg)
Risk of Election Day Cyberattacks Low According To Experts
Security experts monitoring cyber-chatter for virtual and real-world threats against U.S. Election Day targets don’t believe there will be cyberattack or al-Qaeda terror attack this Tuesday.
![Adobe Patches Nine Code Execution Flaws in Flash Player Adobe Patches Nine Code Execution Flaws in Flash Player](https://xploiter.com/wp-content/uploads/sites/6/2015/10/background-05-e1661167538754.jpg)
Adobe Patches Nine Code Execution Flaws in Flash Player
Adobe again released a security update for Flash Player, patching nine remote code execution vulnerabilities. Adobe Connect for Windows was also updated.
![Google Releases Supplemental Patch for Dirty Cow Vulnerability Google Releases Supplemental Patch for Dirty Cow Vulnerability](https://xploiter.com/wp-content/uploads/sites/6/2015/10/background-05-e1661167538754.jpg)
Google Releases Supplemental Patch for Dirty Cow Vulnerability
Google’s November Android Security Bulletin patched 15 critical vulnerabilities, but only a supplemental patch for the Dirty Cow Linux vulnerability.