WordPress Can Be Used to Leverage Critical Ghost Flaw in Linux
The vulnerability revealed by security researchers at Qualys, who dubbed it Ghost, this week could be taken advantage of through WordPress or other PHP applications to compromise …
The vulnerability revealed by security researchers at Qualys, who dubbed it Ghost, this week could be taken advantage of through WordPress or other PHP applications to compromise …
Security researcher is investigating in a new strain of Facebook Trojan that in just two days has already infected 1110,000 Facebook users.
At least one and likely more D-Link routers as well as those of other manufacturers using the same firmware are vulnerable to remote changing of DNS settings and, effectively, tra…
A heap-based buffer overflow was found in glibc's __nss_hostname_digits_dots() function, which is used by the gethostbyname() and gethostbyname2() glibc function calls. A remote a…
Bad week-end for Facebook users: a malicious tagging campaign ended up infecting at least 5 thousand computer users with a backdoor. This three-day campaign has been actively mirr…