CZ.NIC
Open menu Close menu
  • Home
  • About us
  • Incident reporting
  • Projects
  • Reports
  • Cybersecurity
    • Security news
  • Česky
  • English

Developers Hack Dropbox, Show How to Access to User Data

Aug. 29, 2013

Developers who were able to bypass Dropbox's security by reverse-engineering Python applications -- the language used by the cloud storage provider -- described their technique in…

Hacking, Surveilling, and Deceiving victims on Smart TV

Aug. 28, 2013

Smart TVs sold over 80,000,000 units around the world in 2012. This next generation "smart" platform is becoming more and more popular. On the other hand, we hardly see security r…

Fake Xerox Scans Deliver Malware

Aug. 28, 2013

A recent spam campaign abuses the name of Xerox, inviting users to download a scanned file to infect their systems with Trojans. The subject tagline is “Scan from a Xerox WorkCent…

Java Vulnerability Exploit Added to Neutrino Attack Kit

Aug. 27, 2013

Security researchers are recommending Java users upgrade to the latest version due to a new exploit that has made its way into the Neutrino exploit kit.

Critical Pinterest Exploit threatens the privacy of millions of users

Aug. 25, 2013

The security researcher Dan Melamed has found a Critical Pinterest Exploit that compromised the privacy of over 70 Million Users, the flaw allows hackers to view the email address…

  • Previous
  • ...
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • ...
  • Next

Veškerý obsah je k dispozici pod licencí Creative Commons Uveďte původ-Zachovejte 3.0  2019

Veškerý obsah je archivován na WebArchivu Národní knihovny ČR.

je provozovatelem CSIRT.CZ.