Sicherheitsinfos

Wichtige SicherheitsinformationenHier veröffentlichen wir Sicherheitsinfos und Updateinformationen für Sie.

Da wir täglich in den tiefen des WWW unterwegs sind, finden wir oftmals wichtige Informationen rund um das Thema Sicherheit und bieten Ihnen so die Möglichkeiten, gewissen Gefahren auszuweichen und/oder zu beseitigen.

Leider ist es im Computeralltag so, dass immer gewisse Kreise mehr Informationen über Sie erhalten wollen, als Sie preisgeben wollen. Wir hoffen, Ihnen dadurch bei der Sicherheit Ihrer Systeme behilflich zu sein.
securitymagazine.comEarlier this year, an investigation team hijacked thousands of printers all over the world to show just how vulnerable these devices can be if left unprotected. Too many organizations and individuals do not properly address them when discussing security strategies, physical or cyber, but if left unsecured, these devices can be real vulnerabilities....

threatpost.comCapcom, the game developer behind Resident Evil, Street Fighter and Dark Stalkers, now says its recent attack compromised the personal data of up to 400,000 gamers....

threatpost.comA sophisticated threat actor has hijacked email security connections to spy on targets....

threatpost.comThe BumbleBee web shell allows APT attackers to upload and download files, and move laterally by running commands....

securitymagazine.comAccording to global risk consultancy Control Risks’ annual forecast of political and security risks to help businesses prepare for the challenges next year will bring, there are a handful of important ongoing threats into this year that all risk managers and security leaders should be aware of....

securitymagazine.comIn the U.S., critical infrastructure consists of sixteen essential sectors that make daily life possible. National critical functions are the functions of government and the private sector so vital to the U.S. that their disruption, corruption, or dysfunction would have a debilitating effect on security, national economic security, national public health or safety. Here, we talk to Brian Harrell about the importance of protecting critical infrastructure, the threats and hazards that pose the greatest risks to critical infrastructure and more....

TheHackersNewsCybersecurity researchers took the wraps off a new spyware operation targeting users in Pakistan that leverages trojanized versions of legitimate Android apps to carry out covert surveillance and espionage. Designed to masquerade apps such as the Pakistan Citizen Portal, a Muslim prayer-clock app called Pakistan Salat Time, Mobile Packages Pakistan, Registered SIMs Checker, and TPL Insurance,...

securitymagazine.comCyberbit announced the launch of the International Cyber League (ICL), a first-of-its-kind competition that will determine the world’s best cyber defense team. The League will begin with America’s Cyber Cup, with registration opening today and closing on Monday, February 22. To determine the world’s best team, qualifying teams will face off against simulated cyberattacks in Cyberbit’s hyper-realistic cyber range, crowning the winning team as North America’s best....

Heise Sicherheits NewsOpfer des Verschlüsselungstrojaners Darkside können aufatmen und ohne Lösegeld zu zahlen wieder auf ihre Dateien zugreifen....

Heise Sicherheits NewsZum Jahresbeginn hat IBM eine ganze Reihe von Sicherheitsupdates veröffentlicht. Eine Schwachstelle in IBM Aspera High-Speed Transfer gilt als kritisch....

Heise Sicherheits NewsDeutschen Ermittlern ist mit internationaler Mithilfe ein großer Schlag gegen illegale Geschäfte im Darknet gelungen. Der DarkMarket wurde ausgehoben....

Heise Sicherheits NewsAls Reaktion auf dem Sturm des Capitols am 6. Januar nutzten Aktivisten Sicherheitslücken bei Parler aus und schöpften etwa 70 TByte an Rohdaten ab....

Heise Sicherheits NewsUbiquiti informiert Kunden derzeit darüber, dass Unbefugte Zugriff auf persönliche Nutzer-Daten gehabt haben könnten....

securitymagazine.comThe UK’s former Surveillance Camera Commissioner Tony Porter takes on the role of Chief Privacy Officer at Corsight AI....

TheHackersNewsAs the investigation into the SolarWinds supply-chain attack continues, cybersecurity researchers have disclosed a third malware strain that was deployed into the build environment to inject the backdoor into the company's Orion network monitoring platform. Called "Sunspot," the malignant tool adds to a growing list of previously disclosed malicious software such as Sunburst and Teardrop. "This...

securitymagazine.comChinese start-up Socialarks suffered a massive data breach, exposing more than 400GB of personal data, including several high-profile celebrities and social media influencers, according to Safety Detectives. ...

securitymagazine.comEthical hacking and security research group Sakura Samurai researchers disclosed a security vulnerability that would allow access to over 100,000 private employee records of the United Nations Environmental Programme (UNEP)....

securitymagazine.comOrlando International Airport deploys lidar-based solution for crowd analytics with social distancing and cleaning metrics in one of its terminals....

securitymagazine.comThe risk of a disinformation attack against an enterprise or large organization is increasingly serious and needs to be included in a company's risk preparedness contingency planning....

securitymagazine.comOne way to achieve higher security in your enterprise is to instill a proper Privileged Access Management (PAM) initiative into the cybersecurity workflow. For a multi-dimensional cybersecurity strategy involving processes, technology, and people to be successful, any such system has to be a part of the entity’s culture. Here’s how to implement PAM at your organization....

Weiter