CZ.NIC
Open menu Close menu
  • Home
  • About us
  • Incident reporting
  • Projects
  • Reports
  • Cybersecurity
    • Security news
  • Česky
  • English

Fight Graph Search Abuse with Facebook Privacy Settings

Oct. 6, 2013

In January, Bitdefender warned that Facebook users are vulnerable to Graph Search abuse, as the new feature is also being tested by cyber-criminals. Spammers may also take advanta…

Adobe Confirms Source Code Breach, Theft of Customer Data

Oct. 6, 2013

Adobe Systems confirmed its network had been breached in an attack that compromised information belonging to 2.9 million of its customers.

Web Hosting software WHMCS vulnerable to SQL Injection; emergency security update released

Oct. 6, 2013

WHMCS, a popular client management, billing and support application for Web hosting providers, released an emergency security update for the 5.2 and 5.1 minor releases, to patch a…

Identifying Evil An Introduction To Reverse Engineering Malware And Other Software

Oct. 3, 2013

Bart Hopper presentation on DerbyCon - 3.0 conference.

Research detects dangerous malware hiding in peripherals

Oct. 2, 2013

A Berlin researcher has demonstrated the capability to detect previously undetectable stealthy malware that resides in graphics and network cards.

  • Previous
  • ...
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • ...
  • Next

All content is available under license Creative Commons State the origin - preserve it 3.0  2019

All content is archived on the WebArchive of the National Library of the Czech Republic.

is the operator of CSIRT.CZ.