Sicherheitsinfos

Wichtige SicherheitsinformationenHier veröffentlichen wir Sicherheitsinfos und Updateinformationen für Sie.

Da wir täglich in den tiefen des WWW unterwegs sind, finden wir oftmals wichtige Informationen rund um das Thema Sicherheit und bieten Ihnen so die Möglichkeiten, gewissen Gefahren auszuweichen und/oder zu beseitigen.

Leider ist es im Computeralltag so, dass immer gewisse Kreise mehr Informationen über Sie erhalten wollen, als Sie preisgeben wollen. Wir hoffen, Ihnen dadurch bei der Sicherheit Ihrer Systeme behilflich zu sein.
threatpost.comA never before seen malware has been used for espionage purposes via Linux systems, warn the NSA and FBI in a joint advisory....

threatpost.comThe APT is becoming more sophisticated over time....

threatpost.comThe video-conferencing specialist has yet to roll out full encryption, but it says it's working on it....

Heise Sicherheits NewsAus Googles Chrome- und Microsofts neuem Edge-Browser für Windows, macOS, Linux und mobile Betriebssysteme wurden diverse Sicherheitsprobleme beseitigt....

threatpost.comFortinet's recently released Global Threat Landscape Report shows how the perimeter is extending to the home in the first half of 2020 - and what that means for cybercrime....

TheHackersNewsAttention! If you use Amazon's voice assistant Alexa in you smart speakers, just opening an innocent-looking web-link could let attackers install hacking skills on it and spy on your activities remotely. Check Point cybersecurity researchers—Dikla Barda, Roman Zaikin and Yaara Shriki—today disclosed severe security vulnerabilities in Amazon's Alexa virtual assistant that could render it...

TheHackersNewsA team of academic researchers—who previously made the headlines earlier this year for uncovering severe security issues in the 4G LTE and 5G networks—today presented a new attack called 'ReVoLTE,' that could let remote attackers break the encryption used by VoLTE voice calls and spy on targeted phone calls. The attack doesn't exploit any flaw in the Voice over LTE (VoLTE) protocol; instead,...

threatpost.comRare attack on cellular protocol exploits an encryption-implementation flaw at base stations to record voice calls....

Heise Sicherheits NewsKünftige Prozessoren bringen Funktionen zur Kennzeichnung von RAM-Adressbereichen, um Angriffe etwa durch Return Oriented Programming (ROP) zu erschweren....

threatpost.comThe cross-site scripting flaw could enable arbitrary code execution, information disclosure - and even account takeover....

Heise Sicherheits NewsDie smarten Lautsprecher von Amazon sind populär. Das integrierte Sprachassistenzsystem Alexa konnte aber auch ein Einfallstor für Angreifer sein....

threatpost.comResearchers disclosed flaws in Amazon Alexa that could allow attackers to access personal data and install skills on Echo devices....

Heise Sicherheits NewsAutomatische Weiterleitung auf eine Phishing-Seite – kein Problem, wenn es Google macht?...

securitymagazine.comThe offices of the Chief Information Security Officer and the Chief Digital Officer have the biggest part to play in protecting consumers perception of a brand, but they couldn’t be more opposite in their objectives and operations. CISO’s are tasked with keeping the unknown users out. Their primary focus has been making sure internal users such as employees, contractors and vendors are properly vetted and authenticated. CDO’s are seeking to invite as many unknown users (prospects) in as they represent new business. Having said that, what would happen if the CISO and CDO partnered more closely to protect those unknown users (prospects) and improve their online experience?...

securitymagazine.comTo further develop its commitment to the UK, IFPO has appointed an Advisory Board to serve existing members, promote individual and corporate membership and promote its range of educational and certification offerings....

securitymagazine.comThe U.S. Department of Health and Human Services (HHS) publicly posted the July through December COVID-19 Testing Plans from all states, territories, and localities on HHS.gov....

securitymagazine.comGermany announced it had launched a federal agency to combat cyberattacks and strengthen its digital security. ...

securitymagazine.comNew research finds nearly half of organizations regularly and knowingly ship vulnerable code despite using application security tools. Among the top reasons cited for pushing vulnerable code were pressure to meet release deadlines (54 percent) and finding vulnerabilities too late in the software development lifecycle (45 percent), according to the Veracode and Enterprise Strategy Group (ESG) research....

securitymagazine.comCongressman Andy Barr (KY-06) introduced the NIST COVID-19 Cyber-Security Act, which instructs the Director of the National Institute of Standards and Technology (NIST) to produce standards for mitigating and protecting against cyberattacks to American universities researching COVID-19. ...

securitymagazine.comRegardless of the exact wording of The CMS Interoperability and Patient Access final rule, it’s clear that healthcare executives will be spending considerable time this year thinking about, planning for, and implementing technologies that support healthcare data exchange....

Weiter