CZ.NIC
Open menu Close menu
  • Home
  • About us
  • Incident reporting
  • Projects
  • Reports
  • Cybersecurity
    • Security news
  • Česky
  • English

Millions of Android devices exposed to fake ID flaw

Aug. 1, 2014

Android devices are affected by a critical vulnerability which allows a malicious app to impersonate a trusted application inheriting its permissions.

Hackers can exploit USB devices to trigger undetectable attacks

Aug. 1, 2014

Security experts demonstrated that USB devices can be used to compromise personal computers in a potential new type of attacks that evade all actual security protections.

TOR Users Allegedly De-anonymized due to “Relay Early” Attack

Aug. 1, 2014

Tor users may have been de-anonymized due to a ‘relay early’ attack that spawned from February 2014 to July 4, according to The Tor Project’s blog post.

Zero-Day Vulnerabilities Found in Symantec Endpoint Protection

Aug. 1, 2014

While conducting penetration testing for one of its customers, Offensive Security uncovered three zero-day vulnerabilities in Symantec Endpoint Protection (SEP) that can be exploi…

Instagram Mobile App Issue Leads to Account Hijacking Vulnerability

July 29, 2014

A critical issue on Instagram’s Android Application has been disclosed by a security researcher that could allow an attacker to hijack users’ account and successfully access priva…

  • Previous
  • ...
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • ...
  • Next

Veškerý obsah je k dispozici pod licencí Creative Commons Uveďte původ-Zachovejte 3.0  2019

Veškerý obsah je archivován na WebArchivu Národní knihovny ČR.

je provozovatelem CSIRT.CZ.