CZ.NIC
Open menu Close menu
  • Home
  • About us
  • Incident reporting
  • Projects
  • Reports
  • Cybersecurity
    • Security news
  • Česky
  • English

Another zero-day vulnerability is threatening the Microsoft world

March 25, 2014

Microsoft issued a security advisory for the presence of a zero-day vulnerability in Microsoft Word products which allows a remote code execution.

Android OS Update Process Vulnerable to Exploitation

March 25, 2014

A new type of security vulnerability has been found in the Android system’s updating process, which can be exploited to steal sensitive data, alter security configurations and eve…

WordPress hosting: Do not try this at home!

March 25, 2014

Compromised WordPress blogs were used to host nearly 12,000 phishing sites in February. This represents more than 7% of all phishing attacks blocked during that month, and 11% of …

A Guide to Debugging Android Binaries

March 23, 2014

In this paper, I’ll describe how to start reverse code engineering in Android devices.

New variant of Zorenium Bot can infect iOS devices

March 23, 2014

Security analysts at SenceCy which are monitoring the advancement of a new Zorenium Bot discovered that it is able to infect also iOS devices.

  • Previous
  • ...
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • ...
  • Next

Veškerý obsah je k dispozici pod licencí Creative Commons Uveďte původ-Zachovejte 3.0  2019

Veškerý obsah je archivován na WebArchivu Národní knihovny ČR.

je provozovatelem CSIRT.CZ.