Sicherheitsinfos

Wichtige SicherheitsinformationenHier veröffentlichen wir Sicherheitsinfos und Updateinformationen für Sie.

Da wir täglich in den tiefen des WWW unterwegs sind, finden wir oftmals wichtige Informationen rund um das Thema Sicherheit und bieten Ihnen so die Möglichkeiten, gewissen Gefahren auszuweichen und/oder zu beseitigen.

Leider ist es im Computeralltag so, dass immer gewisse Kreise mehr Informationen über Sie erhalten wollen, als Sie preisgeben wollen. Wir hoffen, Ihnen dadurch bei der Sicherheit Ihrer Systeme behilflich zu sein.
threatpost.comWith more online shoppers this year due to COVID-19, cybercriminals are pulling the trigger on new scams ahead of Black Friday and Cyber Monday....

threatpost.com'Order This, Get This': Social-media influencers are in Amazon’s legal crosshairs for promoting generic Amazon listings with the promise to get prohibited counterfeit luxury items instead....

threatpost.comCybercriminals are leveraging the multitudes of vulnerable connected devices with botnets that launch dangerous distributed denial-of-service (DDoS) attacks....

threatpost.comThree major APTs are involved in ongoing compromises at pharma and clinical organizations involved in COVID-19 research, Microsoft says....

threatpost.comThe administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter....

Heise Sicherheits NewsApple beseitigt Sicherheitslücken im Kernel von macOS 10.13 und 10.14. Weitere Schwachstellen räumt derzeit nur ein Upgrade auf macOS 11 aus....

threatpost.comThe events giant faces a GDPR-related penalty in the U.K., and more could follow....

threatpost.comThe North Face has reset an undisclosed number of customer accounts after detecting a credential-stuffing attack on its website....

Heise Sicherheits NewsEin Sicherheitsforscher stolperte über eine Lücken-Kombo, mit der einfache Nutzer einen Account mit Sudo-Rechten anlegen konnten. Ubuntu hat diese nun gefixt....

securitymagazine.comThe Forum of Incident Response and Security Teams (FIRST) is holding its annual conference online next week. The three-day event, which is taking place online for the first time, will feature both industry experts and academics from the global community talking about the latest developments on how to prevent, detect and respond to computer security incidents. The...

Heise Sicherheits NewsDie EU-Innenminister betonen, dass sich die Mitgliedsstaaten "mit der Frage der Datenverschlüsselung" beschäftigen und den Behörden Zugang verschaffen müssen....

threatpost.comChris Krebs, the first and current U.S. cybersecurity director, said his protection of election process drew ire from Trump administration....

Heise Sicherheits NewsFür Hard- und Software zur Konfiguration und Verwaltung industrieller Steuerungssysteme von Schneider Electric sind wichtige Sicherheitsupdates verfügbar....

Heise Sicherheits NewsSpeziell für Admins und Hardware-Spezialisten in Unternehmen: Die Spezial-Funktionen typischer Büro-PCs kompakt erklärt – inklusive solider Basiskonfiguration....

TheHackersNewsComplexity is the bane of effective cybersecurity. The need to maintain an increasing array of cybersecurity tools to protect organizations from an expanding set of cyber threats is leading to runaway costs, staff inefficiencies, and suboptimal threat response. Small to medium-sized enterprises (SMEs) with limited budgets and staff are significantly impacted. On average, SMEs manage more than a...

TheHackersNewsA group of academics from the University of California and Tsinghua University has uncovered a series of critical security flaws that could lead to a revival of DNS cache poisoning attacks. Dubbed "SAD DNS attack" (short for Side-channel AttackeD DNS), the technique makes it possible for a malicious actor to carry out an off-path attack, rerouting any traffic originally destined to a specific...

securitymagazine.comBuilding a cyber-resilient enterprise informed by threat intelligence is not an easy task. Risks and requirements are often as unique and diverse as organizations themselves. Determining factors like industry, size, and market contribute to one simple truth: a one-size-fits-all approach to incorporating threat intelligence does not exist. Some invariants, however, do remain; successful threat intelligence programs must staff the right people in the right positions. Below, I’ll introduce four core threat intelligence focuses to consider as businesses plan and allocate budgets for 2021:...

securitymagazine.comAnalyst1, provider of a threat intelligence platform (TIP), added recognized cybersecurity industry veteran, Jon DiMaggio, to its executive team. As chief security strategist, DiMaggio will be responsible for driving security research and strategy for the next generation threat intel company....

securitymagazine.comIn response to the global, rapidly growing demand for skilled information security professionals across industries—from government to private sector and non-profit—Fairfield University is now offering a flexible 30-credit Master of Science in Cybersecurity program, along with other changes and new technologies in its cyber lab....

securitymagazine.comSecuring identities and their privileges and access should be at the center of your strategy for reducing your cloud attack surface. The old network perimeter, with its limited number of points of ingress secured with firewalls and other perimeter defenses has given way to a distributed arrangement. Software-as-a-Service (SaaS) today is the new IT, and cloud identities are the new perimeter with thousands of users and points of potential failure existing outside of your traditional security protocols. The greatest threats to this new perimeter include:...

Weiter