Sicherheitsinfos

Wichtige SicherheitsinformationenHier veröffentlichen wir Sicherheitsinfos und Updateinformationen für Sie.

Da wir täglich in den tiefen des WWW unterwegs sind, finden wir oftmals wichtige Informationen rund um das Thema Sicherheit und bieten Ihnen so die Möglichkeiten, gewissen Gefahren auszuweichen und/oder zu beseitigen.

Leider ist es im Computeralltag so, dass immer gewisse Kreise mehr Informationen über Sie erhalten wollen, als Sie preisgeben wollen. Wir hoffen, Ihnen dadurch bei der Sicherheit Ihrer Systeme behilflich zu sein.
TheHackersNewsCybersecurity researchers on Tuesday uncovered a new espionage campaign targeting media, construction, engineering, electronics, and finance sectors in Japan, Taiwan, the U.S., and China. Linking the attacks to Palmerworm (aka BlackTech) — likely a China-based advanced persistent threat (APT) — Symantec's Threat Hunter Team said the first wave of activity associated with this campaign began last...

threatpost.comPopular ‘safe browsing’ padlocks are now passe as a majority of bad guys also use them....

threatpost.comThe attempted compromises, which could allow full control over Active Directory identity services, are flying thick and fast just a week after active exploits of CVE-2020-1472 were first flagged....

TheHackersNewsI am sure that many of you have by now heard of a recently disclosed critical Windows server vulnerability—called Zerologon—that could let hackers completely take over enterprise networks. For those unaware, in brief, all supported versions of the Windows Server operating systems are vulnerable to a critical privilege escalation bug that resides in the Netlogon Remote Control Protocol for Domain...

threatpost.comBotnets and IoT devices are forming a perfect storm for IT staff wrestling with WFH employee security....

threatpost.comA researcher said he discovered an open data cache with names, grades, birthdates and more, after the Clark County School District refused to pay the ransom....

securitymagazine.comIn order to get the future right, the reopening process must balance COVID-19's numerous implications—health, safety, rights, and freedoms. We don’t need to dismiss privacy to gain value from the health data involved. But before we discuss how to find that balance, we need to understand the role data plays in the decision-making process and why that is even more important now....

securitymagazine.comThere is no one-size-fits-all IoT security solution. Organizations need to spend time selecting an IoT solution that maps to their unique business needs to ensure they’re able to maximize the investment’s potential without creating any security liabilities. Here’s what enterprises need to consider when creating their IoT deployments....

securitymagazine.comThe National Center for Spectator Sports Safety and Security (NCS4) will host the 2020 National Sports Safety and Security Conference virtually October 12-14, 2020. Read on to learn about the speakers and panels. ...

securitymagazine.comThe Transportation Security Administration (TSA) presented its prestigious Baseline Assessment for Security Enhancement (BASE) Gold Standard Award to the Potomac and Rappahannock Transportation Commission (PRTC) for its ongoing efforts to provide a safe transit experience for its riders throughout the system....

securitymagazine.comFor the third consecutive year, the estimated number of violent crimes in the nation decreased when compared with the previous year’s statistics, according to FBI figures released today. In 2019, violent crime was down 0.5% from the 2018 number. Property crimes also dropped 4.1%, marking the 17th consecutive year the collective estimates for these offenses declined....

securitymagazine.comUniversal Health Services (UHS), one of the largest healthcare services provider, has reportedly shut down systems at healthcare facilities around the U.S. after a cyberattack hit its networks. ...

securitymagazine.comTo help you and your organization plan and implement an improved cyber hygiene program, we now present a framework for full IoT device defensibility in real world deployments at scale. This framework represents current state-of-the-art best practices for protecting IoT devices, and can form the backbone of your assessment, evaluation, and improvement plans. Follow the steps below to strengthen your network defenses....

securitymagazine.comHealthcare and tech industry workers have seen the most major negative changes in mental wellbeing, but there is help, according to new study....

Heise Sicherheits NewsDurch die Übernahme von MobileIron und Pulse Secure konzentriert sich Ivanti vermehrt auf die Absicherung des Remote-Arbeitsplatzes....

threatpost.comThreatpost's latest poll probes telehealth security risks and asks for IT cures....

Heise Sicherheits NewsDas Foxit-Team hat Sicherheitslücken mit überwiegend hoher Risikoeinstufung aus Reader und PhantomPDF für Windows sowie aus dem 3D Plugin (Beta) beseitigt....

Heise Sicherheits NewsEin echter Hacking-Thriller zum selbstspielen....

securitymagazine.comThe Travelers Companies, Inc. announced the results of the 2020 Travelers Risk Index, which found that fewer companies than last year have taken steps to mitigate cyber risks, even though the level of concern about these threats has increased during the COVID-19 pandemic....

threatpost.comResearchers warn of emails pretending to help business employees upgrade to Windows 10 - and then stealing their Outlook emails and passwords....

Weiter