CZ.NIC
Open menu Close menu
  • Home
  • About us
  • Incident reporting
  • Projects
  • Reports
  • Cybersecurity
    • Security news
  • Česky
  • English

Google Android Master Key Vulnerability Exploit Code Circulates

July 10, 2013

Proof-of-concept code for exploiting a Google Android master key vulnerability that can be used to Trojanize legitimate apps is making the round on the Internet.

Cecilia Malmström Welcomes New EU Rules to fight cyber-crime

July 9, 2013

The Directive on attacks against information systems builds on rules that have been in force since 2005 (Council Framework Decision 2005/222/JHA). While retaining a number of curr…

Microsoft to Patch Seven Flaws in July's Patch Tuesday

July 7, 2013

The patch that will get the most news attention is likely to be CVE-2013-3660, which is a memory management problem in win32k.sys – the Windows Kernel. Code to exploit this flaw w…

Rampant Apache Website Attack Hits Visitors with Highly Malicious Software

July 4, 2013

Darkleech is back. Or maybe it never left. Either way, it's a growing problem. A campaign that forces sites running the Apache Web server to install highly malicious software on v…

Apple Issues Emergency Security Patch for Macs

July 4, 2013

If you're a Mac user and watch video files on your computer, consider downloading Apple's Security Update 2013-003 sooner rather than later. A vulnerability in QuickTime makes it …

  • Previous
  • ...
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • ...
  • Next

Veškerý obsah je k dispozici pod licencí Creative Commons Uveďte původ-Zachovejte 3.0  2019

Veškerý obsah je archivován na WebArchivu Národní knihovny ČR.

je provozovatelem CSIRT.CZ.