Sicherheitsinfos

Wichtige SicherheitsinformationenHier veröffentlichen wir Sicherheitsinfos und Updateinformationen für Sie.

Da wir täglich in den tiefen des WWW unterwegs sind, finden wir oftmals wichtige Informationen rund um das Thema Sicherheit und bieten Ihnen so die Möglichkeiten, gewissen Gefahren auszuweichen und/oder zu beseitigen.

Leider ist es im Computeralltag so, dass immer gewisse Kreise mehr Informationen über Sie erhalten wollen, als Sie preisgeben wollen. Wir hoffen, Ihnen dadurch bei der Sicherheit Ihrer Systeme behilflich zu sein.
securitymagazine.comWhen it comes to cybersecurity, companies still have a lot of work to do to find ways to anticipate and avoid data breaches. Let’s take a look at a few of the most notorious cybersecurity attacks that have happened over the last few decades and see what you and your enterprise can learn....

securitymagazine.comWhile businesses face myriad challenges during this protracted pandemic period, the enterprises that are managing to stay on course, and even thrive, are those that had already established and tested plans, processes and tools across key functions, to better anticipate and mitigate emerging risks. Now is the time to take a closer look at your crisis response plans and learn from these best practices....

TheHackersNewsCybersecurity researchers on Tuesday disclosed a now-patched security flaw in TikTok that could have potentially enabled an attacker to build a database of the app's users and their associated phone numbers for future malicious activity. Although this flaw only impacts those users who have linked a phone number with their account or logged in with a phone number, a successful exploitation of the...

TheHackersNewsThroughout 2020, businesses, in general, have had their hands full with IT challenges. They had to rush to accommodate a sudden shift to remote work. Then they had to navigate a rapid adoption of automation technologies. And as the year came to a close, more businesses began trying to assemble the safety infrastructure required to return to some semblance of normal in 2021. But at the end of the...

TheHackersNewsGoogle on Monday disclosed details about an ongoing campaign carried out by a government-backed threat actor from North Korea that has targeted security researchers working on vulnerability research and development. The internet giant's Threat Analysis Group (TAG) said the adversary created a research blog and multiple profiles on various social media platforms such as Twitter, Twitter, LinkedIn...

threatpost.comIf exploited, the most serious of these flaws could lead to a denial-of-service condition for Jetson products....

threatpost.comSophisticated and dangerous, DanaBot has resurfaced after laying dormant for seven months....

threatpost.comThe personal data of 66,000 users was left wide open on a misconfigured Elasticsearch server, joining a growing list of companies with leaky clouds....

Heise Sicherheits NewsDie Control-flow Enforcement Technology (CET) soll Malware-Attacken mit Return-Oriented Programming (ROP) erschweren....

Heise Sicherheits NewsNeben funktionalen Neuerungen umfassen die neuen Ausgaben von Mozillas Browser auch einige Security-Fixes mit Einstufungen von "Low" bis "High"....

securitymagazine.comLoss prevention and safety/risk employees can benefit from occupancy analytics, especially during the current health crisis. But beyond the pandemic, employees in operations, marketing, and merchandising can benefit considerably by learning all about the foot traffic in their stores....

securitymagazine.comAdoption of Push-to-Talk over Cellular and Wi-Fi networks is growing in the security market due to the wide area coverage, low cost, the bandwidth to accommodate voice and video communications, and integration with dispatching applications. This article reviews the different types of Push to Talk network deployments, how they work, the devices used, and the benefits to users.  The types of Push-to-Talk networks include Push to Talk over Cellular (PoC), Push-to-Talk over Wi-Fi, and unified PoC, Wi-Fi and LMR radio networks....

securitymagazine.comOften, the touch-free conversation is tied with the need for mobile access solutions. While the two approaches are not interchangeable, both are ideal choices to reduce hand-to-door contact in high traffic public areas such as office lobbies and entry ways, healthcare facilities, restaurants, schools, and restrooms. When combined, they offer contactless, barrier-free and user-friendly access that assure secure entry, minimize high frequency touchpoints, and reduce the spread of germs....

securitymagazine.comWith no one size fits all solution, there have always been different ways to tackle the plethora of security threats. However, the increasing use of drones, or unmanned aerial vehicles (UAVs) as they are often called, is changing that. Fully automated drones can be operated by security agents, with no pilot certification, and are directly integrated into existing security networks and processes. But aren’t they expensive? And won’t the technology turn out to be just a passing trend?...

Heise Sicherheits NewsEin Security-Blog mit Fake-Content, falsche Social-Media-Profile und Visual Studio-Projekte mit verstecktem Schadcode sollen Forscher in eine Falle locken....

securitymagazine.comAs Data Privacy Day approaches this week, new research conducted by ISACA reveals critical skills gaps and insufficient training. The survey report, Privacy in Practice 2021: Data Privacy Trends, Forecasts and Challenges, also explores past and future trends in privacy, offering insights into privacy workforce and skills, the use of privacy by design, and the organizational structure and composition of privacy teams....

securitymagazine.comAccording to Digital Shadows’ Photon Research Team in Q4 2020, six groups made up 84% of alerts —Maze, Egregor, Conti, Sodinokibi, DoppelPaymer, and NetWalker— from the ransomware data leak sites Digital Shadows monitors....

securitymagazine.comThe 167,000-square-foot, six-story structure will advances the university’s vision to earn national recognition as a research-intensive institution and bolsters San Antonio’s national standing as Cyber City USA....

securitymagazine.comUntangle Inc. announced the results for its annual Voice of the Channel and 2021 Predictions Report. The report surveyed Untangle’s global network of Channel Partners to better understand current trends and barriers faced when protecting clients against emerging cybersecurity threats and other customer barriers within the market. ...

Heise Sicherheits NewsDie ersten Kernel- und Software-Updates für Tails im Jahr 2021 sind auch sicherheitsrelevant. Die Entwickler geben Einblick in ihre Planung für dieses Jahr....

Weiter