CZ.NIC
Open menu Close menu
  • Home
  • About us
  • Incident reporting
  • Projects
  • Reports
  • Cybersecurity
    • Security news
  • Česky
  • English

MS Windows Local Privilege Escalation Zero-Day in The Wild

Nov. 28, 2013

FireEye Labs has identified a new Windows local privilege escalation vulnerability in the wild. The vulnerability cannot be used for remote code execution but could allow a standa…

New Crimekit Atrax Exploits Tor, Mines Bitcoin and Much More

Nov. 28, 2013

Atrax, yet another commercial crimekit on the black market, a malware able to exploit Tor and that implements numerous features including Bitcoin mining.

SIM Card Forensics: An Introduction

Nov. 26, 2013

The SIM (subscriber identity module) is a fundamental component of cellular phones.

Most iOS Apps Are Vulnerable to Hackers, Study Shows

Nov. 26, 2013

Some 90 percent of iOS mobile applications have at least one security vulnerability, according to HP research. The company’s enterprise security team, HP Fortify, tested 2,107 mob…

Fake Donation Requests for Victims of the Typhoon in Philippines

Nov. 20, 2013

Would you like to help victims of the recent typhoon that devastated the Philippines? Well, don’t do it via e-mails or directly to people who may be only posing as social workers …

  • Previous
  • ...
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • ...
  • Next

Veškerý obsah je k dispozici pod licencí Creative Commons Uveďte původ-Zachovejte 3.0  2019

Veškerý obsah je archivován na WebArchivu Národní knihovny ČR.

je provozovatelem CSIRT.CZ.