Sicherheitsinfos

Wichtige SicherheitsinformationenHier veröffentlichen wir Sicherheitsinfos und Updateinformationen für Sie.

Da wir täglich in den tiefen des WWW unterwegs sind, finden wir oftmals wichtige Informationen rund um das Thema Sicherheit und bieten Ihnen so die Möglichkeiten, gewissen Gefahren auszuweichen und/oder zu beseitigen.

Leider ist es im Computeralltag so, dass immer gewisse Kreise mehr Informationen über Sie erhalten wollen, als Sie preisgeben wollen. Wir hoffen, Ihnen dadurch bei der Sicherheit Ihrer Systeme behilflich zu sein.
securitymagazine.comTake a look back at 2020 in ransomware. What were the key targets and what can security leaders learn from them?...

securitymagazine.comFor organizations experiencing data breaches, the consequences are considerable, especially for security operations. IBM reports that over 25,000 data records are stolen with the average data breach, and costing the targeted company as much as $8.64M per breach in the United States. And it takes on average a staggering 280 days between identifying and containing a data breach (known as the breach cycle). So why is it so hard to fight this digital war, and why is the breach cycle so long?...

securitymagazine.comStories about cyberattacks and security breaches are popping up more and more frequently in the news and it seems as though no company is immune to the sophisticated strategies hackers use to obtain high value confidential data. These data hacks result in bad PR, lost customer trust, possible fines, and potentially ruined reputations. Needless to say, it should have you questioning whether or not your data is properly protected, and the answer is — it’s probably not....

securitymagazine.comA new whitepaper from global risk consultancy Control Risks addresses how businesses should rethink their global corporate response to social unrest.  ...

threatpost.comEvents application Peatix this week disclosed a data breach, after user account information reportedly began circulating on Instagram and Telegram....

threatpost.comFake Minecraft Modpacks on Google Play deliver millions of abusive ads and make normal phone use impossible....

securitymagazine.comAmong the top threats to businesses are theft of property, theft of data and workplace violence. When it comes to preventing these commonplace scenarios, a fence can be the first step to designing an effective access control program. By starting at the perimeter, entities can create a physical barrier that deters infiltration and denies entry. So, what kind of fencing offers an uncompromising solution? An astute option is a fence classified as high-security. Several factors determine whether a fence is considered high-security, including the material it’s made from, how it’s constructed and the features that the construction enables. ...

securitymagazine.comThe bottom line: The pandemic and other issues have put security weaknesses and new requirements into sharp relief. Travel limitations and other obstacles are hampering efforts to address these. To adapt and reopen, security managers have heightened expectations of their integrators to be more informed, transparent, and digitally advanced....

threatpost.comMatt Lewis, with NCC Group, talks to Threatpost about a slew of security and privacy issues found in smart doorbells that are being sold on Amazon and eBay....

threatpost.comCyberattackers could use the information to track users across devices, disable phone service, or intercept messages and phone calls....

securitymagazine.comAccording to the Information Security Forum (ISF), with growing recognition that security awareness in isolation rarely leads to sustained behavior change, organizations need to proactively develop a robust human-centered security program to reduce the number of security incidents associated with poor security behavior....

securitymagazine.comThe Transportation Security Administration checkpoint at Syracuse Hancock International Airport is using new technology that confirms the validity of a traveler’s identification (ID) and reduces a touchpoint for airport agents....

TheHackersNewsAn adware and coin-miner botnet targeting Russia, Ukraine, Belarus, and Kazakhstan at least since 2012 has now set its sights on Linux servers to fly under the radar. According to a new analysis published by Intezer today and shared with The Hacker News, the trojan masquerades as HTTPd, a commonly used program on Linux servers, and is a new version of the malware belonging to a threat actor...

securitymagazine.comICAO issued a bulletin announcing its new Testing and Cross-border Risk Management Measures Manual (Doc 10152), developed by the members of the dedicated CAPSCA group it established in 2009 for ‎the prevention and management ‎of public health events in civil ‎aviation....

securitymagazine.comTim Wiseman, the University of Wyoming’s chief risk officer, has been elected to the University Risk Management and Insurance Association (URMIA) Board of Directors. Wiseman is one of two new board members selected for a three-year term....

securitymagazine.comFEMA’s landmark study, “Building Codes Save: A Nationwide Study,” shows that modern building codes lead to major reduction in property losses from natural disasters. The FEMA report calculates losses from three types of natural hazard (earthquakes, flooding, and hurricane winds) for each state and Washington, D.C....

securitymagazine.comSumo Logic released findings from its fifth annual report. ”The Continuous Intelligence Report: The State of Modern Applications, DevSecOps and the Impact of COVID-19” provides an inside look into the state of the modern application technology stack, including changing trends in cloud and application adoption and usage by customers, and the impact of COVID-19 as an accelerant for digital transformation efforts....

securitymagazine.comFew cybersecurity components are as familiar as the next-generation firewall (NGFW) for enterprise protection. Despite this ubiquity, it is common for security teams to operate their NGFW in a suboptimal manner. The TAG Cyber team has observed, for example, that many enterprise teams operate their NGFW more like a traditional firewall. This can result in a reduction of traffic visibility, which in turn degrades prevention, detection, and response....

securitymagazine.comA grand jury has issued two indictments​ charging the Santa Clara County Undersheriff, a previously indicted sheriff’s captain, a local business owner, and the head of Global Security for Apple, Inc. with bribery....

Heise Sicherheits NewsBereits im Juli forderte Spotify einige Nutzer gezielt zur Passwortänderung auf. Den Grund dafür machten Sicherheitsforscher erst jetzt publik....