logo
 
  1. Startseite

EnglishFrenchGermanItalianPortugueseRussianSpanish

Webseiten News

News vom: 02.02.2016 um 18:56 Uhr

Hallo, 

das neue Design sieht unter Chrome leicht anders aus als unter Firefox und Edge.

NEU: RSS-Feeds für jede Kategorie. Die RSS-Feeds umfassen immer alle Unterkategorien. Das RSS-Symbol ist in der jeweiligen News Kategorie gut sichtbar.

NEU: Bewerten der News von "sehr schlechte Nachricht" bis "sehr gute Nachricht".

NEU: Teilen zu Twitter und Facebook bei jeder Inhaltsseite.

Kommentieren ist bald auch möglich.

Kommentare und News Alerts (RSS-Feed mit Suchwortfunktion) und Email Nachricht bei Aktuallisierung und natürlich nur benachrichtigen bei einem Suchwort in Kategorie X.

Weitere News Beiträge ansehen: Webseiten News (5)

Startseite und alle Kategorien


Suchen

News Quellen: 74x
Unterkategorien: 19x
Alle Kategorien RSS-Feed

Weitere Seiten anzeigen
Seite 1 / 1128 Seiten
Artikel in Kategorie: 56.363x
Zurück [2] [3] [4] [5] [6] [7] Vor

Corporate Governance

Nachrichten vom 31.05.2018 um 02:00 Uhr
Corporate Governance umfasst Regeln und Prozesse, mit denen Unternehmen rechtlich einwandfreies und ethisch korrektes Handeln sicherstellen wollen.
News bewerten:
... mehr

ALS Ice Bucket Challenge Funding Leads To New Genetic Findings

IT-Security vom 28.07.2016 um 02:05 Uhr
An anonymous reader writes: Researchers are crediting the ALS Ice Bucket Challenge, a fundraiser for amyotrophic lateral sclerosis that went viral in 2014, for funding a new study that has possibly identified a common gene that contributes to the nervous system disease. Yahoo reports via Good Morning America: "In a study published in The Nature Genetics Journal, researchers from various institutions, including the University of Massachusetts Medical School and the University Medical Center Utrecht, identified the gene NEK1 as a common gene that could have an impact on who develops the disease. Variants of the gene appear to lead to increased risk of developing ALS, according to preliminary findings. Researchers in 11 countries studied 1,000 families in which a family member developed ALS and conducted a genome-wide search for any signs that a gene could be leading to increased ALS risk. After identifying the NEK1 gene, they also analyzed 13,000 individuals who had developed ALS despite no family history and found they had variants in that same gene, again linking that gene with increased ALS risk. Starting in the summer of 2014, the ALS Ice Bucket Challenge led to 17 million videos made and $220 million raised, according to the ALS Association -- $115 million of which went to the association."

Share on Google+

Read more of this story at Slashdot.


News bewerten:
... mehr

openSUSE Tumbleweed Users Get Latest KDE Goodies, Linux Kernel 4.7 Coming Soon

IT-Security vom 28.07.2016 um 01:59 Uhr
Today, July 27, 2016, openSUSE Project's Douglas DeMaio informs the Tumbleweed community about the latest software updates that landed recently in the main software repositories of the rolling release operating system. Last week, openSUSE Tumbleweed finally received the brand new KDE Plasma 5.7 desktop environment, along with the third and last maintenance update of the KDE Applications 16.04 software suite, and the KDE Frameworks 5.24.0 collection of add-ons for the Qt 5.7 GUI toolkit. Users also received the Linux 4.6.4 kernel, though openSUSE devs promised to bring the new L...
News bewerten:
... mehr

Citibank Sysadmin Gets 21 Months in Jail for Wiping Bank's Routers

IT-Security vom 28.07.2016 um 01:55 Uhr
A Texas judge sentenced Lennon Ray Brown, 38, to 21 months in prison for intentionally wiping out the configuration of nine out of ten Citibank routers, causing the bank's entire network to go down for hours in December 2013. Brown was one of Citibank's long-standing contractors for many years, and he eventually joined the bank's Texas branch in February 2013, as a full-time employee. In his job as a computer engineer, Brown's responsibilities were to manage the bank's IT network. Brown shut down 90% of Citibank's entire North American network According to court papers, on December 2013, Brown was called in and reprimanded by one of his bosses for his poor work performance. Later during the same day, authorities say that Brown waited for working hours to finish, and at 18:03 sent commands to the bank's IT network that deleted the configurations for the company's routers. Brown wanted to wipe out all of the bank's ten central routers, but the co...
News bewerten:
... mehr

