CZ.NIC
Open menu Close menu
  • Home
  • About us
  • Incident reporting
  • Projects
  • Reports
  • Cybersecurity
    • Security news
  • Česky
  • English

10 vulnerable web applications you can play with

June 26, 2012

In this article at pentestlab.org are ten web applications, which are given for vulnerabilities testing purpose.

Phishing is not just for banks

June 22, 2012

In this article at blogs.technet.com are interesting examples of phishing websites.

In this article at blogs.technet.com are interesting examples of phishing websites. Not only b…

Beware of fake antivirus program Android Security Suite Premium

June 20, 2012

As is recommended by author of this article at blog.webroot.com site, when you downloading Android apps choose them wisely and download from a trusted source.

MySQL liner hack gives root access without password

June 20, 2012

The latest news that has hit the streets is the occurence of the easiest hack ever, if you have local shell access (any user privelege level) and you can connect to MySQL – you ca…

Hackers spread trojan following Internet Explorer patch

June 20, 2012

If you have not installed new updates from Microsoft yet, it is time to do it. More information about the trojan Naidu find in this article at scmagazine.com

  • Previous
  • ...
  • 254
  • 255
  • 256
  • 257
  • 258

Veškerý obsah je k dispozici pod licencí Creative Commons Uveďte původ-Zachovejte 3.0  2019

Veškerý obsah je archivován na WebArchivu Národní knihovny ČR.

je provozovatelem CSIRT.CZ.