Sicherheitsinfos

Wichtige SicherheitsinformationenHier veröffentlichen wir Sicherheitsinfos und Updateinformationen für Sie.

Da wir täglich in den tiefen des WWW unterwegs sind, finden wir oftmals wichtige Informationen rund um das Thema Sicherheit und bieten Ihnen so die Möglichkeiten, gewissen Gefahren auszuweichen und/oder zu beseitigen.

Leider ist es im Computeralltag so, dass immer gewisse Kreise mehr Informationen über Sie erhalten wollen, als Sie preisgeben wollen. Wir hoffen, Ihnen dadurch bei der Sicherheit Ihrer Systeme behilflich zu sein.
threatpost.comAttackers could hack the smartwatch and send dementia patients alerts for taking their medication....

TheHackersNewsA zero-day vulnerability has been discovered in Zoom video conferencing software for Windows that could allow an attacker to execute arbitrary code on a victim's computer running Microsoft Windows 7 or older. To successfully exploit the zoom vulnerability, all an attacker needs to do is tricking a Zoom user into performing some typical action like opening a received document file. No security...

Heise Sicherheits NewsFür Junos OS, Space (Security Director), Secure Analytics (JSA) und Session and Resource Control (SRC) gibt es Updates gegen teils kritische Schwachstellen....

threatpost.comCommon devices from Netgear, Linksys, D-Link and others contain serious security vulnerabilities that even updates don’t fix....

Heise Sicherheits NewsKDP versetzt Teile des Windows-10-Kernels und Treiber in einen schreibgeschützten Zustand – entsprechende Speicheradressen lassen sich dann nur noch auslesen....

Heise Sicherheits NewsMicrosoft warnt in Corona-Zeiten vor "Consent Phishing"-Kampagnen, die sich OAuth-Zustimmungen ergaunern, um Daten aus der Cloud abzugreifen....

Heise Sicherheits NewsDa Richtlinien nicht korrekt eingehalten wurden, entzieht DigiCert TLS-Zertifikaten von etwa Thawte & Co. das Vertrauen. Admins müssen die Zertifikate ersetzen....

Heise Sicherheits NewsIm State of Cloud Security 2020 untersucht Sophos die Sicherheit der Public Cloud. Weltweit geht diese für die Mehrheit mit Angriffen durch Kriminelle einher....

securitymagazine.comThe Government Accountability Office (GAO) found that shootings at K-12 schools most commonly resulted from disputes or grievances, for example, between students or staff, or between gangs, although the specific characteristics of school shootings over the past 10 years varied widely, according to GAO's analysis of the Naval Postgraduate School's K-12 School Shooting Database....

securitymagazine.comNew Mexico Gov. Michelle Lujan Grisham signed legislation requiring New Mexico police officers to wear body cameras as a deterrent against unlawful use of force and establishing strengthened accountability measures in instances of inappropriate excessive force....

securitymagazine.comBeginning in the fall 2020 semester, The University of Scranton will offer a new major in cybercrime and homeland security to address the growing needs to investigate and protect information in the realm of cyberspace for both government and private sectors....

securitymagazine.comThe National Retail Federation announced its annual exposition and conference will take place in-person at the Jacob Javits Convention Center in New York City June 6-8, 2021. In addition, NRF is hosting a virtual event January 12-14, 19 and 21-22, 2021....

securitymagazine.comNonprofits Insurance Alliance (NIA) announced that Steven Salar has joined NIA as Chief Risk Officer (CRO) responsible for compliance, risk management, internal audit, employment risk consulting, loss control and member support....

threatpost.comApplication-based attacks that use the passwordless "log in with..." feature common to cloud services are on the rise....

threatpost.comResearchers said that the issue is only exploitable on Windows 7 and earlier....

threatpost.comA new variant of the Joker malware has hoodwinked its way onto the Google Play marketplace yet again, in 11 Android apps that were recently removed....

TheHackersNewsCybersecurity researchers took the wraps off yet another instance of Android malware hidden under the guise of legitimate applications to stealthily subscribe unsuspecting users for premium services without their knowledge. In a report published by Check Point research today, the malware — infamously called Joker (or Bread) — has found another trick to bypass Google's Play Store protections:...

Heise Sicherheits NewsPrimär auf Netzwerke großer Unternehmen zielt der erweiterbare Security-Scanner Tsunami. Eine "Pre-Alpha-Version" nebst ausführlicher Doku liegt bei GitHub....

threatpost.comThe server contained almost 270 gigabytes of data collected from 200 police departments, law enforcement training and support resources and fusion centers....

threatpost.comResearchers have found trojans and adware in preinstalled apps on a low-cost device distributed by the government-funded Lifeline Assistance Program....

Weiter