Sicherheitsinfos

Wichtige SicherheitsinformationenHier veröffentlichen wir Sicherheitsinfos und Updateinformationen für Sie.

Da wir täglich in den tiefen des WWW unterwegs sind, finden wir oftmals wichtige Informationen rund um das Thema Sicherheit und bieten Ihnen so die Möglichkeiten, gewissen Gefahren auszuweichen und/oder zu beseitigen.

Leider ist es im Computeralltag so, dass immer gewisse Kreise mehr Informationen über Sie erhalten wollen, als Sie preisgeben wollen. Wir hoffen, Ihnen dadurch bei der Sicherheit Ihrer Systeme behilflich zu sein.
securitymagazine.comWhile VR and AR have different fortes, both enhance and accelerate experiential learning that can help manifest and reinforce a culture of cybersecurity across industries. It is technology implications like this that will help propel cybersecurity awareness into a state of mass awareness....

securitymagazine.comEighty-six percent of respondents in a survey are confident or very confident they have no gaps in their security controls deployed across devices, applications, people and data, in a Forrester Consulting Study. ...

securitymagazine.comEnterprises are struggling to find the right talent to safeguard their networks; therefore, they must change their mindsets and begin recruiting talent from non-traditional backgrounds to ensure they have the "right" person on their SOC team....

securitymagazine.comAn emerging challenge facing security leaders involves governance related to the collection, storage and transmission of personal information and the ethical utilization of it. While there are compliance programs currently in place that govern the protection of individual medical and financial data, there are clearly additional challenges on the horizon....

securitymagazine.comMeet the Department of Homeland Security's newest agency - the Cybersecurity and Infrastructure Security Agency - that will serve as the pinnacle for national risk management for cyber and physical infrastructure....

securitymagazine.comSeveral state agencies, boards, commissions and universities are allegedly failing to adhere to state cybersecurity laws, leaving Mississippians’ personal data vulnerable to hackers....

securitymagazine.comThe Pentagon officially took over the federal background-check system, with a newly created Defense Counterintelligence and Security Agency (DCSA) inside the Defense Department now charged with reducing a massive backlog of clearances for employees and contractors, according to a news report....

securitymagazine.comThe New Jersey Office of Homeland Security and Preparedness (NJOHSP) and the New Jersey Cybersecurity and Communications Integration Cell (NJCCIC) are promoting cybersecurity best practices throughout October alongside a coalition of private businesses, nonprofit organizations, government agencies and academic institutions.  ...

securitymagazine.comGoogle launched a new service called Password Checkup that will check a user's saved passwords if they've been leaked and compromised in breaches....

securitymagazine.comThe Internet Security Alliance (ISA) and The European Confederation of Directors’ Associations (ecoDa) announced a partnership to develop a handbook on cyber-risk management for European corporate boards of directors....

securitymagazine.comFrom the standpoint of risk analysis, recency bias—that is, an overwhelming focus on events that have happened most recently—is one of the most nefarious psychological blinders....

securitymagazine.comThe United States Senate passed bipartisan legislation introduced by Senators Rob Portman (R-OH) and Maggie Hassan (D-NH) to bolster cybersecurity in the public and private sector. ...

securitymagazine.comA Florida man carrying a pocket knife his bicycle onto a high school campus, walked into a classroom and sat down with students....

securitymagazine.comHow is Mary Ludford, Vice President and Deputy Chief Security Officer for the Corporate and Information Security Services business unit at Exelon Corporation, mitigating and managing risk on a daily basis?...

securitymagazine.comImagine, a campus security installation so big that it will take years to complete all the work, and it also means installing solutions with the latest technology and greatest impact to school security....

threatpost.comGoogle's new password checkup tool joins other similar services including Have I Been Pwned and Mozilla's Firefox Monitor....

threatpost.comMultiyear campaigns stretching back to at least 2014 have been seen using zero-days in region-specific software....

threatpost.comBad OpSec led to the botnet's discovery -- revealing 800,000 victims in Russia....

threatpost.comCybergang Silent Starling is taking BEC to the next level by targeting suppliers and going after their customers....

threatpost.comZendesk says access occurred in 2016 and that only a small percentage of customers were impacted....

threatpost.comA double-free bug could allow an attacker to achieve remote code execution; users are encouraged to update to a patched version of the messaging app....

threatpost.comEight high-severity vulnerabilities exist in the Foxit Reader tool for editing PDF files....