The goal of this project is to make virtual world a safer and better place without child pornography, major computer crime and RIAA.
Login As
You can log in if you are registered at one of these services:
Security Bulletins
Latest Malware Updates

Infostealer.Posteal

02/26/2015

Downloader.Busadom

02/26/2015

Trojan.Ladocosm

02/26/2015

SONAR.SuspDocRun

02/25/2015

SONAR.SuspHelpRun

02/25/2015

Assange: Google is an arm of US government

Assange: Google is an arm of US government

Wikileaks founder Julian Assange claims that Google has an agreement with the U.S. administration and the highest levels of the U.S. government. He took part in the 19th International Symposium on Electronic Art via live video link and said that Google serves as the "echo" of the U.S. authorities.

Assange says that Google and the U.S. State Department have been cooperating for a long time. In 2011 Assange met with Eric Schmidt and Jared Cohen, the young hotshot who is head of Google Ideas and with Lisa Shields, a vice president at the Council on Foreign Relations. At that time the three of them were going to interview Assange for Schmidt’s book: “The New Digital Age: Re-shaping the Future of People, Nations and Business”, but the head of Wikileaks now says that the motives of their visit were completely different.

Google wants to ingratiate itself in the national security complex of the US and [establish] itself as a new geopolitical visionary. You might think this meeting is evidence that the big boys at Google are secretly on the side of WikiLeaks. That's not true; they have a much more complex agenda", claims Assange.

Assange is sure that the representatives of Google are agents of the State Department. Besides they also perform at the request of the CIA "doing stuff the government and CIA can't do". In return, the company receives approval for some projects and patronage from the authorities.

As a further confirmation, Assange recalled Washingtons high concern about any leaks from Google and cyberattacks on the company.

(c) Naked Security


Security Advisories Database

Remote Code Execution Vulnerability in Microsoft OpenType Font Driver

A remote attacker can execute arbitrary code on the target system.

07/21/2015

SQL Injection Vulnerability in Piwigo

SQL inection vulnerability has been discovered in Piwigo.

02/05/2015

Cross-site Scripting Vulnerability in DotNetNuke

A cross-site scripting (XSS) vulnerability has been discovered in DotNetNuke.

02/05/2015

Cross-site Scripting Vulnerability in Hitachi Command Suite

A cross-site scripting vulnerability was found in Hitachi Command Suite.

02/02/2015

Denial of service vulnerability in FreeBSD SCTP RE_CONFIG Chunk Handling

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Apache Traffic Server HTTP TRACE Max-Forwards

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in MalwareBytes Anti-Exploit "mbae.sys"

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Linux Kernel splice

An attacker can perform a denial of service attack.

01/29/2015

Denial of service vulnerability in Python Pillow Module PNG Text Chunks Decompression

An attacker can perform a denial of service attack.

01/20/2015