The goal of this project is to make virtual world a safer and better place without child pornography, major computer crime and RIAA.
Login As
You can log in if you are registered at one of these services:
Advertisement

You can always use information security services, such as penetration testing to stay secure.


Security Bulletins
Latest Malware Updates

SONAR.PUA!gen2

09/15/2014

SONAR.PUA!gen3

09/15/2014

SONAR.Necurs!gen2

09/15/2014

SONAR.Cridex!gen2

09/15/2014

SONAR.Ratenjay!gen1

09/15/2014

SONAR.Ponik!gen3

09/15/2014

SONAR.LowSec!gen3

09/15/2014

SONAR.IRCbotng!gen6

09/15/2014

SONAR.IRCbotng!gen7

09/15/2014
09/17/2013

Suspicious.Cloud.9.B

Type:  Virus, Trojan
Discovered:  17.09.2013
Updated:  17.09.2013
Affected systems:  Windows 2000, Windows 7, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows Server 2008, Windows Vista, Windows XP
AV Vendor:  Symantec

Description:

Symantec’s antivirus products contain a highly sensitive detection technology designed to detect entirely new malware threats without traditional signatures. This technology is aimed at detecting malicious software that has been intentionally mutated or morphed by attackers. You can submit files detected as suspicious to Naked Security for further categorization. For instructions on how to do this, read Submit Virus Samples.

What to do in case of suspected erroneous detection (false positive) In rare cases where a legitimate file is misidentified and subsequently quarantined, your computer may behave abnormally or you may find that one or more applications no longer function as expected. In such rare situations, you should open the Quarantine in your Symantec antivirus product and review the list of files detected as suspicious. If you identify a potential misidentification, restore the file from Quarantine and allow it to run normally in order to regain the functionality of your computer or application.

Suspected false-positive detections can be reported to Symantec using our false-positive detection reporting page to contribute to the effectiveness of our product.

Security Advisories Database

Cross-site Scripting Vulnerability in MoinMoin

A cross-site scripting (XSS) vulnerability has been discovered in MoinMoin.

08/21/2014

Denial of service vulnerability in Monkey HTTP Server "mk_request_free()"

An attacker can perform a denial of service attack.

08/21/2014

Cross-site Scripting Vulnerability in Apache OFBiz

A cross-site scripting vulnerability was found in Apache OFBiz.

08/20/2014

Denial of service vulnerability in Cisco ASR 5000 Series Software Session Manager

An attacker can perform a denial of service attack.

08/20/2014

Cross-site Scripting Vulnerability in Fujitsu ServerView Operations Manager

A cross-site scripting vulnerability was discovered in Fujitsu ServerView Operations Manager.

08/14/2014

Denial of service vulnerability in Xen ARM 32-Bit Usermode Trap Handling

An attacker can perform a denial of service attack.

08/13/2014

Denial of service vulnerability in Cisco Unified Communications Manager SIP Subsystem

An attacker can perform a denial of service attack.

08/12/2014

Denial of service vulnerability in SUBNET SubSTATION Server Telegyr 8979 Master

An attacker can perform a denial of service attack.

08/12/2014

Cross-site Scripting Vulnerability in WordPress Improved User Search In Backend Plugin

A cross-site scripting vulnerability was discovered in WordPress Improved User Search In Backend Plugin.

08/08/2014

Denial of service vulnerability in IOS XE EnergyWise

An attacker can perform a denial of service attack.

08/08/2014