CZ.NIC
Open menu Close menu
  • Home
  • About us
  • Incident reporting
  • Projects
  • Reports
  • Cybersecurity
    • Security news
  • Česky
  • English

Default ATM passcodes still exploited by crooks

Nov. 17, 2014

Once again, ATMs have been "hacked" by individuals taking advantage of default, factory-set passcodes.

81 percent of Tor clients can be identified with traffic analysis attack

Nov. 15, 2014

The research revealed that more than 81 percent of Tor clients can be de-anonymized by exploiting a new traffic analysis attack based on Netflow technology.

Internet Voting Security Risks Highlighted by New Wireless Router Attack

Nov. 15, 2014

Researchers have published a paper detailing a new attack method that can be leveraged to silently modify the digital ballots used in the Internet voting process.

BASHLITE Malware Uses ShellShock to Hijack Devices Running BusyBox

Nov. 15, 2014

A new version of the BASHLITE malware is designed to scan compromised networks for devices that use BusyBox and attempts to access them by using predifined list of usernames and p…

Unused IP Addresses Are Hijacked by Spammers Through Technical Loophole

Nov. 14, 2014

A weakness in the way some countries manage the IP address ranges assigned to Internet Service Providers (ISPs) and hosting providers has been abused by spammers, who have hijacke…

  • Previous
  • ...
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • ...
  • Next

Veškerý obsah je k dispozici pod licencí Creative Commons Uveďte původ-Zachovejte 3.0  2019

Veškerý obsah je archivován na WebArchivu Národní knihovny ČR.

je provozovatelem CSIRT.CZ.