Sicherheitsinfos

Wichtige SicherheitsinformationenHier veröffentlichen wir Sicherheitsinfos und Updateinformationen für Sie.

Da wir täglich in den tiefen des WWW unterwegs sind, finden wir oftmals wichtige Informationen rund um das Thema Sicherheit und bieten Ihnen so die Möglichkeiten, gewissen Gefahren auszuweichen und/oder zu beseitigen.

Leider ist es im Computeralltag so, dass immer gewisse Kreise mehr Informationen über Sie erhalten wollen, als Sie preisgeben wollen. Wir hoffen, Ihnen dadurch bei der Sicherheit Ihrer Systeme behilflich zu sein.
securitymagazine.comA new study says the odds of catching novel coronavirus on an airplane with infected passengers appear to be relatively small, though still possible....

securitymagazine.comAcross industries, organizations seek to embrace Internet of Things (IoT) devices to reduce manual tasks and promote social distancing. However, IoT devices often lack basic security controls which lead to new cybersecurity risks across the IT stack. A comprehensive solution for managing IoT as part of organizations’ growth plans must also incorporate establishing best practices for moving forward securely....

securitymagazine.comAttackers are looking beyond network systems and devices to target organizations via public-facing platforms and SaaS resources. An effective DRP service will identify threats across an organization’s digital footprint, analyze the credibility of these threats and remediate malicious activity on third-party platforms to minimize system and reputational damage....

securitymagazine.comNew York Mayor Bill de Blasio (D) ordered hotels and short-term rentals to deny rooms to travelers from a list of 31 states plus Puerto Rico and the Virgin Islands unless they fill out a questionnaire....

securitymagazine.comSunz Insurance has promoted Glen Distefano to chief information security officer....

Heise Sicherheits NewsEin Bug erlaubte, mehr Geld abzuheben als vorgesehen. Das hat zu viele Amerikaner verlockt. Die Polizei hatte alle Hände voll zu tun....

Heise Sicherheits NewsDie Sicherheitslücke CVE-2020-1464 war Microsoft offenbar seit 2018 bekannt, wurde schon damals für Angriffe ausgenutzt – und doch erst jetzt geschlossen....

Heise Sicherheits NewsInnen- und Justizministerium haben laut einem Bericht vereinbart, dass Geheimdienste mit Staatstrojanern auch auf gespeicherte Chats und Mails zugreifen dürfen....

TheHackersNewsOne new security technology we keep hearing about is Extended Detection and Response (XDR). This new technology merges multiple prevention and detection technologies on a single platform to better understand threat signals so that you don't need to purchase, integrate, and manage various control and integration technologies. Think of XDR as prepackaged EDR, NTA, UEBA (and perhaps other...

TheHackersNewsCybersecurity researchers today took the wraps off a sophisticated, multi-functional peer-to-peer (P2P) botnet written in Golang that has been actively targeting SSH servers since January 2020. Called "FritzFrog," the modular, multi-threaded and file-less botnet has breached more than 500 servers to date, infecting well-known universities in the US and Europe, and a railway company, according...

securitymagazine.comActing Secretary of Homeland Security, Chad F. Wolf, introduced three new members to the Homeland Security Advisory Council (HSAC): John Clark, Dr. Sharon Cooper, and Daniel Kaniewski. ...

securitymagazine.comThe First Five Consortium, named for the critical first five minutes in responding to a disaster, will apply artificial intelligence and deep learning methodologies to address emergency preparedness and disaster response....

securitymagazine.comUntil March, there was a consistent narrative about supply chains and technology. Digitization had, gradually, come some way in the world of logistics. Manufacturers, shipping companies, and retailers — and the many other firms with solutions that represent the connective tissue between them — had been steadily integrating hardware and software technologies that leverage the internet (both “of things” and not). ...

securitymagazine.comThe Cybersecurity and Infrastructure Security Agency (CISA) released an update to its Essential Critical Infrastructure Workers Guidance. Version 4.0 provides guidance on how jurisdictions and critical infrastructure owners can use the list to assist in prioritizing the ability of essential workers to work safely while supporting ongoing infrastructure operations across the nation.    ...

securitymagazine.comAltice Europe, a leading player in the convergence between telecom and media in France, services 23 million customers through its SFR division—Société française du radiotelephone—providing voice, video, data, internet telecommunications and professional services to consumers and businesses. The business-to-consumer (B2C) IT division of SFR deploys dozens of major projects each year, including web, front-end, and office applications. ...

securitymagazine.comThe Los Angeles Unified School District (LAUSD) announced plans to test its 75,000 staff and 700,000 students who show symptoms of COVID-19....

securitymagazine.comBeginning this fall semester, Portland State University (PSU) campus safety officers will no longer carry guns when they are on patrol on campus. ...

securitymagazine.comNevada Governor Steve Sisolak announced the appointment of Alan Cunningham as the State Chief Information Officer....

TheHackersNewsEmotet, a notorious email-based malware behind several botnet-driven spam campaigns and ransomware attacks, contained a flaw that allowed cybersecurity researchers to activate a kill-switch and prevent the malware from infecting systems for six months. "Most of the vulnerabilities and exploits that you read about are good news for attackers and bad news for the rest of us," Binary Defense's...

TheHackersNewsWeb applications suffer continuously evolving attacks, where a web application firewall (WAF) is the first line of defense and a necessary part of organizations' cybersecurity strategies. WAFs are getting more sophisticated all the time, but as its core protection starts with efficient pattern matching, typically using Regular Expressions, and classifying malicious traffic to block cyber...

Weiter