1. Startseite

ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese
Anzeige

Webseiten News

News vom: 12.01.2018 um 09:30 Uhr

Hallo Liebe Leser,

Seite 1 von 7.208 Seiten (Bei Beitrag 1 - 35)
252.250x Beiträge in dieser Kategorie

Es wurde also auf TSecurity die 250.000 Artikel geknackt. 

Auf Twitter dauert es noch ein wenig bis die 250.000 Tweets erreicht sind.

Wegen der ganzen Spectre und Meltdown Nachrichten wollte ich hier einen Link zu einem Vulnerable Browser Checker schicken.

Viel Spaß beim News überfliegen oder lesen


Weitere News Beiträge ansehen: Webseiten News (25)

Startseite und alle Kategorien


Suchen

Sichere Verwendung von OAuth 2.0 für Enterprise-Logins

IT Security Nachrichten vom 21.06.2018 um 06:45 Uhr | Quelle searchsecurity.de
OAuth 2.0 ist ein Protokoll, das zur Authentifizierung von Anwendern und Geräten verwendet wird. Es enthält jedoch keine Mechanismen zur Autorisierung.

Weiterlesen Artikel ansehen

Kryptowährung klauen statt kaufen?: Wie Bitcoin und Blockchain gehackt werden

IT Security Nachrichten vom 19.01.2018 um 06:50 Uhr | Quelle computerwoche.de
Sowohl Bitcoins als auch die Blockchain sind anfällig für Hackerangriffe.

Weiterlesen Artikel ansehen

http://hec.gov.sy

Hacking vom 19.01.2018 um 05:03 Uhr | Quelle zone-h.org
http://hec.gov.sy notified by Rasoul

Weiterlesen Artikel ansehen

Why People Dislike Really Smart Leaders

IT Security Nachrichten vom 19.01.2018 um 04:30 Uhr | Quelle science.slashdot.org
An anonymous reader quotes a report from Scientific American: Intelligence makes for better leaders -- from undergraduates to executives to presidents -- according to multiple studies. It certainly makes sense that handling a market shift or legislative logjam requires cognitive oomph. But new research on leadership suggests that, at a certain point, having a higher IQ stops helping and starts hurting. The researchers looked at 379 male and female business leaders in 30 countries, across fields that included banking, retail and technology. The managers took IQ tests (an imperfect but robust predictor of performance in many areas), and each was rated on leadership style and effectiveness by an average of eight co-workers. IQ positively correlated with ratings of leader effectiveness, strategy formation, vision and several other characteristics -- up to a point. The ratings peaked at an IQ of around 120, which is higher than roughly 80 percent of office workers. Beyond that, the ratings declined. The researchers suggest the "ideal" IQ could be higher or lower in various fields, depending on whether technical versus social skills are more valued in a given work culture. The study's lead author, John Antonakis, a psychologist at the University of Lausanne in Switzerland, suggests leaders should use their intelligence to generate creative metaphors that will persuade and inspire others -- the way former U.S. President Barack Obama did. "I think the only way a smart person can signal their intelligence appropriately and still connect with the people," Antonakis says, "is to speak in charismatic ways."

Read more of this story at Slashdot.


Weiterlesen Artikel ansehen

Tesla Is Last In the Driverless Vehicle Race, Report Says

IT Security Nachrichten vom 19.01.2018 um 03:03 Uhr | Quelle apple.slashdot.org
Navigant Research has compiled a new report on 19 companies working on automated driving systems, and surprisingly, Tesla came in last place. U.S. News & World Report: Navigant ranked the 19 major companies developing AV technology based on 10 criteria, including vision, market strategy, partnerships, production strategy, technology, product quality and staying power. According to the report, General Motors Co. and Waymo, the auto unit of Alphabet, are the top two AV investment opportunities in the market today. Tesla and Apple are the two biggest laggards in the AV race, according to Navigant's rankings. Investors are acutely aware of Tesla's production and distribution disadvantages compared to legacy automakers like GM, but Navigant is also highly critical of Tesla's technology. "The autopilot system on current products has stagnated and, in many respects, regressed since it was first launched in late 2015," Navigant says in the report, according to Ars Technica. "More than one year after launching V2, Autopilot still lacks some of the functionality of the original, and there are many anecdotal reports from owners of unpredictable behavior."

