7Security Blog Posts

  • Major government websites hacked with access for sale
    on Jan 24, 2011
    Visit our Sponsor's sites:Web site hosting providerVirtual private serverResearchers from Imperva's Hacker Intelligence Initiative (HII) have found dozens of .mil, .gov and .edu web sites which have been hacked with access up for sale due to SQL inje...
  • EU halts carbon trading after 'concerted' hack attacks
    on Jan 23, 2011 in hack attack
    News From TheregisterThe European Commission has temporarily halted trading of carbon emissions credits following revelations that some two-million allowances worth about €30m were stolen from insecure accounts in recent days. At least three of...
  • Kaspersky Antivirus 2011 One License for Free just for you!
    on Jul 2, 2010
    Do you want to have the best antivirus? The Best Promo!Promo! Click on any Banner and buy it Now! Don't Lose Your Chance! Be the first! Buy it right now and if you buy 3 licenses of Kaspersky Antivirus 2011 we will give you one more license for...
  • Kaspersky Antivirus 2011 One License for Free just for you!
    on Jul 2, 2010
    Do you want to have the best antivirus? The Best Promo!Promo! Click on any Banner and buy it Now! Don't Lose Your Chance! Be the first! Buy it right now and if you buy 3 licenses of Kaspersky Antivirus 2011 we will give you one more license for...
  • RapidGet Widget – Wordpress Widget: Download from rapidshare free and with premium acces for free!
    on Jan 8, 2010
    Visit our Spanish Blog Descargas Premium for more info: DEscargas Premium...
  • RapidGet Widget – Wordpress Widget: Download from rapidshare free and with premium acces for free!
    on Jan 8, 2010
    Visit our Spanish Blog Descargas Premium for more info: DEscargas Premium...
  • (IN)SECURE Magazine issue 23 released
    on Nov 17, 2009 in News
    (IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 23 has been released today.Read More: Here...
  • Apple Safari 4.0.4 patches critical vulnerabilities
    on Nov 17, 2009 in News
    ColorSyncAn integer overflow exists in the handling of images with an embedded color profile, which may lead to a heap buffer overflow. Opening a maliciously crafted image with an embedded color profile may lead to an unexpected application terminati...
  • WordPress 2.8.6 security release
    on Nov 17, 2009 in News
    WordPress 2.8.6 fixes two security problems that can be exploited by registered, logged in users who have posting privileges. If you have untrusted authors on your blog, upgrading to 2.8.6 is recommended.The first problem is an XSS vulnerability in P...
  • DNS problem linked to DDoS attacks gets worse
    on Nov 17, 2009 in News
    Internet security experts say that misconfigured DSL and cable modems are worsening a well-known problem with the Internet's DNS (domain name system), making it easier for hackers to launch distributed denial-of-service (DDoS) attacks against their v...
  • (IN)SECURE Magazine issue 23 released
    on Nov 17, 2009 in News
    (IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 23 has been released today.Read More: Here...
  • Apple Safari 4.0.4 patches critical vulnerabilities
    on Nov 17, 2009 in News
    ColorSyncAn integer overflow exists in the handling of images with an embedded color profile, which may lead to a heap buffer overflow. Opening a maliciously crafted image with an embedded color profile may lead to an unexpected application terminati...
  • Apple Safari 4.0.4 patches critical vulnerabilities
    on Nov 17, 2009 in News
    ColorSyncAn integer overflow exists in the handling of images with an embedded color profile, which may lead to a heap buffer overflow. Opening a maliciously crafted image with an embedded color profile may lead to an unexpected application terminati...
  • WordPress 2.8.6 security release
    on Nov 17, 2009 in News
    WordPress 2.8.6 fixes two security problems that can be exploited by registered, logged in users who have posting privileges. If you have untrusted authors on your blog, upgrading to 2.8.6 is recommended.The first problem is an XSS vulnerability in P...
  • DNS problem linked to DDoS attacks gets worse
    on Nov 17, 2009 in News
    Internet security experts say that misconfigured DSL and cable modems are worsening a well-known problem with the Internet's DNS (domain name system), making it easier for hackers to launch distributed denial-of-service (DDoS) attacks against their v...
  • WordPress 2.8.6 security release
    on Nov 17, 2009 in News
    WordPress 2.8.6 fixes two security problems that can be exploited by registered, logged in users who have posting privileges. If you have untrusted authors on your blog, upgrading to 2.8.6 is recommended.The first problem is an XSS vulnerability in P...
  • (IN)SECURE Magazine issue 23 released
    on Nov 17, 2009 in News
    (IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 23 has been released today.Read More: Here...
  • DNS problem linked to DDoS attacks gets worse
    on Nov 17, 2009 in News
    Internet security experts say that misconfigured DSL and cable modems are worsening a well-known problem with the Internet's DNS (domain name system), making it easier for hackers to launch distributed denial-of-service (DDoS) attacks against their v...
  • Grsync: GUI for rsync 0.9.2 released
    on Oct 15, 2009 in News
    Grsync is an open source rsync GUI. It can be effectively used to synchronize local directories and it supports remote targets as well (even though it doesn't support browsing the remote folder).Features:Most commonly used rsync options available, ad...
  • Web Application Security Scanner Evaluation Criteria 1.0 released
    on Oct 15, 2009 in News
    Web Application Security Scanners are automated tools to test web applications for common security problems such as cross-site scripting, SQL injection, directory traversal, insecure configurations, and remote command execution vulnerabilities. These...
Close