The goal of this project is to make virtual world a safer and better place without child pornography, major computer crime and RIAA.
Login As
You can log in if you are registered at one of these services:
Security Bulletins
Latest Malware Updates

Infostealer.Posteal

02/26/2015

Downloader.Busadom

02/26/2015

Trojan.Ladocosm

02/26/2015

SONAR.SuspDocRun

02/25/2015

SONAR.SuspHelpRun

02/25/2015

News

Saudi Arabia wants Skype, Viber and WhatsApp to comply with government rules

Authorities state that the apps will be banned if they fail to follow their recommendations.

04/04/2013

New Trojan targets computers in the Middle East

BaneChant contains fileless malicious code and uses short URL or dynamic DNS-servers for users’ redirection.

04/03/2013

Hundreds of Android apps for Google Play infected with malware

More than two hundred apps containing ‘XXX’ content are infected with malware that uses “one-click fraud” technology.

04/03/2013

Anonymous stole 15 thousand passwords from North Korean site

Hackers oppose to North Korea government’s dictatorship.

04/02/2013

Vulnerabilities in Apple iMessage allow performing DoS-attacks and blocking the device

The attacks appear to have originated with a Twitter account involved in selling UDIDs.

04/02/2013

Backdoor uses Evernote as C&C server

Malware also uses the service as a drop-off point for hijacked data.

03/29/2013

One of Anonymous arrested for attack on Koch Industries

Hacker is convicted of helping Anonymous to take down the Koch Industries’ website.

03/28/2013

Experts: Any mobile phone user can be easily identified

Researchers need only four locations and times to identify a particular user.

03/26/2013

Matthew Garrett: Samsung notebooks’ UEFI-firmware gets locked when memory is full

According to the security expert, in order to function normally, the variable store must be less than 50% full.

03/26/2013

Windows Blue Build Leaked

The developers managed to grant users with higher level of personalization control.

03/25/2013

Five critical vulnerabilities found in Android-smartphones

Samsung was notified about the problems in January 2013 but didn’t respond to the researcher’s messages.

03/22/2013

NATO: Killing hackers is justified

Commissioners made a couple of suggestions on how to make cyberwars more peaceful.

03/22/2013

Chameleon botnet steals $ 6.2 million from advertisers per month

The botnet has about 120,000 hosts, located in the United States.

03/20/2013

Trend Micro: SCADA-systems are the main target of hackers

Experts analyzed attacks on ICS / SCADA-device by setting up honeypot.

03/19/2013

Google will pay $ 7 million for illegal interception of data transmitted over Wi-Fi

The company is accused of American citizens’ privacy breach while using the Street View program.

03/13/2013

Attacks on Microsoft and Facebook carried out using mobile app development sites

Nearly 40 companies were the victims of such attacks over the last few months, including car manufacturers, U.S. government agencies and a candy company.

03/12/2013

“Reporters Without Borders” named main enemies of the Internet

International organization published a new report containing a list of countries that are the main threat to the freedom of the Web.

03/12/2013

Chinese authorities use Skype to spy on users

Database of tracked keywords of the Chinese Skype version contains thousands of items and is continually enlarging.

03/11/2013

61-year-old hacker convicted in corporate hacking case

The former president of transportation logistics firm Exel hacked into the servers of his former employer.

03/06/2013

SCADA-sandbox allows testing the impact of cyberattacks on critical infrastructure

The new organization, which operates in Montreal, is capable of finding methods to block cyberthreats in real time.

03/05/2013

News 81 - 100 of 243
First | Prev. | 3 4 5 6 7 | Next | Last All

Security Advisories Database

Remote Code Execution Vulnerability in Microsoft OpenType Font Driver

A remote attacker can execute arbitrary code on the target system.

07/21/2015

SQL Injection Vulnerability in Piwigo

SQL inection vulnerability has been discovered in Piwigo.

02/05/2015

Cross-site Scripting Vulnerability in DotNetNuke

A cross-site scripting (XSS) vulnerability has been discovered in DotNetNuke.

02/05/2015

Cross-site Scripting Vulnerability in Hitachi Command Suite

A cross-site scripting vulnerability was found in Hitachi Command Suite.

02/02/2015

Denial of service vulnerability in FreeBSD SCTP RE_CONFIG Chunk Handling

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Apache Traffic Server HTTP TRACE Max-Forwards

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in MalwareBytes Anti-Exploit "mbae.sys"

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Linux Kernel splice

An attacker can perform a denial of service attack.

01/29/2015

Denial of service vulnerability in Python Pillow Module PNG Text Chunks Decompression

An attacker can perform a denial of service attack.

01/20/2015