Hirdetés

* A csillaggal jelölt mezők kitöltése kötelező.

Találatok száma: 17

Researchers improve de-anonymization attacks for websites hiding on Tor

IDG News | 2015.07.30 22:43

Attackers controlling entry nodes on the Tor network could find the location of hidden services or unmask users visiting them.

D-Link remote access vulnerabilities remain unpatched

IDG News | 2015.02.27 10:09

The worst one could allow a remote attacker to change DNS settings.

Apple blocks tool that brute-forces iCloud passwords

IDG News | 2015.01.08 23:48

The tool allowed attackers to try a large number of passwords for Apple ID accounts.

Hosting provider LeaseWeb falls victim to DNS hijacking

IDG News | 2013.10.07 23:19

The company believes attackers obtained domain administrator credentials and used them to change the domain's DNS records at the registrar.

South Korea blames North Korea for cyberattacks

IDG News | 2013.07.17 23:37

South Korean officials have stated that North Korea is to blame for attacks against government websites last month, citing North Korean IP addresses and signature malicious computer codes as evidence. In addition, they say the same group of attackers are also responsible for the attacks last March.

McAfee spots Adobe Reader PDF-tracking flaw

IDG News | 2013.04.29 08:02

A flaw in Adobe Reader could allow an attacker to see when and where a PDF is opened.

Mt. Gox under largest DDoS attack as bitcoin price surges

IDG News | 2013.04.04 23:56

The Japan-based exchange said attackers are seeking to manipulate bitcoin's price.

Attackers hijack the .ro domains of Google, Microsoft, Yahoo, others

IDG News | 2012.11.29 11:15

The DNS records for the affected domain names were modified, suggesting a possible security breach at the .ro registry.

More than half of organizations take months or years to discover a breach, Verizon says

IDG News | 2012.03.01 07:30

Over 90 percent of data breaches are caused by external attacks, according to a new Verizon report.

Researchers find vulnerability in Windows Vista

IDG News | 2008.11.20 17:35

An Austrian security vendor has found a vulnerability in Windows Vista that it says could possibly allow an attacker to run unauthorized code on a PC.

Expert finds 'stupid' vulnerabilities in Oracle 11g

IDG News | 2007.09.03 14:02

The latest version of Oracle Corp.'s flagship database offers better security than earlier versions, but development errors have left vulnerabilities that attackers can use to steal data, an expert warned Monday.

Security team claims successful iPhone hack

IDG News | 2007.07.23 13:55

A team of security experts in Baltimore, Md., said it has found a flaw in Apple Inc.'s iPhone handset that can be used by attackers to access private data stored on it.

China takes top spot in zombie PCs

IDG News | 2007.03.20 16:22

China has taken over as the world's most botnet-infested country, as the sophistication and danger of cyberattackers continues to grow, according to Symantec.

Big patch for big hole in Google Desktop

IDG News | 2007.02.22 09:59

Google Inc. has closed a potentially major cross-site scripting vulnerability in its Google Desktop software that could have allowed remote attackers to take control of a victim's computer and its contents.

Firefox update postponed by newest bug

IDG News | 2007.02.21 10:15

Mozilla Corp. will delay the next security update for Firefox so it can test a fix for a flaw that could be used by attackers by skirt security restrictions.

Microsoft vulnerability rooted in ActiveX control

IDG News | 2006.11.06 14:05

Microsoft Corp. is investigating reports of a vulnerability in a Windows ActiveX control that could allow an attacker to remotely take control of a computer, according to an advisory issued Friday. One security company rated the vulnerability critical, while Microsoft said it allowed only limited attacks.

Microsoft fixes PowerPoint, Windows flaws

IDG News | 2006.08.09 11:27

Microsoft Corp. has issued nine security updates addressing critical flaws in its Office and Windows products. The updates patch two worrisome PowerPoint flaws that could allow attackers to seize control of a PC, the company said Tuesday.

0 mp. múlva automatikusan bezár Tovább az oldalra »

Úgy tűnik, AdBlockert használsz, amivel megakadályozod a reklámok megjelenítését. Amennyiben szeretnéd támogatni a munkánkat, kérjük add hozzá az oldalt a kivételek listájához, vagy támogass minket közvetlenül! További információért kattints!

Engedélyezi, hogy a https://www.computertrends.hu értesítéseket küldjön Önnek a kiemelt hírekről? Az értesítések bármikor kikapcsolhatók a böngésző beállításaiban.