Sicherheitsinfos

Wichtige SicherheitsinformationenHier veröffentlichen wir Sicherheitsinfos und Updateinformationen für Sie.

Da wir täglich in den tiefen des WWW unterwegs sind, finden wir oftmals wichtige Informationen rund um das Thema Sicherheit und bieten Ihnen so die Möglichkeiten, gewissen Gefahren auszuweichen und/oder zu beseitigen.

Leider ist es im Computeralltag so, dass immer gewisse Kreise mehr Informationen über Sie erhalten wollen, als Sie preisgeben wollen. Wir hoffen, Ihnen dadurch bei der Sicherheit Ihrer Systeme behilflich zu sein.
Heise Sicherheits NewsOffice-Makros, Webcams mit Polizeianschluss, Schatten-Digitalisierung, Datenreichtum und E-Voting gehören zu den alt-neuen Sicherheitsalbträumen der Hacker....

Heise Sicherheits NewsSecurity-Experten haben untersucht, wie sich (Intel-)FPGAs in (Cloud-)Servern für Seitenkanalangriffe wie Rowhammer einspannen lassen....

Heise Sicherheits NewsIBM hat ein wichtiges Sicherheitsupdate für seine Management-Software Cognos Business Intelligence vorgelegt....

Heise Sicherheits NewsProtonMail bietet eine Kalender-App an, bei der alle Daten verschlüsselt werden. Zunächst können nur zahlende Nutzer darauf zugreifen....

Heise Sicherheits NewsEin Nutzer wollte über den Google Assistant Bilder seiner Xiaomi-Sicherheitskamera prüfen – und sah völlig fremde Fotos. Mittlerweile ist das Problem behoben....

Heise Sicherheits NewsAngreifer könnten Systeme mit Citrix ADC und Gateway attackieren und Schadcode ausführen. Patches sind bislang nicht erschienen....

Heise Sicherheits NewsDie Stadtverwaltung von Alsfeld hat ihre IT-Systeme heruntergefahren und ist derzeit nur telefonisch erreichbar. Ob Ransomware dahintersteckt, ist noch unklar....

Heise Sicherheits NewsMassenhaft Phishing-Mails mit angeblichen Amazon-Bestellbestätigungen sind derzeit im Umlauf. Die Polizei warnt vor dem Öffnen....

TheHackersNewsAdvanced persistent threats (APTs) have emerged to be legitimate concerns for all organizations. APTs are threat actors that breach networks and infrastructures and stealthily lurk within them over extended spans of time. They typically perform complex hacks that allow them to steal or destroy data and resources. According to Accenture, APTs have been organizing themselves into groups that...

securitymagazine.comThe credentials and user data of 3,672 Ring camera owners were compromised and exposed log-in emails, passwords, time zones and the names people give to specific Ring cameras, which are often the same as camera locations, such as “bedroom” or “front door.”...

securitymagazine.comLifeLabs recently identified a cyberattack that involved unauthorized access to their computer systems that possibly impacts 15 million people....

securitymagazine.comThe pace of change in cybersecurity is quickening as technologies like 5G and artificial intelligence enable new services, products and modes of communication....

securitymagazine.comThe Cybersecurity and Infrastructure Security Agency’s (CISA) Information and Communications Technology (ICT) Supply Chain Risk Management (SCRM) Task Force approved the creation of a new working group to develop attestation frameworks around various aspects of supply chain risk management best practices. ...

securitymagazine.comThe Unified Carrier Registration Plan (UCR) has reported that the tax identification numbers of registrants may have been exposed during March due to a website vulnerability that existed in its online National Registration System....

securitymagazine.comConnecticut Secretary of the State Denise Merrill says the state will receive about $5 million in federal funds to help protect the 2020 elections from cyberattacks....

securitymagazine.comThe Cybersecurity and Infrastructure Security Agency (CISA) released new Trusted Internet Connections (TIC) 3.0 draft guidance that adjusts to federal agencies narrowing their cyberdefenses. ...

securitymagazine.comNew ISACA resources offer step-by-step guidance for the U.S. National Institute of Standards and Technology's (NIST) Framework for Improving Critical Infrastructure Cybersecurity (CSF). ...

securitymagazine.comThe Air Force is looking for industry help in securing security and industrial control systems networks on its bases....

securitymagazine.comMarlon C. Lynch has been named the University of Utah's first chief safety officer....

securitymagazine.comWhile there is still time left in 2019, according to the recent Data Breach QuickView Report, there were 5,183 breaches reported just in the first nine months of 2019 exposing 7.9 billion records....

securitymagazine.comThere are lots of buzzwords floating around cybersecurity: machine learning, artificial intelligence, supervised and unsupervised learning … In many cases these advanced technologies are based on anomaly detection....

securitymagazine.comThe Navy and Marine Corps are conducting a broad review of security measures in the face of insider threats, following three violent incidents at Navy bases since Thanksgiving, including the Pearl Harbor Naval Shipyard and the NAS Pensacola fatal shootings. ...

Weiter