The goal of this project is to make virtual world a safer and better place without child pornography, major computer crime and RIAA.
Login As
You can log in if you are registered at one of these services:
Security Bulletins
Latest Malware Updates

Infostealer.Posteal

02/26/2015

Downloader.Busadom

02/26/2015

Trojan.Ladocosm

02/26/2015

SONAR.SuspDocRun

02/25/2015

SONAR.SuspHelpRun

02/25/2015

News

Google wants vendors to fix 0day vulnerabilities within one week

Company demands that software vendors issue a fix or at least suggest temporary solution for zero-day bugs.

05/31/2013

Motorola wants to replace passwords with pills and tattoos

Still the company doubts that the alternative means of authentication will appear in the nearest future.

05/31/2013

FBI ran child porn website for two weeks to track its users

Court records indicate the site continued to distribute child pornography online while under FBI control.

05/30/2013

U.S. government to use videogames in developing cyber war strategies

Pentagon is working on Plan X to make cyber warfare as comprehensible and easy as firing a gun.

05/29/2013

Chinese hackers stole Australian intelligence data

The attackers now own documents detailing the ASIO building's communication cable layouts, server locations and security systems.

05/28/2013

U.S. military accuses China of compromising advanced weapons designs

U.S. intelligence agencies believe that hackers from China were able to obtain data on more than 20 cutting-edge developments.

05/28/2013

Brian Krebs on Liberty Reserve being closed and accounts being frozen

When payments were made, the owners of the system did not check users’ documents properly.

05/27/2013

British company Sky – a victim of Syrian hackers

As a result of an incident, the users of Sky News, Sky Sports News and Sky WiFi may be affected.

05/27/2013

Journalists accused of hacking after reporting data breach

The company, which leaked the data, accuses journalists of illegal access to information and the violation of Computer Fraud and Abuse Act.

05/23/2013

Kim Dotcom claims he invented two-factor authentication

Researcher filed patent back in 1998.

05/23/2013

Reckz0r claims hacking CNN website

Attacker managed to publish four fake articles.

05/22/2013

HD Moore: Embedded systems vendors are careless

While systems administrators are doing their best to protect systems, they can not deal with threats contained in routers, modems, handsets, etc.

05/22/2013

The number of Russian sites with child pornography declined by half

The greatest number of resources with child pornography is now registered in the Netherlands and the United States.

05/21/2013

Guantanamo jail disconnected

The American military has turned off its Wi-Fi service following threats by Anonymous.

05/21/2013

Developers hacked Google Glass

At the company’s I/O developer conference Google showed how to root the device.

05/20/2013

The Conpot honeypot helps catching hackers targeting SCADA-systems

Conpot detects cybercriminals scanning IP addresses for SCADA systems and then tracking their activities.

05/17/2013

Symantec: Hackers attack European companies with Shadesrat Trojan

Cybercriminals begin attacks with a phone call to one of the victim’s employee.

05/17/2013

Chinese university accused of cyberattacks on USA

U.S. intelligence agencies suspect the representatives of Wuhan University.

05/16/2013

ZPanel website hacked after abusive message of one of the developers of the control panel

Use of unsafe method of encoding in ZPanel was repeatedly criticized.

05/16/2013

Vulnerability in Apache mod_rewrite

The flaw allows executing arbitrary command when viewing the log file by the server administrator.

05/15/2013

News 41 - 60 of 243
First | Prev. | 1 2 3 4 5 | Next | Last All

Security Advisories Database

Remote Code Execution Vulnerability in Microsoft OpenType Font Driver

A remote attacker can execute arbitrary code on the target system.

07/21/2015

SQL Injection Vulnerability in Piwigo

SQL inection vulnerability has been discovered in Piwigo.

02/05/2015

Cross-site Scripting Vulnerability in DotNetNuke

A cross-site scripting (XSS) vulnerability has been discovered in DotNetNuke.

02/05/2015

Cross-site Scripting Vulnerability in Hitachi Command Suite

A cross-site scripting vulnerability was found in Hitachi Command Suite.

02/02/2015

Denial of service vulnerability in FreeBSD SCTP RE_CONFIG Chunk Handling

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Apache Traffic Server HTTP TRACE Max-Forwards

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in MalwareBytes Anti-Exploit "mbae.sys"

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Linux Kernel splice

An attacker can perform a denial of service attack.

01/29/2015

Denial of service vulnerability in Python Pillow Module PNG Text Chunks Decompression

An attacker can perform a denial of service attack.

01/20/2015