CZ.NIC
Open menu Close menu
  • Home
  • About us
  • Incident reporting
  • Projects
  • Reports
  • Cybersecurity
    • Security news
  • Česky
  • English

New Banking Trojan Targets Linux Users

Aug. 8, 2013

Researchers from RSA have uncovered a new banking Trojan designed to steal information from machines running the Linux operating system. Dubbed “Hand of Thief”, the Trojan is repo…

Firefox Zero-day Exploited Against Tor Anonymity

Aug. 6, 2013

Security researchers found a malicious script that takes advantage of a Firefox Zero-day to identify some users of the Tor anonymity network.

Hackers Can Steal Windows Phone Passwords Using Wi-Fi Vulnerability

Aug. 6, 2013

Microsoft has warned that a vulnerability in Windows Phone operating systems could allow hackers to access your login credentials. Cryptographic weaknesses in the technology can a…

BREACH Decodes HTTPS Encrypted Data in 30 Seconds

Aug. 3, 2013

A new hacking technique dubbed BREACH can extract login tokens, session ID numbers and other sensitive information from SSL/TLS encrypted web traffic in just 30 seconds.

Credit Card Redirection, the Evolution of Phishing

Aug. 3, 2013

Cyber criminals are varying their attack method compromising legitimate shopping websites instead to deceive them with spoofed emails that lead to specially crafted phishing sites…

  • Previous
  • ...
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • ...
  • Next

Veškerý obsah je k dispozici pod licencí Creative Commons Uveďte původ-Zachovejte 3.0  2019

Veškerý obsah je archivován na WebArchivu Národní knihovny ČR.

je provozovatelem CSIRT.CZ.