Sicherheitsinfos

Wichtige SicherheitsinformationenHier veröffentlichen wir Sicherheitsinfos und Updateinformationen für Sie.

Da wir täglich in den tiefen des WWW unterwegs sind, finden wir oftmals wichtige Informationen rund um das Thema Sicherheit und bieten Ihnen so die Möglichkeiten, gewissen Gefahren auszuweichen und/oder zu beseitigen.

Leider ist es im Computeralltag so, dass immer gewisse Kreise mehr Informationen über Sie erhalten wollen, als Sie preisgeben wollen. Wir hoffen, Ihnen dadurch bei der Sicherheit Ihrer Systeme behilflich zu sein.
securitymagazine.comEnhanced analytics, intrusion detection, broad surveillance, access control, facial recognition - a few of the solutions explored here to help with all airport and seaport applications....

securitymagazine.comAXIS P3719-PLE Network Camera is a compact 15-megapixel camera with four varifocal lenses that enable overview and detailed surveillance....

securitymagazine.comVicon’s new series of high-powered thermal sensor cameras integrate with high-speed SN683D PTZ dome camera to detect, identify and track intruders using thermal detection and is combined with targeted surveillance from the PTZ for full situational awareness....

securitymagazine.comGenetec Security Center for Airports enables security managers, terminal and ground handling staff, control room operators, and passenger experience managers to work together using a single unified product....

securitymagazine.comSpectra Enhanced series of PTZ domes are ideal for airport applications with challenging lighting and broad surveillance areas with long perimeters to monitor....

threatpost.comAttackers check the victims' Office 365 credentials in real time as they are typed into the phishing landing page, by using authentication APIs....

threatpost.comThe Russia-linked threat group is harvesting credentials for Microsoft's cloud offering, and targeting mainly election-related organizations....

threatpost.comVulnerability-disclosure policies (VDPs), if done right, can help provide clarity and clear guidelines to both bug-hunters and vendors when it comes to going public with security flaws....

threatpost.comThe high-severity flaw in the Email Subscribers & Newsletters plugin by Icegram affects more than 100,000 WordPress websites....

securitymagazine.comExecutive search and consulting firm Raines International launched its Security Officers Practice, co-developed with The Lake Forest Group, a security services firm specializing in all aspects of security, safety, and compliance....

securitymagazine.com(ISC)², a nonprofit association of certified cybersecurity professionals, unveiled the agenda for its 10th annual Security Congress, which will take place virtually November 16-18, 2020. ...

securitymagazine.comTo enhance security following an increase in use of video conferencing apps, Zoom introduced two-factor authentication (2FA) for all users on its client and mobile apps. ...

securitymagazine.comRecently, schools throughout the U.S. have endured delays in reopening after experiencing massive ransomware attacks that force the shutdown of critical information technology systems....

securitymagazine.comIn the 19 years that have passed since Sept. 11, 2001, Americans have seen significant increases in counterterrorism security in public venues, including more security guards, closed-circuit TV cameras, metal detectors and bag checks. A study by the USC Center for Risk and Economic Analysis of Terrorism Events (CREATE) finds out that people are still willing to pay more for increased security at public venues almost two decades later....

Heise Sicherheits NewsDrei niederländische Hacker hatten im Oktober 2016 kurzzeitig Zugriff auf Trumps Twitter-Account. Das haben sie nun öffentlich gemacht....

TheHackersNewsCybersecurity researchers have discovered an entirely new kind of Linux malware dubbed "CDRThief" that targets voice over IP (VoIP) softswitches in an attempt to steal phone call metadata. "The primary goal of the malware is to exfiltrate various private data from a compromised softswitch, including call detail records (CDR)," ESET researchers said in a Thursday analysis. "To steal this...

securitymagazine.comThe Human Trafficking Institute rolled out the 2019 State Summaries, which provide an overview of federal human trafficking cases in all 50 states, the five U.S. territories, and the District of Columbia. While the number of forced labor cases has remained steady for a few years, the number of criminal sex trafficking cases as a nation has trended down since 2017....

Heise Sicherheits NewsDie Entwickler von Zoom haben den Log-in-Prozess sicherer gestaltet. Accounts sind so besser geschützt....

Heise Sicherheits NewsDas CERT/CC und die Bluetooth-Standardisierer warnen vor Blurtooth – knausern aber mit Informationen zur entdeckten Schwachstelle....

securitymagazine.comRecently, two teens and a young adult infiltrated one of Silicon Valley’s biggest companies in a high-profile hack – and the biggest ever for Twitter. Authorities say the 17-year-old “mastermind” used social engineering tactics to convince a Twitter employee that he also worked in the IT department and gained access to Twitter’s Customer Service Portal. The 130-account takeover proved unique, as it was fundamentally a dramatic manipulation of trust and could have had far more world-changing consequences if the attackers had the aspirations of say, a dangerous fringe group versus that of a teenager. There are a few takeaways to learn here, especially when it comes to considering redefining what we classify as “critical infrastructure” and what must be protected at all costs....