The goal of this project is to make virtual world a safer and better place without child pornography, major computer crime and RIAA.
Login As
You can log in if you are registered at one of these services:
Security Bulletins
Latest Malware Updates

Infostealer.Posteal

02/26/2015

Downloader.Busadom

02/26/2015

Trojan.Ladocosm

02/26/2015

SONAR.SuspDocRun

02/25/2015

SONAR.SuspHelpRun

02/25/2015

Experts: Any mobile phone user can be easily identified

Experts: Any mobile phone user can be easily identified

The scientists state that any mobile phone user can be easily identified after analyzing little information about their location.

Every time the phone is connected to the network, its owner’s location and movement is traced. It is known that this data is illegally given to the third parties in order to drive services for the user and to target advertisements.

The authors of the study entitled “Unique in the Crowd: The privacy bounds of human mobility” warns that it is possible to identify a user from only four data points.

Researchers from the Massachusetts Institute of Technology (MIT) and the Catholic University of Louvain for 15 months studied anonymised mobile phone records for 1.5 million individuals.

The researchers revealed "mobility traces" the evident paths of each mobile phone. They needed only four locations and times to identify a particular user.

In the 1930s, it was shown that you need 12 points to uniquely identify and characterize a fingerprint, said the study's lead author Yves-Alexandre de Montjoye of MIT.

What we did here is the exact same thing but with mobility traces. The way we move and the behavior is so unique that four points are enough to identify 95% of people, he added.

Experts claim that users usually provide their personal information themselves, for example, in social networks, publishing geo-located tweets.

Privacy advocates point out that the current study raises many questions about the violation of users privacy.

Sam Smith of Privacy International said: Our mobile phones report location and contextual data to multiple organisations with varying privacy policies. Any benefits we receive from such services are far outweighed by the threat that these trends pose to our privacy, and although we are told that we have a choice about how much information we give over, in reality individuals have no choice whatsoever.

(c) Naked Security


Security Advisories Database

Remote Code Execution Vulnerability in Microsoft OpenType Font Driver

A remote attacker can execute arbitrary code on the target system.

07/21/2015

SQL Injection Vulnerability in Piwigo

SQL inection vulnerability has been discovered in Piwigo.

02/05/2015

Cross-site Scripting Vulnerability in DotNetNuke

A cross-site scripting (XSS) vulnerability has been discovered in DotNetNuke.

02/05/2015

Cross-site Scripting Vulnerability in Hitachi Command Suite

A cross-site scripting vulnerability was found in Hitachi Command Suite.

02/02/2015

Denial of service vulnerability in FreeBSD SCTP RE_CONFIG Chunk Handling

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Apache Traffic Server HTTP TRACE Max-Forwards

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in MalwareBytes Anti-Exploit "mbae.sys"

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Linux Kernel splice

An attacker can perform a denial of service attack.

01/29/2015

Denial of service vulnerability in Python Pillow Module PNG Text Chunks Decompression

An attacker can perform a denial of service attack.

01/20/2015