Sicherheitsinfos

Wichtige SicherheitsinformationenHier veröffentlichen wir Sicherheitsinfos und Updateinformationen für Sie.

Da wir täglich in den tiefen des WWW unterwegs sind, finden wir oftmals wichtige Informationen rund um das Thema Sicherheit und bieten Ihnen so die Möglichkeiten, gewissen Gefahren auszuweichen und/oder zu beseitigen.

Leider ist es im Computeralltag so, dass immer gewisse Kreise mehr Informationen über Sie erhalten wollen, als Sie preisgeben wollen. Wir hoffen, Ihnen dadurch bei der Sicherheit Ihrer Systeme behilflich zu sein.
securitymagazine.comWe talk to Felix Nater, security management consultant who helps employers implement and manage workplace security strategy and policy, on how COVID-19 will leave behind a complicated form of grief that could linger potentially for many years after the immediate crisis has abated....

securitymagazine.comThe COVID-19 pandemic revealed the weakness of many organizations’ business continuity plans. Many companies learned too late that their plans were inadequate, lacking interoperability with other critical plans for crisis management, disaster recovery, and pandemic readiness....

threatpost.comEven so, backdoors and droppers are rare in the wild....

securitymagazine.comThe nature of IIoT devices and infrastructure makes them high-value cyber targets. This is because they are relatively easy to compromise and are often connected to internal networks with high-value content with links to other networks. Moreover, IIoT devices rarely have direct user interaction, and this unattended nature means that many types of device compromise are likely to go unnoticed and undetected – particularly when the malware does not disrupt the device’s primary functionality. Here are a dozen reasons why intelligent IIoT devices are attractive targets for hackers....

securitymagazine.comMy favorite definition of the (public) cloud is “It’s someone else’s computer.” That is really what any external cloud service is. And if your services, data and other assets are located on someone else’s equipment, you are at their mercy on whether you can access those assets and data at any time. It isn’t up to you. It’s solely determined by them, and any service level agreement you agreed to. And you can lose everything stored there permanently. You should have multiple backups of your data no matter where it is stored, especially including if it is stored using a cloud service....

securitymagazine.comObstacles including budget concerns, time constraints, stubborn company culture, or a lack of cybersecurity best practices can seem overwhelming, especially to a smaller organization with limited resources. Fortunately, there are reasonable solutions to each of these roadblocks that can help all organizations be more secure....

threatpost.comSeveral vulnerabilities can be chained together for a full exploit....

threatpost.comFacebook has fixed a privacy issue that gave developers access to user data long after the 90-day "expiration" date....

Heise Sicherheits NewsWochenlang konnten Ermittler in einem verschlüsselten Chatsystem mitlesen, über das illegale Geschäfte gemacht wurden. Dann schlugen sie zu....

Heise Sicherheits NewsNach Erkenntnissen eines Sicherheitsforschers ist der Inhalt von knapp 23.000 öffentlich zugänglichen MongoDB-Installationen von Erpressern "gestohlen" worden....

TheHackersNewsA new research has uncovered multiple critical reverse RDP vulnerabilities in Apache Guacamole, a popular remote desktop application used by system administrators to access and manage Windows and Linux machines remotely. The reported flaws could potentially let bad actors achieve full control over the Guacamole server, intercept, and control all other connected sessions. According to a...

threatpost.comNew ‘smishing’ campaigns from the Roaming Mantis threat group infect Android users with the FakeSpy infostealer....

Heise Sicherheits NewsMit zwei Sicherheitsupdates bessert das Service-Mesh vier Schwachstellen im Envoy-Proxy aus. Das Istio-Team empfiehlt Nutzern ein Upgrade auf die neue Version....

Heise Sicherheits NewsMicrosoft hat Hinweise zu Lücken in der Windows Codecs Library vom vergangenen Dienstag überarbeitet und die potenziell betroffenen Systeme stark eingegrenzt....

securitymagazine.comSince joining the University of Utah as the inaugural Chief Safety Officer (CSO) in February 2020, Marlon Lynch has reorganized the structure of the Department of Public Safety. The changes, which include the addition of new leadership throughout the organization and the elevation and growth of existing divisions, increases capacity, improves accountability and better meets the needs of the U community....

securitymagazine.comThe Lookout Threat Intelligence team has discovered four Android surveillanceware tools, which they named SilkBean, DoubleAgent, CarbonSteal, and GoldenEagle. These four interconnected malware tools are elements of much larger mAPT (mobile advanced persistent threat) campaigns originating in China, and primarily targeting the Uyghur ethnic minority, says the team....

securitymagazine.comA survey by the Centers for Disease Control and Prevention found that 54% of people infected with coronavirus were unable to pinpoint who may have infected them....

securitymagazine.comIBM Security announced the results of a global report examining businesses' effectiveness in preparing for and responding to cyberattacks....

securitymagazine.comIn the first quarter of the year, DDoS attacks rose more than 278 percent compared to Q1 2019 and more than 542 percent compared to the last quarter, according to Nexusguard’s Q1 2020 Threat Report....

securitymagazine.comYesterday (July 1, 2020) marked the official deadline to achieve compliance of the California Consumer Privacy Act (CCPA)....

Weiter