A fost publicată lista auditorilor atestați de securitate cibernetică. Accesați aici lista

Vulnerabilities of the implementations of the cryptographic of the mobile terminals with iOS and Android

2016/03/07
Popularity 1019

A team of researchers coming from the University of Tel Aviv, Techion and the University of Adelaide has found one way that an attacker could steal the encryption keys used to protect the accounts type wallet (wallet): Bitcoin, Apple Pay, and other sensitive services within the Android and iOS opera ... Read more ->


DROWN: the Vulnerability of the HTTPS protocol

2016/03/01
Popularity 978

Drown is a critical vulnerability affecting HTTPS and other services that rely on SSL and TLS, two of the essential cryptographic protocols used for communication security over the Internet. Programmes modern client-server protocol that uses TLS encryption. However, due to configuration errors ... Read more ->


Campaign Scam aimed at iPhone users

2016/02/24
Popularity 1016

Romanian users of Apple's services are targeted for a specific campaign Scam (Phishing) via the Safari browser. More specifically, the opening Safari, users see a message that are announced that are brought accusations about the fact that they "viewed / stored / distributed pornography prohib ... Read more ->


Juniper: Multiple vulnerabilities in ScreenOS (CVE-2015-7755, CVE-2015-7756)

2015/12/18
Popularity 976

Specialists of the company Juniper have identified a sequence of unauthorized code within the source code of the operating system ScreenOS, which can allow a  potential attacker to gain access and control over the devices NetScreen, respectively decrypting the connection type VPN. Description & ... Read more ->


Ransomware: helpme@freespeechmail.org

2015/11/05
Popularity 1057

Recently, users of the Rom yesterday;nia is faced with a new threat, cyber-type ransomware, which, once it succeeds in infecting a system, encrypts the files stored on it and displays a message that prompts users to pay a bounty for de-encrypting them. Encrypted files have an extension as amended wh ... Read more ->