CZ.NIC
Open menu Close menu
  • Home
  • About us
  • Incident reporting
  • Projects
  • Reports
  • Cybersecurity
    • Security news
  • Česky
  • English

Linux DDoS Trojan embeds RootKit component

Jan. 9, 2015

Security experts at Avast have analyzed a new strain of DDoS trojan targeting Linux operating system dubbed XOR.DDoS which embeds a RootKit component.

ASUS Routers Plagued by Command Execution Vulnerability

Jan. 9, 2015

Many ASUS wireless routers are affected by a vulnerability that can be exploited by an attacker with access to the target’s local area network (LAN) to execute arbitrary commands.…

Android Manifest File Attacks Can Make Devices Inoperable

Jan. 9, 2015

Researchers at Trend Micro have identified a vulnerability related to the Android manifest file that can be exploited to cause devices to crash.

OpenSSL Fixes Eight Security Vulnerabilities

Jan. 9, 2015

The OpenSSL Project has released several new versions of the software that fix eight security vulnerabilities, including several certificate issues and a couple of denial-of-servi…

SocialPath Malware Backs Up Your Data… to a C&C Server

Jan. 9, 2015

Security experts have discovered new data-stealing malware disguised as a legitimate-looking back-up application on Google Play.

The Save Me app claims to be able to save a user’…

  • Previous
  • ...
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • ...
  • Next

Veškerý obsah je k dispozici pod licencí Creative Commons Uveďte původ-Zachovejte 3.0  2019

Veškerý obsah je archivován na WebArchivu Národní knihovny ČR.

je provozovatelem CSIRT.CZ.