Read more of this story at Slashdot.


Weiterlesen Artikel ansehen

Fix Slow VPN Connections: How to Speed Up Your VPN Connection

Betriebssysteme vom 19.01.2018 um 03:00 Uhr | Quelle feedproxy.google.com

Virtual private networks are known to be reliable, easy to use, and great for protecting your online activity. They also have a reputation for being slower than an unencrypted internet connection, and for some web users, that’s simply unacceptable. Fortunately you don’t have to put up with a slow VPN if you have the right […]

Read Fix Slow VPN Connections: How to Speed Up Your VPN Connection by John Bardinelli on AddictiveTips - Tech tips to make you smarter


Weiterlesen Artikel ansehen

http://cam.fiat.pt

Hacking vom 19.01.2018 um 02:36 Uhr | Quelle zone-h.org
http://cam.fiat.pt notified by naruto hacker

Weiterlesen Artikel ansehen

http://mcoutinholitoral.fiat.pt

Hacking vom 19.01.2018 um 02:36 Uhr | Quelle zone-h.org
http://mcoutinholitoral.fiat.pt notified by naruto hacker

Weiterlesen Artikel ansehen

http://lubripor.fiat.pt

Hacking vom 19.01.2018 um 02:36 Uhr | Quelle zone-h.org
http://lubripor.fiat.pt notified by naruto hacker

Weiterlesen Artikel ansehen

http://amf.fiat.pt

Hacking vom 19.01.2018 um 02:36 Uhr | Quelle zone-h.org
http://amf.fiat.pt notified by naruto hacker

Weiterlesen Artikel ansehen

http://automeclis.fiat.pt

Hacking vom 19.01.2018 um 02:36 Uhr | Quelle zone-h.org
http://automeclis.fiat.pt notified by naruto hacker

Weiterlesen Artikel ansehen

http://auto-acoreana.fiat.pt

Hacking vom 19.01.2018 um 02:36 Uhr | Quelle zone-h.org
http://auto-acoreana.fiat.pt notified by naruto hacker

Weiterlesen Artikel ansehen

http://mscar.fiat.pt

Hacking vom 19.01.2018 um 02:36 Uhr | Quelle zone-h.org
http://mscar.fiat.pt notified by naruto hacker

Weiterlesen Artikel ansehen

http://soveco-viseu.fiat.pt

Hacking vom 19.01.2018 um 02:36 Uhr | Quelle zone-h.org
http://soveco-viseu.fiat.pt notified by naruto hacker

Weiterlesen Artikel ansehen

http://comune.vittuone.mi.it/l0c.htm

Hacking vom 19.01.2018 um 02:35 Uhr | Quelle zone-h.org
http://comune.vittuone.mi.it/l0c.htm notified by Panataran

Weiterlesen Artikel ansehen

http://mcoutinhocentro.fiat.pt

Hacking vom 19.01.2018 um 02:34 Uhr | Quelle zone-h.org
http://mcoutinhocentro.fiat.pt notified by naruto hacker

Weiterlesen Artikel ansehen

Lifesaving Drone Makes First Rescue In Australia

IT Security Nachrichten vom 19.01.2018 um 02:25 Uhr | Quelle tech.slashdot.org
Zorro shares a report from Yahoo News: A pair of Australian swimmers on Thursday became the first people to be rescued in the ocean by a drone when the aerial lifesaver dropped a safety device to distressed teens caught in rough seas. In what is believed to be a world-first drone surf rescue, two boys on Thursday got caught in three-meter (10-foot) swells while swimming off Lennox Head in New South Wales, near the border with Queensland. Beachgoers onshore raised the alarm to the lifeguards who then alerted the drone pilot, and the aerial lifesaver was deployed in moments. Along with their ability to spot swimmers in trouble and deliver life saving devices faster than traditional lifesaving techniques, like launching surfboards or rubber dinghies, drones are being used in Australia to spot underwater predators like sharks and jellyfish. Artificial intelligence is being developed using thousands of images captured by a drone camera to build an algorithm that can identify different ocean objects. The software can differentiate between sea creatures, like sharks which it can recognize with more than 90 percent accuracy, compared to about 16 percent with the naked eye.

