CZ.NIC
Open menu Close menu
  • Home
  • About us
  • Incident reporting
  • Projects
  • Reports
  • Cybersecurity
    • Security news
  • Česky
  • English

Top ten rules for network administrators related to internet connectivity

June 17, 2013

Last article from series about internet security is dedicated to rules and procedures which are important during connecting your network to the internet. CSIRT.CZ supports this se…

Remove unofficial debian-multimedia.org repository from your sources

June 16, 2013

The unofficial third party repository Debian Multimedia stopped using the domain debian-multimedia.org some months ago. The domain expired and it is now registered again by someon…

Old Bug in Flash Allows Cyber-Crooks to start Webcams, Microphone

June 16, 2013

An older flaw in the Adobe Flash plugin that should have been fixed two years ago is still exploitable by cyber-criminals, leading to users getting spied on in real time via the b…

Medical Equipment Highly Vulnerable to Intruders

June 16, 2013

Patients using medical gear such as pacemakers, heart defibrillators and insulin dispensers could become moving targets for cyber-criminals, according to a federal note issued by …

The Business Behind a Hacked Email Account

June 13, 2013

Which is the commercial value of a hacked email account in the underground? How cybercriminals use a compromised email account? Why do they have to hit me?

  • Previous
  • ...
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • ...
  • Next

All content is available under license Creative Commons State the origin - preserve it 3.0  2019

All content is archived on the WebArchive of the National Library of the Czech Republic.

is the operator of CSIRT.CZ.