The goal of this project is to make virtual world a safer and better place without child pornography, major computer crime and RIAA.
Login As
You can log in if you are registered at one of these services:
Advertisement

You can always use information security services, such as penetration testing to stay secure.


Security Bulletins
Latest Malware Updates

OSX.Ventir

10/20/2014

Trojan.Cryptdef!gm

10/20/2014

Exp.CVE-2014-0565

10/20/2014

Backdoor.Plexor

10/20/2014

Backdoor.Emdivi

10/17/2014

W32.Qakbot!gen9

10/17/2014

Bloodhound.HWP.5

10/17/2014

Trojan.Beginto

10/16/2014

Trojan.Zbot!gen84

10/16/2014

Yontoo.C!gen1

10/16/2014

Open source hardware can protect against NSA spying

Open source hardware can protect against NSA spying

Eli Dourado from George Mason University suggested to use an open source hardware in order to protect the companies against NSA spying. It will more effectively detect backdoors and vulnerabilities that are built by NSA or other government agencies in the companies' system.

"To make the Internet less susceptible to mass surveillance, we need to recreate the physical layer of its infrastructure on the basis of open-source principles," stated Dourado.

According to the researcher, the use of hardware with open source will succeed, since everyone will be able to modify it, and then provide a modified version to the others. This policy had positive results with the open source software, including Linux and Apache web-servers.

The information about the NSA and U.S. intelligence agencies surveillance became available thanks to the former NSA employee Edward Snowden. At the moment we know that the NSA was gaining access to confidential data on users of services and products provided by Microsoft, Apple and Google.

The documents revealed by Snowden also stated that NSA could intercept Internet traffic through routers and switches. The open source hardware will be really difficult to tap.

Opponents of Dourado’s policies say that, in practice, it will be very difficult for companies to keep track of all hardware upgrades , especially to continuously examine updates of low-level code in hardware.

(c) Naked Security


Security Advisories Database

Cross-site Scripting Vulnerability in Tivoli Directory Server

A cross-site scripting vulnerability was reported in Tivoli Directory Server.

10/18/2014

SQL Injection Vulnerability in IP.Board IP.Content Module

SQL inection vulnerability was reported in IP.Board IP.Content Module.

10/17/2014

SQL Injection Vulnerability in Pligg CMS

SQL inection vulnerability was reported in Pligg CMS.

10/17/2014

SQL Injection Vulnerability in TYPO3 wt_directory Extension

SQL inection vulnerability was discovered in TYPO3 wt_directory Extension.

10/17/2014

SQL Injection Vulnerability in TYPO3 Address Visualization with Google Maps Extension

SQL inection vulnerability was discovered in TYPO3 Address Visualization with Google Maps Extension.

10/17/2014

SQL Injection Vulnerability in TYPO3 Flat Manager Extension

SQL inection vulnerability was discovered in TYPO3 Flat Manager Extension.

10/17/2014

SQL Injection Vulnerability in NULL Byte

SQL inection vulnerability has been discovered in NULL Byte.

10/17/2014

Cross-site Scripting Vulnerability in MicroPact iComplaints

A cross-site scripting vulnerability was discovered in MicroPact iComplaints.

10/17/2014

Cross-site Scripting Vulnerability in Cisco Unified Communications Manager

A cross-site scripting vulnerability was found in Cisco Unified Communications Manager.

10/17/2014

Cross-site Scripting Vulnerability in F5 Multiple Products Configuration Utility echo.jsp

A cross-site scripting vulnerability was discovered in F5 Multiple Products Configuration Utility echo.jsp.

10/17/2014