The goal of this project is to make virtual world a safer and better place without child pornography, major computer crime and RIAA.
Login As
You can log in if you are registered at one of these services:
Security Bulletins
Latest Malware Updates

Infostealer.Posteal

02/26/2015

Downloader.Busadom

02/26/2015

Trojan.Ladocosm

02/26/2015

SONAR.SuspDocRun

02/25/2015

SONAR.SuspHelpRun

02/25/2015

News

PayPal: The era of online passwords comes to an end

The company wants to use embedded fingerprint scanners on mobile phones to authenticate users.

02/28/2013

US start unprecedented counter-attack on Chinese hackers

Such measures will be held as a response to attacks of Chinese hackers who are accused of stealing American industrial secrets.

02/22/2013

Fake Chrome extension compromises Facebook profiles

Hackers use malware which allows them to gain full control over Facebook profiles.

02/21/2013

KrebsOnSecurity: Bit9 Breach Started in July 2012

The custom-made malicious software was deployed last year in attacks against U.S. Defense contractors.

02/21/2013

Hacker attacked the computers of Apple’s employees

The company said in a statement that sensitive information was not compromised.

02/20/2013

More Than 6 000 Users Signed Microsoft’s “Scroogled” Petition

Analysts call Microsoft’s campaign a failure, if taking into account that only 0.002 percent of Google’s users signed the petition.

02/15/2013

Rodpicom worm aims at infecting Skype and MSN Messenger users

The worm installs a backdoor on the user's system to download additional malware, sends spam, and connects to the C&C server to download its new versions.

02/13/2013

YouTube will be blocked in Egypt for “Innocence of Muslims”

Google was not notified about the recent court ruling and didn't receive any orders.

02/11/2013

Researchers warn about Whitehole Exploit Kit

New toolkit is notable for an ability to hide itself from antimalware detections.

02/07/2013

MITRE: Three Possible Ways of New CVE Identification

New ways of identifying will give a possibility to register about 999 999 vulnerabilities per year.

02/07/2013

Fortinet on “Crime-as-a-Service”

According to the company’s report, criminals are trying to create a definite structure in order to organize cybercrimes.

02/07/2013

FBI busted cybercriminal ring responsible for $850 losses

Criminals infected the computers of Facebook users with the malware ‘Yahos’.

12/12/2012

Iranian authorities have opened access to Gmail

Gmail is now available as users can no longer switch from Gmail to YouTube.

10/01/2012

Operation b70: Microsoft has the right to take over domains

US District Court ruling allows Microsoft to take over domains related to the Nitol virus.

09/14/2012

Insiders assisted the hackers to breach Saudi Aramco

The attack was carried out with the help of Shamoon - virus, which was distributed to the company’s intranet and deleted all the data from computers’ hard drives.

09/07/2012

The Big Brother gathers IPs of BitTorrent users

The lists of BitTorrent users are usually updated once in three hours.

09/05/2012

Antisec leak data on 12 million Apple clients

Hackers posted a file with 1 million Unique Device Identifiers.

09/04/2012

Hackers repeatedly broke into Saudi Aramco

The second attack allowed the hackers to steal company’s confidential information.

08/29/2012

Saudi Arabia's National Oil Company attacked with virus originated from external sources

In the official statement the company noted that roughly 30,000 workstations were affected via cyberattack.

08/27/2012

Google: USA needs to ditch software patents

According to Google, software patents are not helpful to innovation.

08/23/2012

News 101 - 120 of 243
First | Prev. | 4 5 6 7 8 | Next | Last All

Security Advisories Database

Remote Code Execution Vulnerability in Microsoft OpenType Font Driver

A remote attacker can execute arbitrary code on the target system.

07/21/2015

SQL Injection Vulnerability in Piwigo

SQL inection vulnerability has been discovered in Piwigo.

02/05/2015

Cross-site Scripting Vulnerability in DotNetNuke

A cross-site scripting (XSS) vulnerability has been discovered in DotNetNuke.

02/05/2015

Cross-site Scripting Vulnerability in Hitachi Command Suite

A cross-site scripting vulnerability was found in Hitachi Command Suite.

02/02/2015

Denial of service vulnerability in FreeBSD SCTP RE_CONFIG Chunk Handling

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Apache Traffic Server HTTP TRACE Max-Forwards

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in MalwareBytes Anti-Exploit "mbae.sys"

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Linux Kernel splice

An attacker can perform a denial of service attack.

01/29/2015

Denial of service vulnerability in Python Pillow Module PNG Text Chunks Decompression

An attacker can perform a denial of service attack.

01/20/2015