The goal of this project is to make virtual world a safer and better place without child pornography, major computer crime and RIAA.
Login As
You can log in if you are registered at one of these services:
Security Bulletins
Latest Malware Updates

Infostealer.Posteal

02/26/2015

Downloader.Busadom

02/26/2015

Trojan.Ladocosm

02/26/2015

SONAR.SuspDocRun

02/25/2015

SONAR.SuspHelpRun

02/25/2015

News

Multiple vulnerabilities in Flash Player, Apache and Foxit Reader found and patched

Naked-Security.com recommends users to install security patches as soon as possible.

08/22/2012

Crooks use iPhone rush to exploit fresh Flash Player flaw

The malicious .doc attachments contain CVE-2012-1535 exploit.

08/21/2012

Krebs got new details about Grum botnet

The researcher claimed that the Grum control server hosted a large number of email addresses — more than 350 GB.

08/20/2012

Court: Dotcom has the right to see FBI evidence against him

According to the judge, suppression of evidence limits Dotcom lawyers’ ability to participate in hearings.

08/17/2012

Washington uses TrapWire technology to spy on people

Secret documents revealing the government spy network that uses ordinary surveillance cameras were leaked on WikiLeaks.

08/15/2012

Google will punish pirate sites with low search rankings

Search ranking will depend on valid takedown notices from right holders.

08/13/2012

"Kaspersky Lab" found new cyber-weapons used in the Middle East

The new virus affected the customers of Citibank and of the payment system Paypal.

08/10/2012

Twitter disclosed the data of the user who threatened to attack people at the Broadway theatre

Subpoena allowed the NYPD to get the needed information and continue the investigation of the incident.

08/08/2012

LinkedIn spent $1 million on data breach investigation

The company wants to implement more reliable technologies for users’ data protection to prevent data breaches in the future.

08/07/2012

Breaking iCloud account allowed hackers to remotely wipe iPhone, iPad and MacBook Air

Hackers got access to journalist’s account via Apple tech support and some clever social engineering that let them bypass security questions.

08/06/2012

Missile Defense Agency staff banned from surfing porn sites

Access to the pornography resources can result in disciplinary action for agency staff.

08/03/2012

Linux-based systems affected by bogus leap second

Experts believe that under the guise of another time synchronization, Linux-based systems were the target of DoS-attack.

08/02/2012

Ubisoft patch critical Uplay vulnerability

The Uplay flaw allowed specially crafted web pages to run arbitrary files.

07/31/2012

Report: Free mobile apps pose security threats

The Appthority’s report indicates risks that top 50 free apps bring.

07/30/2012

Leak cost Global Payments more than $100 million

Global Payments has paid $84 million for investigation and compensation and is going to pay additional $25-35 million next year.

07/27/2012

Dr. Web discovers new cross platform Trojan

The BackDoor.DaVinci.1 malware features a special bomb module that can destroy an OS installation completely.

07/26/2012

Intego spots new Mac OS X Trojan

Crisis malware could compromise a system with low level of privileges.

07/25/2012

US President calls for Cybersecurity act 2012

Barack Obama encourages Congress to send him comprehensive legislation on cybersecurity.

07/23/2012

Russian hacker arrested in Cyprus

The man is accused of conducting DDoS attacks on Amazon, Ebay and Priceline.

07/20/2012

Criminals who stole money from bank accounts were arrested in Russia

Criminals had a hidden remote access to banks’ computers and that helped them to steal the money.

07/17/2012

News 121 - 140 of 243
First | Prev. | 5 6 7 8 9 | Next | Last All

Security Advisories Database

Remote Code Execution Vulnerability in Microsoft OpenType Font Driver

A remote attacker can execute arbitrary code on the target system.

07/21/2015

SQL Injection Vulnerability in Piwigo

SQL inection vulnerability has been discovered in Piwigo.

02/05/2015

Cross-site Scripting Vulnerability in DotNetNuke

A cross-site scripting (XSS) vulnerability has been discovered in DotNetNuke.

02/05/2015

Cross-site Scripting Vulnerability in Hitachi Command Suite

A cross-site scripting vulnerability was found in Hitachi Command Suite.

02/02/2015

Denial of service vulnerability in FreeBSD SCTP RE_CONFIG Chunk Handling

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Apache Traffic Server HTTP TRACE Max-Forwards

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in MalwareBytes Anti-Exploit "mbae.sys"

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Linux Kernel splice

An attacker can perform a denial of service attack.

01/29/2015

Denial of service vulnerability in Python Pillow Module PNG Text Chunks Decompression

An attacker can perform a denial of service attack.

01/20/2015