CZ.NIC
Open menu Close menu
  • Home
  • About us
  • Incident reporting
  • Projects
  • Reports
  • Cybersecurity
    • Security news
  • Česky
  • English

Linux Worm Targets "Internet of things"

Dec. 1, 2013

Malware hunters have stumbled upon a new Linux worm squirming through an old PHP vulnerability to infect hidden, Internet-enabled devices.

Ruby on Rails CookieStore Flaw Exposes Thousand of Websites

Nov. 28, 2013

A security issue inside cookie-based storage mechanism of Ruby on Rails could expose thousand websites to cyber attacks.

MS Windows Local Privilege Escalation Zero-Day in The Wild

Nov. 28, 2013

FireEye Labs has identified a new Windows local privilege escalation vulnerability in the wild. The vulnerability cannot be used for remote code execution but could allow a standa…

New Crimekit Atrax Exploits Tor, Mines Bitcoin and Much More

Nov. 28, 2013

Atrax, yet another commercial crimekit on the black market, a malware able to exploit Tor and that implements numerous features including Bitcoin mining.

SIM Card Forensics: An Introduction

Nov. 26, 2013

The SIM (subscriber identity module) is a fundamental component of cellular phones.

  • Previous
  • ...
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • ...
  • Next

Veškerý obsah je k dispozici pod licencí Creative Commons Uveďte původ-Zachovejte 3.0  2019

Veškerý obsah je archivován na WebArchivu Národní knihovny ČR.

je provozovatelem CSIRT.CZ.