The goal of this project is to make virtual world a safer and better place without child pornography, major computer crime and RIAA.
Login As
You can log in if you are registered at one of these services:
Security Bulletins
Latest Malware Updates

Infostealer.Posteal

02/26/2015

Downloader.Busadom

02/26/2015

Trojan.Ladocosm

02/26/2015

SONAR.SuspDocRun

02/25/2015

SONAR.SuspHelpRun

02/25/2015

News

Megaupload founder remains a free man

In court Dotcom and his wife asked for permission to have access to $185,130 to pay rent of their mansion, security guards and other household staff’s services.

02/29/2012

Microsoft warned about possible financial information leak

Microsoft Store India web-site hack could cause customers’ financial information leak.

02/28/2012

Google will give $1 million for Chrome hacking

Developers claim that exploits for vulnerabilities in Chrome browser will help them to learn and develop.

02/28/2012

Five million Stratfor emails published by WikiLeaks

Stratfor claims that WikiLeaks actions are an attempt to silence and intimidate the company.

02/27/2012

USA put the usage of personal data under control

Companies should provide users appropriate control over their personal data, clear description why they need it and how they will use it.

02/24/2012

Web firms agreed to support do-not-track technology

Do-not-track technology will provide people with more control over the personal data collected about them.

02/24/2012

Megaupload founder released on bail

Kim Dotcom was released on bail, as he had no resources to flee New Zealand.

02/22/2012

Credentials exposure vulnerability discovered in Windows

Local administrator can disclose credentials of authenticated users.

02/21/2012

British ISPs might block The Pirate Bay

According to UK high court, The Pirate Bay unlawfully shared copyrighted music.

02/21/2012

Regime’s supporters in Syria use spyware against opposition activists

Malware steals personal information of its victims and sends it to a server of a government-owned telecommunications company in Syria.

02/20/2012

Most of DNS server implementations are vulnerable to DNS-poisoning attacks

A study revealed that cybercrooks can keep the domain names that had been deleted by upper level DNS servers resolvable.

02/17/2012

Anonymous threaten to “kill” the Internet

After cutting DNS servers, the HTTP Internet will be disabled, because nobody will be able to perform a domain name lookup.

02/17/2012

Ukrainian governmental web-sites faced heavy DDoS-attacks for closing file-sharing service ex.ua

Ex.ua, one of the largest file-sharing services, was shut down by officials in Ukraine.

02/02/2012

Bosnian national collected and distributed a great amount of child porn

The agents of the Bosnian Federal Police’s cybercrime unit arrested a Bosnian hacker, after they discovered he stored and distributed a great deal of child porn pictures and videos.

11/25/2011

LibreOffice fixes virus-friendly Word import flaw

The latest version of the software contains a fix for the problem.

10/07/2011

Developer function enables phishing at American Express

The vulnerability is found in a debugging function that is reachable over the Internet without further protection.

10/07/2011

Mozilla to Firefox users: Ditch crashtastic McAfee plugin

Mozilla is advising Firefox users to disable a McAfee plugin that the open-source browser supplier blames for a high volume of crashes.

10/06/2011

Android malware under blog control says Trend Micro

Beware the Chinese e-book reader.

10/06/2011

Rackspace spins up OpenStack Foundation

Rackspace is letting go of key components of the OpenStack Linux-for-the-cloud initiative it is helping to lead, with the creation of an OpenStack Foundation.

10/05/2011

Does Gove’s webmail policy breach Data Protection Act too?

Does the use of Gmail or Hotmail by a Minister's Private Office (in order to evade Freedom of Information (FOI) obligations) also lead to breaches in the Data Protection Act? Well, I can see how this could be the case.

09/29/2011

News 201 - 220 of 243
First | Prev. | 9 10 11 12 13 | Next | Last All

Security Advisories Database

Remote Code Execution Vulnerability in Microsoft OpenType Font Driver

A remote attacker can execute arbitrary code on the target system.

07/21/2015

SQL Injection Vulnerability in Piwigo

SQL inection vulnerability has been discovered in Piwigo.

02/05/2015

Cross-site Scripting Vulnerability in DotNetNuke

A cross-site scripting (XSS) vulnerability has been discovered in DotNetNuke.

02/05/2015

Cross-site Scripting Vulnerability in Hitachi Command Suite

A cross-site scripting vulnerability was found in Hitachi Command Suite.

02/02/2015

Denial of service vulnerability in FreeBSD SCTP RE_CONFIG Chunk Handling

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Apache Traffic Server HTTP TRACE Max-Forwards

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in MalwareBytes Anti-Exploit "mbae.sys"

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Linux Kernel splice

An attacker can perform a denial of service attack.

01/29/2015

Denial of service vulnerability in Python Pillow Module PNG Text Chunks Decompression

An attacker can perform a denial of service attack.

01/20/2015