Sicherheitsinfos

Wichtige SicherheitsinformationenHier veröffentlichen wir Sicherheitsinfos und Updateinformationen für Sie.

Da wir täglich in den tiefen des WWW unterwegs sind, finden wir oftmals wichtige Informationen rund um das Thema Sicherheit und bieten Ihnen so die Möglichkeiten, gewissen Gefahren auszuweichen und/oder zu beseitigen.

Leider ist es im Computeralltag so, dass immer gewisse Kreise mehr Informationen über Sie erhalten wollen, als Sie preisgeben wollen. Wir hoffen, Ihnen dadurch bei der Sicherheit Ihrer Systeme behilflich zu sein.
TheHackersNewsA malicious program intended to cause havoc with IT systems—malware—is becoming more and more sophisticated every year. The year 2021 is no exception, as recent trends indicate that several new variants of malware are making their way into the world of cybersecurity. While smarter security solutions are popping up, modern malware still eludes and challenges cybersecurity experts.  The evolution...

Heise Sicherheits NewsBereits im März hatten Lücken in Microsofts Exchange Server zur "IT-Bedrohungslage Rot" geführt. Nun mahnt das BSI zum Patchen, um neue Gefahren abzuwenden....

TheHackersNewsCybercriminals are resorting to search engine poisoning techniques to lure business professionals into seemingly legitimate Google sites that install a Remote Access Trojan (RAT) capable of carrying out a wide range of attacks. The attack works by leveraging searches for business forms such as invoices, templates, questionnaires, and receipts as a stepping stone toward infiltrating the systems....

Heise Sicherheits NewsÜberblick über Inhalte und Umsetzung der IT-Grundschutz-Methodik des BSI mit Prüfung zum Grundschutz-Praktiker. Zusatztermin im Mai wegen hoher Nachfrage....

Heise Sicherheits NewsEinen Tag nach dem letzten Update für die 89er-Versionsreihe stehen die ersten Lücken-Fixes für Version 90 bereit. Auch Microsofts Edge wurde aktualisiert....

TheHackersNewsFacebook-owned WhatsApp recently addressed two security vulnerabilities in its messaging app for Android that could have been exploited to execute malicious code remotely on the device and even exfiltrate sensitive information. The flaws take aim at devices running Android versions up to and including Android 9 by carrying out what's known as a "man-in-the-disk" attack that makes it possible for...

TheHackersNewsIn its April slate of patches, Microsoft rolled out fixes for a total of 114 security flaws, including an actively exploited zero-day and four remote code execution bugs in Exchange Server. Of the 114 flaws, 19 are rated as Critical, 88 are rated Important, and one is rated Moderate in severity. Chief among them is CVE-2021-28310, a privilege escalation vulnerability in Win32k that's said to be...

Heise Sicherheits News2016 knackte das FBI das iPhone eines Terroristen. Gebracht hat es nichts. Doch Apple hat den Hack nicht vergessen....

securitymagazine.comThe New Jersey Office of Homeland Security and Preparedness (NJOHSP) and New Jersey Regional Operations and Intelligence Center (NJ ROIC) launched New Jersey Shield on April 14, a program focused on strengthening information sharing and collaboration among the public and private sectors....

securitymagazine.comBiometric technology, and specifically its most modern iteration, facial recognition, has found its way into security systems essential to everyone. We rely on it to safeguard some of our most prized belongings, including our smartphones, laptops and now, with Apple Pay, even our bank accounts and credit cards. Security experts applaud facial recognition as one of the most secure and efficient means of authentication available today. Why then, has the industry most hinged on security and identification – Banking, Financial Services and Insurance (BFSI) – been so slow to adopt this new wave of technology?...

securitymagazine.comA multi-country survey of organizations running video monitoring systems, conducted by Ava Security, found that U.S. firms are avidly repurposing their existing video monitoring systems to support the ‘COVID Safe’ return to offices and workplaces across North America....

securitymagazine.comThe third poll in a series of nationwide surveys conducted by Navigate360 and John Zogby Strategies, a national polling firm, shows the majority (54%) of teens today do not feel prepared to deal with the anxiety of returning to school and do not believe schools are equipped to respond effectively to emergency incidents or mental health needs. ...

securitymagazine.comMeet Ray Espinoza, Chief Information Security Officer at Cobalt. With over 20 years of technology experience and 14+ years in information security, Espinoza’s collaborative leadership style has enabled him to build information security and risk management programs that support business objectives and build customer trust. Here, we talk to Espinoza about common cybersecurity hurdles leadership teams may encounter when restructuring. ...

threatpost.comThe vulnerability is triggered when a cloud container pulls a malicious image from a registry....

threatpost.comNot a Gouda situation: An attack on a logistics firm is suspected to be related to Microsoft Exchange server flaw....

threatpost.comIn a veritable cyber-SWAT action, the Feds remotely removed the infections without warning businesses beforehand....

threatpost.comJoseph Carson, chief security scientist at Thycotic, discusses the death of data privacy and what comes next....

TheHackersNewsAcademics from Vrije University in Amsterdam and ETH Zurich have published a new research paper describing yet another variation of the Rowhammer attack. Dubbed SMASH (Synchronized MAny-Sided Hammering), the technique can be used to successfully trigger the attack from JavaScript on modern DDR4 RAM cards, notwithstanding extensive mitigations that have been put in place by manufacturers over the...

threatpost.comSearch-engine optimization (SEO) tactics direct users searching for common business forms such as invoices, receipts or other templates to hacker-controlled Google-hosted domains....

Heise Sicherheits NewsÜber das Einladungssystem beim Spiel "Counter-Strike: GO" kann Code auf fremde Rechner geschleust werden. Valve hat den Fehler nach zwei Jahren nicht behoben....

Weiter