CZ.NIC
Open menu Close menu
  • Home
  • About us
  • Incident reporting
  • Projects
  • Reports
  • Cybersecurity
    • Security news
  • Česky
  • English

Accuvant Labs Shares Java Vulnerability Details from Pwn2Own

May 23, 2013

Accuvant Labs has published details concerning a Java vulnerability exploited during the Pwn2Own contest earlier this year. The flaw was patched in April by Oracle, but for the cu…

The Dangers of Downloading Software from Unofficial Sites

May 23, 2013

Microsoft researchers shared the example of a password-stealing Trojan bundled up with a game tool used for customizing the massively popular Dota2 Warcraft battle arena mod.

Five Percent of the Internet Could Be Hijacked via Embedded OS Flaws

May 22, 2013

Embedded devices – an umbrella term defining specialized appliances that run their own operating system such as GPS receivers, industrial equipment, TV sets, smart fridges and rou…

Critical Linux Exploit In The Wild

May 19, 2013

If you run servers that provide shell accounts, it’s time to take some preventive measures. At least it is if you are running kernel versions 2.6.37 to 3.8.8, or if you are runnin…

Malicious Mac OS X Backdoor Signed With Valid Developer ID Found on Activist's Computer

May 17, 2013

Independent security researcher Jacob Appelbaum discovered the "new and previously unknown backdoor" on an African activist's Mac during a workshop at The Oslo Freedom Forum. The …

  • Previous
  • ...
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • ...
  • Next

Veškerý obsah je k dispozici pod licencí Creative Commons Uveďte původ-Zachovejte 3.0  2019

Veškerý obsah je archivován na WebArchivu Národní knihovny ČR.

je provozovatelem CSIRT.CZ.