Security Bulletins
Latest Malware Updates
Downloader.Busadom!g102/27/2015Infostealer.Posteal02/26/2015Downloader.Busadom02/26/2015Trojan.Ladocosm02/26/2015SONAR.SuspDocRun02/25/2015SONAR.SuspHelpRun02/25/2015W32.Tempedreve.D!inf02/25/2015SONAR.PUA!AlnadInsta02/25/2015SONAR.Infostealer!g502/25/2015SONAR.Infostealer!g402/25/2015 |
News
Google wants vendors to fix 0day vulnerabilities within one weekCompany demands that software vendors issue a fix or at least suggest temporary solution for zero-day bugs. 05/31/2013Motorola wants to replace passwords with pills and tattoosStill the company doubts that the alternative means of authentication will appear in the nearest future. 05/31/2013FBI ran child porn website for two weeks to track its usersCourt records indicate the site continued to distribute child pornography online while under FBI control. 05/30/2013U.S. government to use videogames in developing cyber war strategiesPentagon is working on Plan X to make cyber warfare as comprehensible and easy as firing a gun. 05/29/2013Chinese hackers stole Australian intelligence dataThe attackers now own documents detailing the ASIO building's communication cable layouts, server locations and security systems. 05/28/2013U.S. military accuses China of compromising advanced weapons designsU.S. intelligence agencies believe that hackers from China were able to obtain data on more than 20 cutting-edge developments. 05/28/2013Brian Krebs on Liberty Reserve being closed and accounts being frozenWhen payments were made, the owners of the system did not check users’ documents properly. 05/27/2013British company Sky – a victim of Syrian hackersAs a result of an incident, the users of Sky News, Sky Sports News and Sky WiFi may be affected. 05/27/2013Journalists accused of hacking after reporting data breachThe company, which leaked the data, accuses journalists of illegal access to information and the violation of Computer Fraud and Abuse Act. 05/23/2013Kim Dotcom claims he invented two-factor authenticationResearcher filed patent back in 1998. 05/23/2013HD Moore: Embedded systems vendors are carelessWhile systems administrators are doing their best to protect systems, they can not deal with threats contained in routers, modems, handsets, etc. 05/22/2013The number of Russian sites with child pornography declined by halfThe greatest number of resources with child pornography is now registered in the Netherlands and the United States. 05/21/2013Guantanamo jail disconnectedThe American military has turned off its Wi-Fi service following threats by Anonymous. 05/21/2013Developers hacked Google GlassAt the company’s I/O developer conference Google showed how to root the device. 05/20/2013The Conpot honeypot helps catching hackers targeting SCADA-systemsConpot detects cybercriminals scanning IP addresses for SCADA systems and then tracking their activities. 05/17/2013Symantec: Hackers attack European companies with Shadesrat TrojanCybercriminals begin attacks with a phone call to one of the victim’s employee. 05/17/2013Chinese university accused of cyberattacks on USAU.S. intelligence agencies suspect the representatives of Wuhan University. 05/16/2013ZPanel website hacked after abusive message of one of the developers of the control panelUse of unsafe method of encoding in ZPanel was repeatedly criticized. 05/16/2013Vulnerability in Apache mod_rewriteThe flaw allows executing arbitrary command when viewing the log file by the server administrator. 05/15/2013News 41 - 60 of 243 First | Prev. | 1 2 3 4 5 | Next | Last |
Security Advisories Database
Remote Code Execution Vulnerability in Microsoft OpenType Font DriverA remote attacker can execute arbitrary code on the target system. 07/21/2015Multiple Vulnerabilities in Linux kernel03/04/2015SQL Injection Vulnerability in PiwigoSQL inection vulnerability has been discovered in Piwigo. 02/05/2015Cross-site Scripting Vulnerability in DotNetNukeA cross-site scripting (XSS) vulnerability has been discovered in DotNetNuke. 02/05/2015Cross-site Scripting Vulnerability in Hitachi Command SuiteA cross-site scripting vulnerability was found in Hitachi Command Suite. 02/02/2015Denial of service vulnerability in FreeBSD SCTP RE_CONFIG Chunk HandlingAn attacker can perform a denial of service attack. 01/30/2015Denial of service vulnerability in Apache Traffic Server HTTP TRACE Max-ForwardsAn attacker can perform a denial of service attack. 01/30/2015Denial of service vulnerability in MalwareBytes Anti-Exploit "mbae.sys"An attacker can perform a denial of service attack. 01/30/2015Denial of service vulnerability in Linux Kernel spliceAn attacker can perform a denial of service attack. 01/29/2015Denial of service vulnerability in Python Pillow Module PNG Text Chunks DecompressionAn attacker can perform a denial of service attack. 01/20/2015 |