CZ.NIC
Open menu Close menu
  • Home
  • About us
  • Incident reporting
  • Projects
  • Reports
  • Cybersecurity
    • Security news
  • Česky
  • English

Remote Attack Could Damage Your Pebble Smartwatch Easily

Aug. 22, 2014

Pebble, a wristwatch that can connect to your phone - both iOS and Android - and interact with apps, has a hard-coded vulnerability that allows a remote attacker to destroy your S…

Most popular Android apps open users to MITM attacks

Aug. 22, 2014

An analysis of the 1,000 most popular free Android apps from the Google Play store has revealed a depressing fact: most of them sport an SSL/TLS vulnerability that can be misused …

Hacking traffic light systems, it’s so easy

Aug. 22, 2014

A new study conducted by security researchers at the University of Michigan demonstrated that it is easy to hack traffic light systems.

Facebook Server Leveraged for DDoS Attack

Aug. 22, 2014

The way in which images attached to Facebook posts are refreshed can be abused to conduct distributed denial-of-service (DDoS) attacks using the site's high-bandwidth servers, a s…

Windows Registry Forensics using ‘RegRipper’ Command-Line on Linux

Aug. 20, 2014

RegRipper is a flexible open source tool that can facilitate registry analysis with ease. It contains pre-written Perl scripts for the purpose of fetching frequently needed inform…

  • Previous
  • ...
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • ...
  • Next

Veškerý obsah je k dispozici pod licencí Creative Commons Uveďte původ-Zachovejte 3.0  2019

Veškerý obsah je archivován na WebArchivu Národní knihovny ČR.

je provozovatelem CSIRT.CZ.