Read more of this story at Slashdot.


Weiterlesen Artikel ansehen

Amazon Picks 20 Finalists For 'HQ2' Second Headquarters Location

IT Security Nachrichten vom 19.01.2018 um 01:45 Uhr | Quelle news.slashdot.org
bigpat writes: Amazon took in hundreds of proposals and narrowed it down to twenty places for its "second" headquarters, with up to 50,000 new jobs promised in the next 15 years and millions of square feet of office and research space. The cities include: Atlanta, Austin, Boston, Chicago, Columbus, Dallas, Denver, Indianapolis, Los Angeles, Miami, Montgomery County, Maryland, Nashville, Newark, NJ, New York City, Northern Virginia, Philadelphia, Pittsburgh, Raleigh, Toronto and Washington D.C. Amazon said that it will now work with the candidate locations to examine their proposals more closely and request additional information to "evaluate the feasibility of a future partnership that can accommodate our hiring plans as well as benefit our employees and the local community." The company said it would make its decision later in 2018.

Read more of this story at Slashdot.


Weiterlesen Artikel ansehen

Google's Fuchsia OS On the Pixelbook

IT Security Nachrichten vom 19.01.2018 um 01:03 Uhr | Quelle hardware.slashdot.org
An anonymous reader quotes a report from 9to5Google: Our early look at Fuchsia OS last May provided a glimpse into a number of new interface paradigms. Several months later, we now have an updated hands-on with Google's future operating system that can span various form factors. This look at the in-development OS eight months later comes courtesy of Ars Technica who managed to get Fuchsia installed on the Pixelbook. The Made by Google Chromebook is only the third officially supported "target device" for Fuchsia development. As our last dive into the non-Linux kernel OS was through an Android APK, we did not encounter a lockscreen. The Ars hands-on shows a basic one that displays the time at center and Fuchsia logo in the top-left corner to switch between phone and desktop/tablet mode, while a FAB (of sorts) in the opposite corner lets users bring up WiFi controls, Login, and Guest. Only Guest is fully functioning at this stage -- at least for non-Google employees. Once in this mode, we encounter an interface similar to the one we spotted last year. The big difference is how Google has filled in demo information and tweaked some elements. On phones and tablets, Fuchsia essentially has three zones. Recent apps are above, at center are controls, and below is a mixture of the Google Feed and Search. The controls swap out the always-displayed profile icon for a Fuchsia button. Tapping still surfaces Quick Settings which actually reflect current device battery levels and IP address. Impressively, Ars found a working web browser that can actually surf the internet. Google.com is the default homepage, with users able to visit other sites through that search bar. Other examples of applications, which are just static images, include a (non-working) phone dialer, video player, and Google Docs. The Google Calendar is notable for having subtle differences to any known version, including the tablet or web app.

Read more of this story at Slashdot.


Weiterlesen Artikel ansehen

Failed To Install a Dependency on Kodi? Here’s How to Fix It.

Betriebssysteme vom 19.01.2018 um 01:00 Uhr | Quelle feedproxy.google.com

When installing Kodi add-ons from around the web, you may occasionally encounter error messages. Of these error messages, perhaps the most prominent is “Failed To Install a Dependency”, which can be difficult to deal with if you’re new to Kodi or don’t know exactly what to do about the problem. Because this error has multiple […]

Read Failed To Install a Dependency on Kodi? Here’s How to Fix It. by Chris Harper on AddictiveTips - Tech tips to make you smarter


Weiterlesen Artikel ansehen

Who Can Build a Sci-Fi Worthy Virtual World? - Build Out #2

Videos vom 19.01.2018 um 00:30 Uhr | Quelle youtube.com

Weiterlesen Artikel ansehen

Ask Slashdot: How Would You Explain Einstein's Theories To a Nine-Year-Old?

IT Security Nachrichten vom 19.01.2018 um 00:20 Uhr | Quelle science.slashdot.org
SiggyRadiation writes: A few days ago, my 9-year-old son asked me why Albert Einstein was so famous. I decided not just to start with the famous formula E=mc^2, because that just seemed to be the easy way out. So I tried to explain what mass and energy are. Then I asked him to try to explain gravity to me. The earth pulls at you because it has a lot of mass. But how can the earth influence your body, pull your feet to the ground, without actually touching you? Why is it that one thing (the earth) can influence something else (you) without actually being connected? Isn't that weird? Einstein figured out how energy, mass and gravity work and are related to each other. This is where our conversation ended. Afterwards I thought: this might be a nice question to ask on Slashdot; how would I continue this discussion to explain it to him further? Of course, with the goal of further feeding his interest in physics.

