Sicherheitsinfos

Wichtige SicherheitsinformationenHier veröffentlichen wir Sicherheitsinfos und Updateinformationen für Sie.

Da wir täglich in den tiefen des WWW unterwegs sind, finden wir oftmals wichtige Informationen rund um das Thema Sicherheit und bieten Ihnen so die Möglichkeiten, gewissen Gefahren auszuweichen und/oder zu beseitigen.

Leider ist es im Computeralltag so, dass immer gewisse Kreise mehr Informationen über Sie erhalten wollen, als Sie preisgeben wollen. Wir hoffen, Ihnen dadurch bei der Sicherheit Ihrer Systeme behilflich zu sein.
TheHackersNewsA team of Canadian cybersecurity researchers has uncovered a sophisticated and targeted mobile hacking campaign that is targeting high-profile members of various Tibetan groups with one-click exploits for iOS and Android devices. Dubbed Poison Carp by University of Toronto's Citizen Lab, the hacking group behind this campaign sent tailored malicious web links to its targets over WhatsApp,...

TheHackersNewsA Pakistani hacker who previously made headlines earlier this year for selling almost a billion user records stolen from nearly 45 popular online services has now claimed to have hacked the popular mobile social game company Zynga Inc. With a current market capitalization of over $5 billion, Zynga is one of the world's most successful social game developers with a collection of hit online...

TheHackersNewsThe greatest threat facing most nations is no longer a standing army. It's a hacker with a computer who can launch a crippling cyber attack from thousands of miles away—potentially taking down everything from server farms to entire power grids with a few lines of code. So it should come as no surprise that virtually every major company in both the public and private sector—as well as national...

TheHackersNewsA critical security vulnerability has been discovered and fixed in the popular open-source Exim email server software, which could allow a remote attacker to simply crash or potentially execute malicious code on targeted servers. Exim maintainers today released an urgent security update—Exim version 4.92.3—after publishing an early warning two days ago, giving system administrators an early...

TheHackersNewsThe infamous eGobbler hacking group that surfaced online earlier this year with massive malvertising campaigns has now been caught running a new campaign exploiting two browser vulnerabilities to show intrusive pop-up ads and forcefully redirect users to malicious websites. To be noted, hackers haven't found any way to run ads for free; instead, the modus operandi of eGobbler attackers...

TheHackersNewsIf you have an account with the Comodo discussion board and support forums, also known as ITarian Forum, you should change your password immediately. Cybersecurity company Comodo has become one of the major victims of a recently disclosed vBulletin 0-day vulnerability, exposing login account information of over nearly 245,000 users registered with the Comodo Forums websites. In a brief...

TheHackersNewsLooking for ways to unlock and read the content of an encrypted PDF without knowing the password? Well, that's now possible, sort of—thanks to a novel set of attacking techniques that could allow attackers to access the entire content of a password-protected or encrypted PDF file, but under some specific circumstances. Dubbed PDFex, the new set of techniques includes two classes of attacks...

TheHackersNewsAn ex-Yahoo! employee has pleaded guilty to misusing his access at the company to hack into the accounts of nearly 6,000 Yahoo users in search of private and personal records, primarily sexually explicit images and videos. According to an press note released by the U.S. Justice Department, Reyes Daniel Ruiz, a 34-year-old resident of California and former Yahoo software engineer, admitted...

TheHackersNewsCases of document-based malware are steadily rising. 59 percent of all malicious files detected in the first quarter of 2019 were contained in documents. Due to how work is done in today's offices and workplaces, companies are among those commonly affected by file-based attacks. Since small to medium businesses (SMBs) usually lack the kind of security that protects their larger counterparts,...

TheHackersNewsPhishing is still one of the widely used strategies by cybercriminals and espionage groups to gain an initial foothold on the targeted systems. Though hacking someone with phishing attacks was easy a decade ago, the evolution of threat detection technologies and cyber awareness among people has slowed down the success of phishing and social engineering attacks over the years. Since phishing...

TheHackersNewsA picture is worth a thousand words, but a GIF is worth a thousand pictures. Today, the short looping clips, GIFs are everywhere—on your social media, on your message boards, on your chats, helping users perfectly express their emotions, making people laugh, and reliving a highlight. But what if an innocent-looking GIF greeting with Good morning, Happy Birthday, or Merry Christmas message...

TheHackersNewsAnother day, another revelation of a critical unpatched zero-day vulnerability, this time in the world's most widely used mobile operating system, Android. What's more? The Android zero-day vulnerability has also been found to be exploited in the wild by the Israeli surveillance vendor NSO Group—infamous for selling zero-day exploits to governments—or one of its customers, to gain control of...

securitymagazine.comNew research from ISC² finds that acquiring companies pay close attention to cybersecurity readiness and breach history....

securitymagazine.comEnterprises today have become increasingly reliant on mobile workers and flexible working lifestyles. Plus, they are opening internal resources to outside users, including contractors, partners and service providers....

securitymagazine.comThe 2019 Travelers Risk Index has found that cyber risks are the top concern among businesses of all sizes for the first time since the survey began in 2014,...

securitymagazine.comTransportation Security Administration (TSA) Administrator David P. Pekoske announced the current Aviation Security Advisory Committee (ASAC), including the appointment of two new members and the reappointment of 12 members. ASAC provides recommendations for improving aviation security methods, equipment and procedures....

securitymagazine.comOne in five Americans has left a job in the past five years due to a “toxic workplace culture” with the turnover costing employers an estimated $223 billion during that time....

securitymagazine.comNew research from Michigan State University and Johns Hopkins University uncovers specific data leaked through hospital breaches....

securitymagazine.comFor the second consecutive year, the estimated number of violent crimes in the nation decreased when compared with the previous year’s statistics, according to new FBI figures. ...

securitymagazine.comThe Security Industry Association (SIA) has named Maureen Carlo, director of strategic alliances – North America at BCDVideo, as the 2019 recipient of the SIA Progress Award....

securitymagazine.comA dollar of retail fraud now costs merchants about $3.13 to deal with on average, according to data from LexisNexis Risk Solutions....

securitymagazine.comThe cost of data breaches will rise from $3 trillion each year to more than $5 trillion in 2024, an average annual growth of 11%, says a new report from Juniper Research....