Office 365 Gets New Word, PowerPoint and Outlook Features

IT-Security vom 28.07.2016 um 01:20 Uhr
New submitter Miche67 writes: As part of the July 2016 update to Office 365, Microsoft is adding several features across the board to Word, PowerPoint and Outlook. Word, however, is getting the biggest new features -- Researcher and Editor -- to improve your writing. "As its name implies, Researcher is designed to help the user find reliable sources of information by using the Bing Knowledge Graph to search for sources, and it will properly cite them in the Word document," reports Network World. "[Editor] builds on the already-existing spellchecker and thesaurus to offer suggestions on how to improve your overall writing. In addition to the wavy red line under a misspelled word and the wavy blue line under bad grammar, there will be a gold line for writing style." The new features are expected to be available later this year. In addition to the two new features added to PowerPoint last year -- Designer and Morph, Microsoft is offering Zoom, a feature that lets you easily create "interactive, non-linear presentations." "Instead of the 1-2-3-4 linear method of presenting slides, forcing you to place them all in the order you wish to display, presenters will be able to show their slides in any order they want at any time," reports Network World. "This way you can change your presentation order as needed without having to stop PowerPoint or interrupt the display." As for Outlook, Focused Inbox is coming to Office 365. Focused Inbox separates your inbox into two tabs. The "Focused" tab is where all of your high-priority emails will be found, while everything else will be in the "Other" tab. Outlook will learn from your behavior over time and sort your mail accordingly. In addition, @mentions are coming to Outlook 365 and Outlook for PC and Mac, "making it easy to identify emails that need your attention, as well as flag actions for others."

Share on Google+

Read more of this story at Slashdot.


News bewerten:
... mehr

Linux Kernel 4.4.16 LTS Released with Over 150 Changes, It's Already in Solus

IT-Security vom 28.07.2016 um 01:20 Uhr
Immediately after announcing the release of Linux kernel 4.6.5, renowned kernel developer Greg Kroah-Hartman published details about the sixteenth maintenance update for the long-term supported Linux 4.4 kernel series. Linux 4.4  is currently the most advanced LTS (Long Term Support) kernel branch, and it is being used by numerous GNU/Linux operating systems that want to offer their users thoroughly tested kernel packages that receive security updates and new features for a couple of years. Among these, we can mention Arch Linux, Solus, and Ubuntu Linux. Today's update, Linux kernel 4.4.16 LTS, is an important one as changes a total of 156 files, with 1475 insertions and 845 deletions. Therefore, we're urging all users of a GNU/Linux operating system powered by a ...
News bewerten:
... mehr

Researchers Crack Mad Max Botnet DGA Algorithm and See in the Future

IT-Security vom 28.07.2016 um 01:10 Uhr
Arbor Networks researchers have reverse-engineered the domain generation algorithm (DGA) used by the Mad Max malware to connect to its botnet, which now allows them to put counter-measures in place to prevent infection and sinkhole its operations. Mad Max is a new malware spotted for the first time earlier this year. Little research exists on this malware, outside of a mention from UK security firm Sophos. Based on its analysis, Arbor Networks defines Mad Max as a "targeted trojan," a definition that implies usage in targeted attacks, usually for cyber-espionage, industrial espionage, or other hacking operations specific to very sophisticated threat actors. Mad Max uses a different C&C server each week Arbor discovered that like most modern malware, Mad Max connects to a C&C server to communicate with its masters. Like most advanced malware, the address of this C&C server is not hard-coded in its source but generated automatically based on a DGA,...
News bewerten:
... mehr

