CZ.NIC
Open menu Close menu
  • Home
  • About us
  • Incident reporting
  • Projects
  • Reports
  • Cybersecurity
    • Security news
  • Česky
  • English

Fight Graph Search Abuse with Facebook Privacy Settings

Oct. 6, 2013

In January, Bitdefender warned that Facebook users are vulnerable to Graph Search abuse, as the new feature is also being tested by cyber-criminals. Spammers may also take advanta…

Adobe Confirms Source Code Breach, Theft of Customer Data

Oct. 6, 2013

Adobe Systems confirmed its network had been breached in an attack that compromised information belonging to 2.9 million of its customers.

Web Hosting software WHMCS vulnerable to SQL Injection; emergency security update released

Oct. 6, 2013

WHMCS, a popular client management, billing and support application for Web hosting providers, released an emergency security update for the 5.2 and 5.1 minor releases, to patch a…

Identifying Evil An Introduction To Reverse Engineering Malware And Other Software

Oct. 3, 2013

Bart Hopper presentation on DerbyCon - 3.0 conference.

Research detects dangerous malware hiding in peripherals

Oct. 2, 2013

A Berlin researcher has demonstrated the capability to detect previously undetectable stealthy malware that resides in graphics and network cards.

  • Previous
  • ...
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • ...
  • Next

Veškerý obsah je k dispozici pod licencí Creative Commons Uveďte původ-Zachovejte 3.0  2019

Veškerý obsah je archivován na WebArchivu Národní knihovny ČR.

je provozovatelem CSIRT.CZ.