Security Bulletins
Latest Malware Updates
Downloader.Busadom!g102/27/2015Infostealer.Posteal02/26/2015Downloader.Busadom02/26/2015Trojan.Ladocosm02/26/2015SONAR.SuspDocRun02/25/2015SONAR.SuspHelpRun02/25/2015W32.Tempedreve.D!inf02/25/2015SONAR.PUA!AlnadInsta02/25/2015SONAR.Infostealer!g502/25/2015SONAR.Infostealer!g402/25/2015 |
News
Saudi Arabia wants Skype, Viber and WhatsApp to comply with government rulesAuthorities state that the apps will be banned if they fail to follow their recommendations. 04/04/2013New Trojan targets computers in the Middle EastBaneChant contains fileless malicious code and uses short URL or dynamic DNS-servers for users’ redirection. 04/03/2013Hundreds of Android apps for Google Play infected with malwareMore than two hundred apps containing ‘XXX’ content are infected with malware that uses “one-click fraud” technology. 04/03/2013Anonymous stole 15 thousand passwords from North Korean siteHackers oppose to North Korea government’s dictatorship. 04/02/2013Vulnerabilities in Apple iMessage allow performing DoS-attacks and blocking the deviceThe attacks appear to have originated with a Twitter account involved in selling UDIDs. 04/02/2013Backdoor uses Evernote as C&C serverMalware also uses the service as a drop-off point for hijacked data. 03/29/2013One of Anonymous arrested for attack on Koch IndustriesHacker is convicted of helping Anonymous to take down the Koch Industries’ website. 03/28/2013Experts: Any mobile phone user can be easily identifiedResearchers need only four locations and times to identify a particular user. 03/26/2013Matthew Garrett: Samsung notebooks’ UEFI-firmware gets locked when memory is fullAccording to the security expert, in order to function normally, the variable store must be less than 50% full. 03/26/2013Windows Blue Build LeakedThe developers managed to grant users with higher level of personalization control. 03/25/2013Five critical vulnerabilities found in Android-smartphonesSamsung was notified about the problems in January 2013 but didn’t respond to the researcher’s messages. 03/22/2013NATO: Killing hackers is justifiedCommissioners made a couple of suggestions on how to make cyberwars more peaceful. 03/22/2013Chameleon botnet steals $ 6.2 million from advertisers per monthThe botnet has about 120,000 hosts, located in the United States. 03/20/2013Trend Micro: SCADA-systems are the main target of hackersExperts analyzed attacks on ICS / SCADA-device by setting up honeypot. 03/19/2013Google will pay $ 7 million for illegal interception of data transmitted over Wi-FiThe company is accused of American citizens’ privacy breach while using the Street View program. 03/13/2013Attacks on Microsoft and Facebook carried out using mobile app development sitesNearly 40 companies were the victims of such attacks over the last few months, including car manufacturers, U.S. government agencies and a candy company. 03/12/2013“Reporters Without Borders” named main enemies of the InternetInternational organization published a new report containing a list of countries that are the main threat to the freedom of the Web. 03/12/2013Chinese authorities use Skype to spy on usersDatabase of tracked keywords of the Chinese Skype version contains thousands of items and is continually enlarging. 03/11/201361-year-old hacker convicted in corporate hacking caseThe former president of transportation logistics firm Exel hacked into the servers of his former employer. 03/06/2013SCADA-sandbox allows testing the impact of cyberattacks on critical infrastructureThe new organization, which operates in Montreal, is capable of finding methods to block cyberthreats in real time. 03/05/2013News 81 - 100 of 243 First | Prev. | 3 4 5 6 7 | Next | Last |
Security Advisories Database
Remote Code Execution Vulnerability in Microsoft OpenType Font DriverA remote attacker can execute arbitrary code on the target system. 07/21/2015Multiple Vulnerabilities in Linux kernel03/04/2015SQL Injection Vulnerability in PiwigoSQL inection vulnerability has been discovered in Piwigo. 02/05/2015Cross-site Scripting Vulnerability in DotNetNukeA cross-site scripting (XSS) vulnerability has been discovered in DotNetNuke. 02/05/2015Cross-site Scripting Vulnerability in Hitachi Command SuiteA cross-site scripting vulnerability was found in Hitachi Command Suite. 02/02/2015Denial of service vulnerability in FreeBSD SCTP RE_CONFIG Chunk HandlingAn attacker can perform a denial of service attack. 01/30/2015Denial of service vulnerability in Apache Traffic Server HTTP TRACE Max-ForwardsAn attacker can perform a denial of service attack. 01/30/2015Denial of service vulnerability in MalwareBytes Anti-Exploit "mbae.sys"An attacker can perform a denial of service attack. 01/30/2015Denial of service vulnerability in Linux Kernel spliceAn attacker can perform a denial of service attack. 01/29/2015Denial of service vulnerability in Python Pillow Module PNG Text Chunks DecompressionAn attacker can perform a denial of service attack. 01/20/2015 |