The goal of this project is to make virtual world a safer and better place without child pornography, major computer crime and RIAA.
Login As
You can log in if you are registered at one of these services:
Security Bulletins
Latest Malware Updates

Infostealer.Posteal

02/26/2015

Downloader.Busadom

02/26/2015

Trojan.Ladocosm

02/26/2015

SONAR.SuspDocRun

02/25/2015

SONAR.SuspHelpRun

02/25/2015

News

Microsoft to pay up to $100,000 for new vulnerabilities in Windows 8.1 products

“New Bounty Programs” for finding flaws in Windows 8.1 Preview starts on June 26.

06/21/2013

China to establish agency on cyber diplomacy

Ministry of Foreign Affairs of China told about creating secretariat to deal with diplomatic issues in the field of cyber security.

06/20/2013

About 12% small businesses are ready to protect their customers’ personal data

Strengthening cybersecurity is hindered by a lack of funds and lack of awareness of the possible consequences of being compromised.

06/19/2013

Hackers paralyzed the U.S. NSA site for 13 hours

In such a manner hackers expressed their outrage at the usage of the spy program PRISM by the govenment.

06/19/2013

Assange: Google is an arm of US government

Assange is sure that the representatives of Google - are agents of the State Department.

06/18/2013

France disconnects torrent users from the internet

Authorities started to apply stricter penalties, which are covered in the antipiracy law, adopted in 2010.

06/17/2013

Microsoft provides security services with information about existing flaws before the release of patches

Many other U.S. telecommunication companies provide security services with information on voluntary basis.

06/17/2013

Anonymous initiated a campaign against the government of Greece

Hackers broke into the website of one of the courts of Athens and broadcasted on it the programs from the Greek radio and television ERT.

06/14/2013

Experts now know the price of user’s personal data

The cost may vary due to importance of collected information.

06/14/2013

Edward Snowden: USA has been hacking China since 2009

For the several past years, USA has organized hundreds of cyberattacks against targets in China.

06/13/2013

Gartner: By 2016, the global market of cyber security will reach $ 86 billion

Formation of the market can be carried out basing on three different tendencies: mobile security, “big data” and sophisticated targeted attacks.

06/13/2013

Edward Snowden wants to reveal more information about PRISM

Snowden gave the Guardian some really important material, and it will be published really soon.

06/11/2013

British police offers ‘kill switch’ to disable stolen mobile handsets

Emergency lock button makes the device unusable.

06/10/2013

Fraudsters earned $ 200 mln, selling stolen credit card data

Criminals have created a special web portal for their operations.

06/06/2013

Windows 8.1 will provide an option to secure folders with fingerprints

The operating system will recognize fingerprints without any additional software.

06/05/2013

Google developer posted description of a 0-day vulnerability in Windows

Researcher asked other specialists to find a way to use the flaw.

06/05/2013

Russia Today hacked by AntiLeaks

As the result of attack, three websites became unavailable.

06/04/2013

Researchers will hack iOS devices, using a modified charger

The hack will be demonstrated at the Black Hat security conference by the team from Georgia Institute of Technology.

06/04/2013

Jailbreak creator advised Apple to create an alternative version of iOS 7

According to the developers, in this case hackers won’t need to look for vulnerabilities to create a jailbreak and Apple representatives – to fix them.

06/03/2013

Major internet-companies won’t spy on British users

Companies state that Theresa May’s plan is too expensive and contentious.

06/03/2013

News 21 - 40 of 243
First | Prev. | 1 2 3 4 5 | Next | Last All

Security Advisories Database

Remote Code Execution Vulnerability in Microsoft OpenType Font Driver

A remote attacker can execute arbitrary code on the target system.

07/21/2015

SQL Injection Vulnerability in Piwigo

SQL inection vulnerability has been discovered in Piwigo.

02/05/2015

Cross-site Scripting Vulnerability in DotNetNuke

A cross-site scripting (XSS) vulnerability has been discovered in DotNetNuke.

02/05/2015

Cross-site Scripting Vulnerability in Hitachi Command Suite

A cross-site scripting vulnerability was found in Hitachi Command Suite.

02/02/2015

Denial of service vulnerability in FreeBSD SCTP RE_CONFIG Chunk Handling

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Apache Traffic Server HTTP TRACE Max-Forwards

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in MalwareBytes Anti-Exploit "mbae.sys"

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Linux Kernel splice

An attacker can perform a denial of service attack.

01/29/2015

Denial of service vulnerability in Python Pillow Module PNG Text Chunks Decompression

An attacker can perform a denial of service attack.

01/20/2015