The goal of this project is to make virtual world a safer and better place without child pornography, major computer crime and RIAA.
Login As
You can log in if you are registered at one of these services:
Security Bulletins
Latest Malware Updates

Infostealer.Posteal

02/26/2015

Downloader.Busadom

02/26/2015

Trojan.Ladocosm

02/26/2015

SONAR.SuspDocRun

02/25/2015

SONAR.SuspHelpRun

02/25/2015

News

Microsoft released Fix it tool for the zero-day vulnerability in GDI component in Microsoft Windows and Office

The flaw allows remote execution of arbitrary code on the target system via a specially crafted TIFF image.

11/07/2013

Open source hardware can protect against NSA spying

It will more effectively detect backdoors and vulnerabilities that are built by NSA or other government agencies in the system of certain companies.

10/11/2013

vBulletin Vulnerability allows unauthorized administrative access

Exploit for this vulnerability has already spread over hacking forums.

10/11/2013

Microsoft to drop cookies

The company is going to apply its own technology that will store this sort of information on Redmond’s servers.

10/11/2013

A fake Facebook login page steals user credentials

The phishers can also get access to personal and financial information.

10/10/2013

Google to bounty fixing bugs in non-Google open source code software

Initially, the bounty program will be active for OpenSSL and OpenSSH libraries, BIND DNS and security critical components in Linux kernel.

10/10/2013

CMU researchers created leak-proof messenger app

Messages remain encrypted until recipient gets them due to end-to-end method of encryption.

10/09/2013

BlackHole exploit kit developer arrested in Russia

Ministry of Internal Affairs of the Russian Federation did not comment on the arrest.

10/09/2013

EFF to sue FBI for usage of facial recognition software

The Electronic Frontier Foundation has filed a suit against the Federal Bureau of Investigation.

07/01/2013

Facebook paid 20 grand for critical bug

UK-based security researcher was awarded with $20, 000 for discovery of critical vulnerability.

07/01/2013

U.S. Department of Defense blocked The Guardian website

According to authorities, the resource published secret documents, access to which should be restricted.

06/28/2013

Expert: Apple can get access to your iMessages

This is possible because the storage of messages in iCloud.

06/27/2013

Researchers have doubted the relevance of the Common Vulnerability Scoring System

According to experts, the system does not provide the most relevant information on whether a vulnerability is used in real time for attacks on computer systems.

06/26/2013

Backdoor in HP StoreOnce

Security experts discovered unchangeable admin account in HP StoreOnce SAN system software.

06/26/2013

Attacker, distributing Ghost RAT Trojan, arrested in Taiwan

The virus spread via phishing email-messages.

06/25/2013

Symantec: Pretending to be antivirus, malware blocks mobile devices

To unblock the device Fakedefender asks for a special code.

06/25/2013

Carberp banking Trojan source code leaked

Guys from Russian security firm GROUP-IB published screen shots of a famous banking trojan Carberp.

06/25/2013

CIA illegally read SMS of the Chinese

Snowden claimed that U.S. intelligence hacked the Chinese mobile operators’ databases.

06/24/2013

Anonymous attack oil companies around the world

Hackers perform DDoS-attacks, compromise accounts of social networks, companies’ servers and websites, as well as hijack confidential data.

06/24/2013

LinkedIn users were redirected to the false site because of the domain name registrar's error

Network Solutions suffered from a DDoS-attack and replaced 5 000 DNS records, which affected LinkedIn services.

06/21/2013

News 1 - 20 of 243
First | Prev. | 1 2 3 4 5 | Next | Last All

Security Advisories Database

Remote Code Execution Vulnerability in Microsoft OpenType Font Driver

A remote attacker can execute arbitrary code on the target system.

07/21/2015

SQL Injection Vulnerability in Piwigo

SQL inection vulnerability has been discovered in Piwigo.

02/05/2015

Cross-site Scripting Vulnerability in DotNetNuke

A cross-site scripting (XSS) vulnerability has been discovered in DotNetNuke.

02/05/2015

Cross-site Scripting Vulnerability in Hitachi Command Suite

A cross-site scripting vulnerability was found in Hitachi Command Suite.

02/02/2015

Denial of service vulnerability in FreeBSD SCTP RE_CONFIG Chunk Handling

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Apache Traffic Server HTTP TRACE Max-Forwards

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in MalwareBytes Anti-Exploit "mbae.sys"

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Linux Kernel splice

An attacker can perform a denial of service attack.

01/29/2015

Denial of service vulnerability in Python Pillow Module PNG Text Chunks Decompression

An attacker can perform a denial of service attack.

01/20/2015