Sicherheitsinfos

securitymagazine.comAfter MongoDB database was left open, containing 700,000 customer records, Choice Hotels, a hospitality giant, fell victim to hackers this week due to MongoDB's data breach....

securitymagazine.comChina’s National Computer Network Emergency Response Technical Team (CN-CERT) says in its first-half report for 2019 that apps request an average of 25 permissions when installed, which is concerning as data theft remains a widespread issue....

securitymagazine.comThe University of Utah will hire a chief safety officer and will invest $1 million in campus safety initiatives....

securitymagazine.comPolicies and the procedures to implement them provide clarity to everyone involved regarding accountability issues or activities of critical importance to an organization, such as health and safety, regulatory requirements, legal liabilities, or other issues that may have serious consequences....

securitymagazine.comWe often take for granted the interconnectedness of our software-oriented world....

securitymagazine.comOn the premise that the best defense is understanding the real nature of the offense – or, in this case, offenses, since cyber security addresses a multi-front battleground – it’s useful to think in terms of concentric circles, broad steps any small or midsize business can take to maximize safety. ...

securitymagazine.comHurricane season is here, and business leaders are once again asking themselves: Is my company prepared? Often, the answer is “no.” ...

securitymagazine.comThe University of West Florida Center for Cybersecurity is launching the Cybersecurity for All® program, a program to enhance readiness for evolving cybersecurity work roles and address the critical shortage of cybersecurity professionals....

securitymagazine.comCongressman Pete Visclosky (D-IN) announced that the Department of Homeland Security has awarded grants through the Port Security Grant Program to assist the Port of Indiana – Burns Harbor....

securitymagazine.comA ransomware attack has hit at least 20 local government entities in Texas....

securitymagazine.comFirst, let’s address the “why.” Why should you even consider adopting mobile technology in your physical security and access control?...

threatpost.comFrom the biometrics of one million being exposed, to new Microsoft Bluekeep-like threats, Threatpost discusses the top news of the week....

threatpost.comMore than 300,000 users still utilize credentials that have been compromised - with people visiting video streaming and porn sites most at fault, Google found in a new study....

threatpost.comThe number of exposed records has hit record highs in just the first two quarters....

threatpost.comIt's been around forever, but in a modern digital era marked by influence campaigns and deep fakes, information warfare has become much easier to carry out....

threatpost.comResearchers say that the targeted ransomware cyberattack on 23 Texas local and state entities represents a shift from "attacks of opportunity" to more targeted, malicious attacks....

Heise Sicherheits NewsMicrosoft hat die Signierung von Windows-Updates auf SHA-2 umgestellt. Das verursacht bei Windows 7 SP1 und Windows Server 2008 R2 Probleme....

Heise Sicherheits NewsMit der Zweiten Europäischen Zahlungsdiensterichtlinie (PSD2) verändert sich das elektronische Banking. Betroffen sind vor allem TAN-Verfahren und das Login....

Heise Sicherheits NewsZum ersten Mal seit Langem lassen sich Apples Sicherheitsfunktionen in der aktuellen iOS-Version durch einen öffentlich verfügbaren Jailbreak aushebeln....

Heise Sicherheits NewsMozilla hat in Firefox verwahrte Kennwörter mit einem Sicherheitsupdate effektiver verbarrikadiert....

Heise Sicherheits NewsLaut einem Forscher-Trio lässt sich die Verschlüsselung von vermutlich allen Bluetooth-Geräten knacken, darunter auch von Tastaturen und Smartphones....

TheHackersNewsIn this digital era, the success of almost every marketing, advertising, and analytics company drives through tracking users across the Internet to identify them and learn their interests to provide targeted ads. Most of these solutions rely on 3rd-party cookies, a cookie set on a domain other than the one you are browsing, which allows companies including Google and Facebook to fingerprint...