The goal of this project is to make virtual world a safer and better place without child pornography, major computer crime and RIAA.
Login As
You can log in if you are registered at one of these services:
Security Bulletins
Latest Malware Updates

Infostealer.Posteal

02/26/2015

Downloader.Busadom

02/26/2015

Trojan.Ladocosm

02/26/2015

SONAR.SuspDocRun

02/25/2015

SONAR.SuspHelpRun

02/25/2015

U.S. Department of Defense blocked The Guardian website

U.S. Department of Defense blocked The Guardian website

American news portal The Guardian was blocked by the decision of Pentagon authorities because the resource published secret documents of the U.S. Department of Defense. For some time users could visit only main page of The Guardian, they were also redirected to it when trying to navigate through the sections. However, it is known that the website can not be accessed via Army computers.

The decision of the authorities was motivated by the need to protect the “integrity of unclassified government information systems.”

On June 7, The Guardian stuff received a memo with a following comment:

Classified information, whether or not already posted on public websites, disclosed to the media, or otherwise in the public domain remains classified and must be treated as such until it is declassified by an appropriate US government authority. It is the responsibility of every DoD employee and contractor to protect classified information and to follow established procedures for accessing classified information only through authorized means. Leadership must establish a vigilant command climate that underscores the critical importance of safeguarding classified material against compromise.

Accordingly, we request all DoD components send prompt notification to your employees and contractors reminding them of these obligations. Procedures for responding to classified information found in the public domain are attached…

The Guardian periodically publishes information that must not be distributed, and despite the fact that these documents are made public, they maintain secrecy.

Representatives of the U.S. Department of Defense also point out that if someone managed to gain access to secret information, they should immediately clear the browser cache. Otherwise, it can be interpreted as disribution of secret information.

(c) Naked Security


Security Advisories Database

Remote Code Execution Vulnerability in Microsoft OpenType Font Driver

A remote attacker can execute arbitrary code on the target system.

07/21/2015

SQL Injection Vulnerability in Piwigo

SQL inection vulnerability has been discovered in Piwigo.

02/05/2015

Cross-site Scripting Vulnerability in DotNetNuke

A cross-site scripting (XSS) vulnerability has been discovered in DotNetNuke.

02/05/2015

Cross-site Scripting Vulnerability in Hitachi Command Suite

A cross-site scripting vulnerability was found in Hitachi Command Suite.

02/02/2015

Denial of service vulnerability in FreeBSD SCTP RE_CONFIG Chunk Handling

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Apache Traffic Server HTTP TRACE Max-Forwards

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in MalwareBytes Anti-Exploit "mbae.sys"

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Linux Kernel splice

An attacker can perform a denial of service attack.

01/29/2015

Denial of service vulnerability in Python Pillow Module PNG Text Chunks Decompression

An attacker can perform a denial of service attack.

01/20/2015