CZ.NIC
Open menu Close menu
  • Home
  • About us
  • Incident reporting
  • Projects
  • Reports
  • Cybersecurity
    • Security news
  • Česky
  • English

How Shellshock can be exploited over DHCP

Oct. 10, 2014

Attacks exploiting the Shellshock vulnerability (actually, vulnerabilities) are popping up daily, but while Shellshock attacks on web apps have been the most documented and discus…

Cyber Espionage Group Uses Bank Website to Redirect to Exploit Kit

Oct. 10, 2014

A watering-hole attack has been discovered to be orchestrated by a cyber-espionage group that targets individuals connected to the military sector; victims are redirected from the…

Authentication Flaw in PayPal mobile API Allows Access to Blocked Accounts

Oct. 10, 2014

Payment services provider PayPal is vulnerable to an authentication restriction bypass vulnerability, which could allow an attacker to bypass a filter or restriction of the online…

DREBIN Android app detects 94 percent of mobile malware

Oct. 10, 2014

A team of German researchers developed an innovative Android app dubbed DREBIN capable of detecting 94 percent of mobile malware.

Emma Watson Leaked Facebook Video Reveals Trojans, Not Nude Pictures

Oct. 10, 2014

A new scam takes advantage of Emma Watson’s growing popularity, using the actress as bait to spread malware on Facebook, according to the Bitdefender Labs.

  • Previous
  • ...
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • ...
  • Next

Veškerý obsah je k dispozici pod licencí Creative Commons Uveďte původ-Zachovejte 3.0  2019

Veškerý obsah je archivován na WebArchivu Národní knihovny ČR.

je provozovatelem CSIRT.CZ.