The goal of this project is to make virtual world a safer and better place without child pornography, major computer crime and RIAA.
Login As
You can log in if you are registered at one of these services:
Security Bulletins
Latest Malware Updates

Infostealer.Posteal

02/26/2015

Downloader.Busadom

02/26/2015

Trojan.Ladocosm

02/26/2015

SONAR.SuspDocRun

02/25/2015

SONAR.SuspHelpRun

02/25/2015

U.S. government  biggest buyer of malware

U.S. government biggest buyer of malware

According to Reuters, the U.S. government is the world's largest buyer of malware. In a report on the growing concern in the field of technology and intellectual property the experts stated that Washington participates in the “gray market” vulnerabilities and exploits, which the government uses to answer opponents, committing attacks on the United States, and thus encourages the break-ins and other such practices.

Representatives of cyber security industry are concerned that authorities do not register vulnerabilities purchased by taxpayers’ money and exploiting them to perform retaliatory attacks on foreign networks in order to install cyber weapons and spy technologies.

According to former advisers of the White House cybersecurity Howard Schmidt and Richard Clarke, this makes average American companies and consumers vulnerable to the attacks.

As marked by Reuters, top U.S. officials told Congress this year that poor Internet security surpassed terrorism to become the single greatest threat to the country. Authorities consider better information-sharing on risks being crucial.

According to experts, White House owns not only data centers that perform DoS-attacks against enemies systems, but also specially crafted software to infiltrate the network of countries with oppressive regimes, such as Stuxnet.

Many malicious programs used by black hats can be transferred through USB flash drives, some are spread through e-mail. Some exploits cost $50; many of them are needed for reliable operations, and cost about $100 thousand.

(c) Naked Security


Security Advisories Database

Remote Code Execution Vulnerability in Microsoft OpenType Font Driver

A remote attacker can execute arbitrary code on the target system.

07/21/2015

SQL Injection Vulnerability in Piwigo

SQL inection vulnerability has been discovered in Piwigo.

02/05/2015

Cross-site Scripting Vulnerability in DotNetNuke

A cross-site scripting (XSS) vulnerability has been discovered in DotNetNuke.

02/05/2015

Cross-site Scripting Vulnerability in Hitachi Command Suite

A cross-site scripting vulnerability was found in Hitachi Command Suite.

02/02/2015

Denial of service vulnerability in FreeBSD SCTP RE_CONFIG Chunk Handling

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Apache Traffic Server HTTP TRACE Max-Forwards

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in MalwareBytes Anti-Exploit "mbae.sys"

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Linux Kernel splice

An attacker can perform a denial of service attack.

01/29/2015

Denial of service vulnerability in Python Pillow Module PNG Text Chunks Decompression

An attacker can perform a denial of service attack.

01/20/2015