CZ.NIC
Open menu Close menu
  • Home
  • About us
  • Incident reporting
  • Projects
  • Reports
  • Cybersecurity
    • Security news
  • Česky
  • English

Scammers Abuse Twitter Features, Trick Thousands with ‘Follower’ Scheme

June 8, 2014

A series of enhanced follower scams has tricked thousands of Twitter users after a group abused the platform’s authentication system, TweetDeck and Trends section, antivirus softw…

RIG Exploit Kit Used to Deliver "Cryptowall" Ransomware

June 8, 2014

The RIG Exploit Kit, which first emerged on cybercrime forums in April, is successfully leveraging malicious advertising techniques (malvertising) to distribute a piece of file-en…

Just another OpenSSL vulnerability

June 5, 2014

New OpenSSL vulnerability - CCS Injection.

Simplocker, the first Android File-Encrypting Ransomware

June 5, 2014

Security experts at ESET discovered and analyzed the first Android File-Encrypting ransomware dubbed Simplocker with C&C hosted on TOR.

Cupid - new type of attack with Heartbleed vector

June 3, 2014

A new type of attack called Cupid works on Heartbleed method of attack. The Cupid is exploitable on TLS connections over EAP (Extensible Authentication Protocol) which is popular …

  • Previous
  • ...
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • ...
  • Next

Veškerý obsah je k dispozici pod licencí Creative Commons Uveďte původ-Zachovejte 3.0  2019

Veškerý obsah je archivován na WebArchivu Národní knihovny ČR.

je provozovatelem CSIRT.CZ.