Sicherheitsinfos

Wichtige SicherheitsinformationenHier veröffentlichen wir Sicherheitsinfos und Updateinformationen für Sie.

Da wir täglich in den tiefen des WWW unterwegs sind, finden wir oftmals wichtige Informationen rund um das Thema Sicherheit und bieten Ihnen so die Möglichkeiten, gewissen Gefahren auszuweichen und/oder zu beseitigen.

Leider ist es im Computeralltag so, dass immer gewisse Kreise mehr Informationen über Sie erhalten wollen, als Sie preisgeben wollen. Wir hoffen, Ihnen dadurch bei der Sicherheit Ihrer Systeme behilflich zu sein.
Heise Sicherheits NewsNvidias Entwickler haben drei Sicherheitslücken im Grafikkarten-Tool Geforce Experience geschlossen....

securitymagazine.comDefending against insider threats is one of the biggest challenges an organization can face, and the COVID-19 pandemic has only made detection more challenging as remote employees continue to use virtual private networks (VPNs) to access sensitive company files and information. Here, we talk to Carolyn Crandall, Chief Deception Officer at Attivo Networks, to discuss how security teams can use deception technology to detect and prevent insider threat attacks. ...

Heise Sicherheits NewsInsgesamt 13 Organisationen haben eine Threat-Matrix für ML-Anwendungen erstellt, die sich an der ATT&CK-Matrix von MITRE orientiert....

Heise Sicherheits NewsBisher mussten Linux-Nutzer für die Online-Passwortverwaltung 1Password auf Konsole oder Browser zurückgreifen, nun bekommen sie den vollen Desktop-Komfort....

Heise Sicherheits NewsAngriffe auf die IT-Umgebungen von Unter­nehmen sind mitunter unglaublich einfach. Wir haben das Internet systematisch nach ungesicherten Servern durchsucht....

securitymagazine.comThere are few discussions in the physical security business that don’t at some point focus on the topic of cybersecurity. One area frequently missing from these conversations is the importance of a trusted supply chain for manufacturers. Since a product is only as good as the hardware and software inside it, examining how something is built can give us rapid insight into its potential vulnerabilities and overall cyber worthiness. The NDAA (National Defense Authorization Act) ban is particularly focused on the subject of component sourcing for security devices. What is inside that device that could be exploited? Where did it come from? What do we know about the manufacturing process? These are all important questions about the manufacturing supply chain that need to be considered by anyone who cares about cybersecurity....

securitymagazine.comA webinar from the International Foundation of Protection Officers (IFPO) and Perpetuity Research will include a panel discussion along with discussing the findings of the Security Research Initiative report, tackling the questions of: why do people join the security sector more by chance than choice? What keeps them involved? What are the best and worst things about a security career?...

securitymagazine.comFairWarning announced the results of its Benefits, Attributes and Habits of Mature Privacy and Data Protection Program Report, in partnership with the International Association of Privacy Professionals (IAPP)....

threatpost.comTrump’s weak Twitter password and lack of basic two-factor authentication protections made it shockingly simple to hack his account, Dutch security researcher Victor Gevers reported.  ...

threatpost.comAn elaborate set of redirections and hundreds of URLs make up a wide-ranging tech-support scam....

Heise Sicherheits NewsDer Netzwerkausrüster Cisco hat wichtige Sicherheitsupdates für verschiedene Netzwerk-Software veröffentlicht. Keine Lücke gilt als kritisch....

Heise Sicherheits NewsLange Bearbeitungszeiten beim Signaturprozess des Secure-Boot-Bootloaders Shim lassen einige Programmierer verzweifeln....

securitymagazine.comThe Los Angeles County Metropolitan Transportation Authority (Metro) is establishing a Transit Public Safety Advisory Committee (PSAC) to re-envision transit safety and explore community-based approaches to policing....

securitymagazine.comThe U.S. Embassy provided $6 million for an Emergency Operations Center in Grenada, Carriacou, an island in the West Indies for Grenada’s emergency planning, training, response and recovery efforts for natural disasters such as hurricanes and earthquakes. ...

securitymagazine.comAccording to the Center for Internet Security (CIS), in September 2020, three malware returned to the Top 10: CoinMiner, CryptoWall, and Emotet. The Top 10 Malware variants composed 87% of Total Malware activity in September 2020, up from 78% in August 2020....

securitymagazine.comThe online proctor services company conducted an independent audit after the breach and has remained transparent about the situation....

Heise Sicherheits NewsStatt unbefugte Anmeldeversuche abzuwehren, spielte ein Bug in Loginizer vor Version 1.6.4 Angreifern in die Hände. Nutzer sollten ihre Version prüfen....

Heise Sicherheits NewsDer E-Mail-Client Thunderbird ist in einer abgesicherten Version erschienen....

securitymagazine.comAuthentic8 released the results of its 2020 Global Financial Crimes Survey, conducted in partnership with the Association of Certified Financial Crime Specialists (ACFCS)....

Heise Sicherheits NewsDer Desktop-Client von Discord ist aufgrund von Sicherheitslücken in verschiedenen Komponenten attackierbar. Mittlerweile ist das Sicherheitsproblem gelöst....

Weiter