Sicherheitsinfos

Wichtige SicherheitsinformationenHier veröffentlichen wir Sicherheitsinfos und Updateinformationen für Sie.

Da wir täglich in den tiefen des WWW unterwegs sind, finden wir oftmals wichtige Informationen rund um das Thema Sicherheit und bieten Ihnen so die Möglichkeiten, gewissen Gefahren auszuweichen und/oder zu beseitigen.

Leider ist es im Computeralltag so, dass immer gewisse Kreise mehr Informationen über Sie erhalten wollen, als Sie preisgeben wollen. Wir hoffen, Ihnen dadurch bei der Sicherheit Ihrer Systeme behilflich zu sein.
securitymagazine.comSpectra Enhanced series of PTZ domes are ideal for airport applications with challenging lighting and broad surveillance areas with long perimeters to monitor....

threatpost.comAttackers check the victims' Office 365 credentials in real time as they are typed into the phishing landing page, by using authentication APIs....

threatpost.comThe Russia-linked threat group is harvesting credentials for Microsoft's cloud offering, and targeting mainly election-related organizations....

threatpost.comVulnerability-disclosure policies (VDPs), if done right, can help provide clarity and clear guidelines to both bug-hunters and vendors when it comes to going public with security flaws....

threatpost.comThe high-severity flaw in the Email Subscribers & Newsletters plugin by Icegram affects more than 100,000 WordPress websites....

securitymagazine.comExecutive search and consulting firm Raines International launched its Security Officers Practice, co-developed with The Lake Forest Group, a security services firm specializing in all aspects of security, safety, and compliance....

securitymagazine.com(ISC)², a nonprofit association of certified cybersecurity professionals, unveiled the agenda for its 10th annual Security Congress, which will take place virtually November 16-18, 2020. ...

securitymagazine.comTo enhance security following an increase in use of video conferencing apps, Zoom introduced two-factor authentication (2FA) for all users on its client and mobile apps. ...

securitymagazine.comRecently, schools throughout the U.S. have endured delays in reopening after experiencing massive ransomware attacks that force the shutdown of critical information technology systems....

securitymagazine.comIn the 19 years that have passed since Sept. 11, 2001, Americans have seen significant increases in counterterrorism security in public venues, including more security guards, closed-circuit TV cameras, metal detectors and bag checks. A study by the USC Center for Risk and Economic Analysis of Terrorism Events (CREATE) finds out that people are still willing to pay more for increased security at public venues almost two decades later....

Heise Sicherheits NewsDrei niederländische Hacker hatten im Oktober 2016 kurzzeitig Zugriff auf Trumps Twitter-Account. Das haben sie nun öffentlich gemacht....

TheHackersNewsCybersecurity researchers have discovered an entirely new kind of Linux malware dubbed "CDRThief" that targets voice over IP (VoIP) softswitches in an attempt to steal phone call metadata. "The primary goal of the malware is to exfiltrate various private data from a compromised softswitch, including call detail records (CDR)," ESET researchers said in a Thursday analysis. "To steal this...

securitymagazine.comThe Human Trafficking Institute rolled out the 2019 State Summaries, which provide an overview of federal human trafficking cases in all 50 states, the five U.S. territories, and the District of Columbia. While the number of forced labor cases has remained steady for a few years, the number of criminal sex trafficking cases as a nation has trended down since 2017....

Heise Sicherheits NewsDie Entwickler von Zoom haben den Log-in-Prozess sicherer gestaltet. Accounts sind so besser geschützt....

Heise Sicherheits NewsDas CERT/CC und die Bluetooth-Standardisierer warnen vor Blurtooth – knausern aber mit Informationen zur entdeckten Schwachstelle....

securitymagazine.comRecently, two teens and a young adult infiltrated one of Silicon Valley’s biggest companies in a high-profile hack – and the biggest ever for Twitter. Authorities say the 17-year-old “mastermind” used social engineering tactics to convince a Twitter employee that he also worked in the IT department and gained access to Twitter’s Customer Service Portal. The 130-account takeover proved unique, as it was fundamentally a dramatic manipulation of trust and could have had far more world-changing consequences if the attackers had the aspirations of say, a dangerous fringe group versus that of a teenager. There are a few takeaways to learn here, especially when it comes to considering redefining what we classify as “critical infrastructure” and what must be protected at all costs....

securitymagazine.comLast week, Didier Reynders, European Commissioner for Justice, and Dr. Andrea Jelinek, Chair of the European Data Protection Board (EDPB), appeared at a hearing conducted by the European Parliament’s Committee on Civil Liberties, Justice and Home Affairs, and updated committee members on their work since the Schrems II decision. In his remarks, Mr. Reynders identified three main areas on which the Commission is focusing....

TheHackersNewsBluetooth SIG—an organization that oversees the development of Bluetooth standards—today issued a statement informing users and vendors of a newly reported unpatched vulnerability that potentially affects hundreds of millions of devices worldwide. Discovered independently by two separate teams of academic researchers, the flaw resides in the Cross-Transport Key Derivation (CTKD) of devices...

threatpost.comJust months before the U.S. presidential election, hackers from Russia, China and Iran are ramping up phishing and malware attacks against campaign staffers....

threatpost.comA cloud misconfiguration at the gaming-gear merchant potentially exposed 100,000 customers to phishing and fraud....

Weiter