Read more of this story at Slashdot.


Weiterlesen Artikel ansehen

Everything Cryptocurrency: Coinhive, RIG Exploit Kit, Olympic Malware

IT Security Video vom 19.01.2018 um 00:19 Uhr | Quelle youtube.com

Weiterlesen Artikel ansehen

You get a lawsuit! And you get a lawsuit! And you! Now Apple sued over CPU security flaws

IT Security Nachrichten vom 19.01.2018 um 00:15 Uhr | Quelle go.theregister.com

iGiant up next in the Meltdown-Spectre-sueball-a-palooza

Add Apple to the list of companies facing a legal backlash in the US over the Spectre and Meltdown CPU security fiasco.…


Weiterlesen Artikel ansehen

Best VPNs for Switzerland in 2018, Plus Why You Need One

Betriebssysteme vom 19.01.2018 um 00:00 Uhr | Quelle feedproxy.google.com

Switzerland has one of the highest internet penetration rates in Europe. A huge percentage of the country’s population has reliable web access, over 87% as of 2016. That’s a lot of people doing a lot of things online. While the government doesn’t impose strict regulations on which sites citizens can visit, there are some restrictions […]

Read Best VPNs for Switzerland in 2018, Plus Why You Need One by John Bardinelli on AddictiveTips - Tech tips to make you smarter


Weiterlesen Artikel ansehen

Sprawling Mobile Espionage Campaign Targets Android Devices

IT Security Nachrichten vom 18.01.2018 um 23:59 Uhr | Quelle threatpost.com
A massive mobile espionage campaign has been collecting troves of sensitive personal information since 2012, according to a new report from the Electronic Frontier Foundation and security firm Lookout.

Weiterlesen Artikel ansehen

Wine 3.0 Released

IT Security Nachrichten vom 18.01.2018 um 23:40 Uhr | Quelle tech.slashdot.org
prisoninmate shares a report from Softpedia: The Wine (Wine Is Not an Emulator) project has been updated today to version 3.0, a major release that ends 2017 in style for the open-source compatibility layer capable of running Windows apps and games on Linux-based and UNIX-like operating systems. Almost a year in the works, Wine 3.0 comes with amazing new features like an Android driver that lets users run Windows apps and games on Android-powered machines, Direct3D 11 support enabled by default for AMD Radeon and Intel GPUs, AES encryption support on macOS, Progman DDE support, and a task scheduler. In addition, Wine 3.0 introduces the ability to export registry entries with the reg.exe tool, adds various enhancements to the relay debugging and OLE data cache, as well as an extra layer of event support in MSHTML, Microsoft's proprietary HTML layout engine for the Windows version of the Internet Explorer web browser. You can read the full list of features and download Wine 3.0 from WineHQ's website.

Read more of this story at Slashdot.


Weiterlesen Artikel ansehen

.Net Core: What To Expect Next

Programmierung vom 18.01.2018 um 23:37 Uhr | Quelle youtube.com

Weiterlesen Artikel ansehen

IBM: IT-Koloss stoppt mit roten Zahlen jahrelangen Umsatzrückgang - Zukunftsfokus liegt auf Cloud ...

IT Security Nachrichten vom 18.01.2018 um 23:07 Uhr | Quelle google.com
IBM: IT-Koloss stoppt mit roten Zahlen jahrelangen Umsatzrückgang - Zukunftsfokus liegt auf Cloud, KI, Security und Blockchain ... ARMONK/NEW YORK (IT-Times) - Der US-amerikanische IT- und Softwarekonzern International Business Machines (IBM) Corp. hat seine Zahlen für das vierte Quartal und ...

