Sicherheitsinfos

Wichtige SicherheitsinformationenHier veröffentlichen wir Sicherheitsinfos und Updateinformationen für Sie.

Da wir täglich in den tiefen des WWW unterwegs sind, finden wir oftmals wichtige Informationen rund um das Thema Sicherheit und bieten Ihnen so die Möglichkeiten, gewissen Gefahren auszuweichen und/oder zu beseitigen.

Leider ist es im Computeralltag so, dass immer gewisse Kreise mehr Informationen über Sie erhalten wollen, als Sie preisgeben wollen. Wir hoffen, Ihnen dadurch bei der Sicherheit Ihrer Systeme behilflich zu sein.
Heise Sicherheits NewsMicrosoft veröffentlicht über 2700 kritische und wichtige Updates für Exchange und Windows 10, aber auch für Windows 7 und 8.1 sowie ältere Serversysteme....

threatpost.comHow this class of vulnerabilities will impact millions connected devices and potentially wreck the day of IT security professionals....

threatpost.comResearchers measured 648 new malware threats every minute during Q4 2020.  ...

threatpost.comCrooks are looking to harvest email credentials with a savvy campaign that uses the Typeform service to host the phishing page....

TheHackersNewsThe SolarWinds attack, which succeeded by utilizing the sunburst malware, shocked the cyber-security industry. This attack achieved persistence and was able to evade internal systems long enough to gain access to the source code of the victim. Because of the far-reaching SolarWinds deployments, the perpetrators were also able to infiltrate many other organizations, looking for intellectual...

threatpost.comThe security bugs could open the door for arbitrary code-execution and full takeover of targeted machines....

securitymagazine.comThe New England College of Optometry (NECO) formed a COVID-19 Task Force and began exploring ideas to enable in-person learning at the school in a safe, effective and well-planned manner. One of the solutions that NECO implemented is a contact-tracing tool that allows the school to respond immediately to report of an infection, accurately and effectively, without relying on a sign-in sheet or a person’s recollection of their previous contacts....

securitymagazine.comFrom the initial secured entrance to the overarching access control system, the emphasis is currently on contactless access control and door entry solutions. A myriad of technologies from NFC and smart mobile devices to facial biometrics will help play a vital role in what are now COVID-driven essentials. An integrated strategy for access control, along with tailgating mitigation options including turnstiles, revolving doors and mantrap portals enables building security to implement even more comprehensive control and prioritized security while making use of touchless credentials....

securitymagazine.comKeeping unauthorized intruders from entering a business location is a critical part of protecting corporate assets. Perimeters are the first line of defense but do not conform to a ‘one-size-fits-all’ safeguarding solution. Selection criteria for the most suitable Perimeter Intrusion Detection System (PIDS) must take into consideration perimeter length, topography, environmental conditions, and future site expansion plans....

securitymagazine.comAccording to new data, the educational sector is being hit by phishing attacks (along with other types of cyberattacks) more than other verticals....

securitymagazine.comA global report from the International SOS Foundation and Affinity Health at Work, ‘Mental Health and the Remote Rotational Workforce’ provides in depth insight into the psychological impacts of this unique mode of working. The new study provides evidence of the high level of suicidal thoughts, clinical depression, impacts on physical health (such as diet) and the impact of the COVID-19 pandemic on this workforce.  ...

securitymagazine.comMidway Car Rental, the largest privately-owned car rental company in Southern California, turned to robots for much-needed security that would protect its vehicles, while ensuring safety of employees and clients. ...

threatpost.comAn update to Google’s browser that fixes the flaw is expected to be released on Tuesday....

Heise Sicherheits NewsZerodium hat die Belohnung für Remote Code Execution-Schwachstellen in der aktuellen WordPress-Version vorübergehend verdreifacht....

TheHackersNewsSecurity researchers have uncovered nine vulnerabilities affecting four TCP/IP stacks impacting more than 100 million consumer and enterprise devices that could be exploited by an attacker to take control of a vulnerable system. Dubbed "NAME:WRECK" by Forescout and JSOF, the flaws are the latest in series of studies undertaken as part of an initiative called Project Memoria to study the security...

securitymagazine.comThe National Cybersecurity Alliance and the Identity Defined Security Alliance (IDSA), present the first ‘Identity Management Day,’ an annual awareness event which will take place on the second Tuesday in April each year. The inaugural Identity Management Day will be held on April 13, 2021. ...

TheHackersNewsMicrosoft has warned organizations of a "unique" attack campaign that abuses contact forms published on websites to deliver malicious links to businesses via emails containing fake legal threats, in what's yet another instance of adversaries abusing legitimate infrastructure to mount evasive campaigns that bypass security protections. "The emails instruct recipients to click a link to review...

Heise Sicherheits NewsUm die – auch hierzulande aktive – Banking-Malware IcedID zu verbreiten, nutzen Angreifer derzeit offenbar verstärkt den Umweg über Kontaktformulare....

Heise Sicherheits NewsEine neue Generation des für Sicherheits-Koprozessors soll Nutzerdaten auf iPhone & Co besser schützen. Ältere A-Chip-Reihen wurden neu aufgelegt....

TheHackersNewsA new set of malicious Android apps have been caught posing as app security scanners on the official Play Store to distribute a backdoor capable of gathering sensitive information. "These malicious apps urge users to update Chrome, WhatsApp, or a PDF reader, yet instead of updating the app in question, they take full control of the device by abusing accessibility services," cybersecurity firm...