CZ.NIC
Open menu Close menu
  • Home
  • About us
  • Incident reporting
  • Projects
  • Reports
  • Cybersecurity
    • Security news
  • Česky
  • English

81 percent of Tor clients can be identified with traffic analysis attack

Nov. 15, 2014

The research revealed that more than 81 percent of Tor clients can be de-anonymized by exploiting a new traffic analysis attack based on Netflow technology.

Internet Voting Security Risks Highlighted by New Wireless Router Attack

Nov. 15, 2014

Researchers have published a paper detailing a new attack method that can be leveraged to silently modify the digital ballots used in the Internet voting process.

BASHLITE Malware Uses ShellShock to Hijack Devices Running BusyBox

Nov. 15, 2014

A new version of the BASHLITE malware is designed to scan compromised networks for devices that use BusyBox and attempts to access them by using predifined list of usernames and p…

Unused IP Addresses Are Hijacked by Spammers Through Technical Loophole

Nov. 14, 2014

A weakness in the way some countries manage the IP address ranges assigned to Internet Service Providers (ISPs) and hosting providers has been abused by spammers, who have hijacke…

Snapchat Warns Users of Malicious Third-Party Apps

Nov. 14, 2014

Snapchat will ask customers to stop using unauthorized third-party apps built on Snapchat services as they may compromise their accounts, the company announced in a blog post.

  • Previous
  • ...
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • ...
  • Next

Veškerý obsah je k dispozici pod licencí Creative Commons Uveďte původ-Zachovejte 3.0  2019

Veškerý obsah je archivován na WebArchivu Národní knihovny ČR.

je provozovatelem CSIRT.CZ.