CZ.NIC
Open menu Close menu
  • Home
  • About us
  • Incident reporting
  • Projects
  • Reports
  • Cybersecurity
    • Security news
  • Česky
  • English

DDoS Attacks evolve into sophistication

July 23, 2014

According to global DDoS attack report by Akamai’s Prolexic in 2014 the popularity of reflection and amplification attacks was on the rise. Report estimates that number of DDoS at…

Gyges, the mixing of commercial malware with cyber weapon code

July 22, 2014

Experts at Sentinel Labs security firm have discovered Gyges malware in the wild in March 2014, the malicious code appears very sophisticated to the researches which attributed it…

Hidden services in iOS devices could allow users’ surveillance

July 22, 2014

Apple has worked hard to make iOS devices reasonably secure but hidden services could be exploited to steal every user’s data in a stealthy way.

Siemens Industrial Products Affected by OpenSSL Vulnerabilities

July 22, 2014

According to advisories published by both Siemens and the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), the security holes affect APE versions prior to 2.0.…

Apache Server Vulnerability Allows Attackers to Execute Code Remotely Without Authentication

July 22, 2014

An Apache HTTP server buffer overflow vulnerability could allow attackers to execute code remotely, according to an advisory by the Zero Day Initiative.

  • Previous
  • ...
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • ...
  • Next

Veškerý obsah je k dispozici pod licencí Creative Commons Uveďte původ-Zachovejte 3.0  2019

Veškerý obsah je archivován na WebArchivu Národní knihovny ČR.

je provozovatelem CSIRT.CZ.