This is quite the hack. Memory hacking can be quite powerful. http://arstechnica.com/security/2015/03/cutting-edge-hack-gives-super-user-status-by-exploiting-dram-weakness/
Some techniques to think about. https://www.venafi.com/blog/post/4-common-tactics-used-in-recent-healthcare-breaches/
Another win for open source. http://www.wired.com/2015/03/github-conquered-google-microsoft-everyone-else/
Another Facebook attack scenario. The moral of the story is not to accept links from anyone. This can only lead...
This is quite a concern. Companies are worried about costs, but what happens in a virus/malware or social engineering attack...
People have always asked me this question. Here is a good article tgat breaks it down. http://www.informationsecuritybuzz.com/secure-web-browser/