Weiterlesen Artikel ansehen

Latest Fedora 27 Linux Updated Live ISOs Ship with Meltdown and Spectre Patches

IT Security Nachrichten vom 18.01.2018 um 23:07 Uhr | Quelle news.softpedia.com
Fedora ambassador and founder of the Fedora Unity project Ben Williams announced the release of a new set of updated live ISO images for the Fedora 27 Linux operating system. The F27-20180112 respin live installation images are now available, including the Linux 4.14.13-300 kernel with patches against the Meltdown and Spectre security vulnerabilities, as well as all the latest software updates and security fixes. "The Fedora Respins SIG is pleased to announce the latest release of updated [Fedora] 27 Live ISOs, carrying the 4.14.13-300 kernel," reads the announcement. "This set of updated ISOs will save about 800 MB of updates after install (for new installs)." Incorporating Meltdown/Spectre patches means that you can u...

Weiterlesen Artikel ansehen

'Text Bomb' Is Latest Apple Bug

IT Security Nachrichten vom 18.01.2018 um 23:03 Uhr | Quelle it.slashdot.org
An anonymous reader quotes a report from the BBC: A new "text bomb" affecting Apple's iPhone and Mac computers has been discovered. Abraham Masri, a software developer, tweeted about the flaw which typically causes an iPhone to crash and in some cases restart. Simply sending a message containing a link which pointed to Mr Masri's code on programming site GitHub would be enough to activate the bug -- even if the recipient did not click the link itself. Mr Masri said he "always reports bugs" before releasing them. Apple has not yet commented on the issue. On a Mac, the bug reportedly makes the Safari browser crash, and causes other slowdowns. Security expert Graham Cluley wrote on his blog that the bug does not present anything to be particularly worried about -- it's merely very annoying. After the link did the rounds on social media, Mr Masri removed the code from GitHub, therefore disabling the "attack" unless someone was to replicate the code elsewhere.

Read more of this story at Slashdot.


Weiterlesen Artikel ansehen

The Blacklist: Recap zu "Abraham Stern" S05E11

Nachrichten vom 18.01.2018 um 22:50 Uhr | Quelle feedproxy.google.com
In der 100. Episode von The Blacklist geht Red auf Schatzsuche, nachdem ihm ein seltener Penny entwendet wurde. Was sonst noch passiert, erfahrt ihr in unserem Recap zu "Abraham Stern". Dieser Artikel wurde einsortiert unter RTL, TV-Serie / Webserie, RTL Crime, The Blacklist (TV-Serie).

Weiterlesen Artikel ansehen

Windows 10 Touchpad Einstellungen

Nachrichten vom 18.01.2018 um 22:39 Uhr | Quelle winfuture.de
Bilder-Galerie: Windows 10 Touchpad Einstellungen (Weiter lesen)

Weiterlesen Artikel ansehen

http://nealtican.puebla.gob.mx

Hacking vom 18.01.2018 um 22:28 Uhr | Quelle zone-h.org
http://nealtican.puebla.gob.mx notified by xnxx.com

Weiterlesen Artikel ansehen

Bitcoin's Fluctuations Are Too Much For Even Ransomware Cybercriminals

IT Security Nachrichten vom 18.01.2018 um 22:25 Uhr | Quelle yro.slashdot.org
Bitcoin's price swings are so huge that even ransomware developers are dialling back their reliance on the currency, according to researchers at cybersecurity firm Proofpoint. From a report: Over the last quarter of 2017, researchers saw a fall of 73% in payment demands denominated in bitcoin. When demanding money to unlock a victim's data, cybercriminals are now more likely to simply ask for a figure in US dollars, or a local currency, than specify a sum of bitcoin. Just like conventional salespeople, ransomware developers pay careful attention to the prices they charge. Some criminals offer discounts depending on the region the victim is in, offering cheaper unlocking to residents of developing nations, while others use an escalating price to encourage users to pay quickly and without overthinking things. But a rapidly oscillating bitcoin price plays havoc with those goals, Proofpoint says.

Read more of this story at Slashdot.


Weiterlesen Artikel ansehen

Seitennavigation

Seite 1 von 7.299 Seiten (Bei Beitrag 1 - 35)
255.457x Beiträge in dieser Kategorie

Nächste 2 Seite | Letzte Seite

Folge uns auf Twitter um einen Echtzeit-Stream zu erhalten. Updates alle 5 Minuten!

Die Webseite benutzt einen Cache von 10-15 Minuten