Antivirus Live CD 19.0-0.99.2 Released Based on 4MLinux 19.0 and ClamAV 0.99.2

IT-Security vom 28.07.2016 um 00:50 Uhr
Softpedia was informed by GNU/Linux developer and creator of the 4MLinux project, Mr. Zbigniew Konojacki, about the immediate availability for download of the Antivirus Live CD 19.0-0.99.2 distrolette. The Antivirus Live CD 19.0-0.99.2 release is here based on the recently announced 4MLinux 19.0 Beta operating system, bringing all the new GNU/Linux technologies, and it includes the latest version of the popular, open-source, free, and cross-platform ClamAV (Clam AntiVirus) 0.99.2 antivirus software. We'll take this opportunity to remind those behind their Antivirus Live CD reading that, as its name suggests, the project provides a bootable ISO image that acts as an antivirus tool which you can use to clean your PCs of viruses, independent of the operating system installed on the respective computer.
News bewerten:
... mehr

Amazon Debuts a Dedicated Shop For Kickstarter Products

IT-Security vom 28.07.2016 um 00:40 Uhr
An anonymous reader quotes a report from TechCrunch: Today, Amazon announced it's teaming up with Kickstarter to offer those successful Kickstarter products a way to reach more customers through a dedicated section on Amazon's website. Via www.amazon.com/launchpad/kickstarter, the online retailer is now featuring a group of over 300 Kickstarter products across a variety of categories, like electronics, books, home and kitchen, movies and tv, and more. The products can also be browsed by theme, like STEM products, "Always be Learning," "Exquisite Objects," "Inventing the Future," and "Public Benefit," for example. The new Kickstarter section is actually an expansion on Amazon's Launchpad platform, launched a year ago. In July 2015, the retailer debuted a dedicated portal that offered both marketing and sales for hardware and physical goods from younger tech companies. Today, Amazon says it has now worked with over 100 VCs, accelerators and crowdfunders and has helped more than 1,000 launch products across the U.S., the U.K., China, Germany, and France. All startups who participate in Launchpad receive custom product pages, a comprehensive marketing package, and access to Amazon's global fulfillment network, the retailer notes.

Share on Google+

Read more of this story at Slashdot.


News bewerten:
... mehr

Puppy Linux Cousin Toutou Linux 6.3.2 "SlaXen" Alpha Released for Public Testing

IT-Security vom 28.07.2016 um 00:27 Uhr
Toutou, one of the fastest and most comprehensive minimalist GNU/Linux distributions, is again in development, it looks like we're now able to test drive the 6.3.2 Alpha release of the upcoming Toutou Linux SlaXen series. Toutou Linux is based on the popular Puppy Linux computer operating system designed by Barry Kauler, and it provides a French distro that is easy to install, bootable from any possible medium, usable directly from the Live USB with persistent mode, as well as extremely intuitive for Linux beginners. The new release, Toutou Linux "SlaXen" 6.3.2 is based on the upstream Puppy Linux "Slacko" 6.3.2 operating system, and it looks like it's using the Openbox 3.5.2 window manager, Lxpanel 0.6.1 standard panel from the LXDE desktop environment, and a bunch of lightweight open source applications that are great for old computers. Among the applications pre-installed in the Toutou Linux "SlaXen" 6.3.2 release, we c...
News bewerten:
... mehr

GTK+ 3.21.4 GUI Toolkit Fixes Clipboard Handling on Wayland, Adds New APIs

IT-Security vom 28.07.2016 um 00:00 Uhr
As part of the GNOME 3.21.4 desktop environment release, the development team behind the popular and widely-used GTK+ GUI (Graphical User Interface) toolkit have released development version 3.21.4. GTK+ 3.21.4 introduces various improvements and lots of bugfixes, and, as usual, we've managed to get our hands on the internal changelog to tell you what's new. But first, we would like to inform those not in the known that GTK+ 3.21.4 is a development release towards GTK+ 3.22, which will be distributed as part of the GNOME 3.22 desktop. Among the changes, we can mention support for the new CSS "background-blend-mode," GdkDrawingContext widget support for the Mozilla Firefox web browser, GtkApplication widget registering support for the Xfce session manager, as well as expanding children for the GtkHeaderBar widget. Moreover, the GtkPrint...
News bewerten:
... mehr

One Billion iPhones Have Been Sold, Apple Says

IT-Security vom 28.07.2016 um 00:00 Uhr
Apple announced on Wednesday that it has sold its one billionth iPhone handset. The milestone comes nine years after the iPhone was first introduced. The phone has unarguably shaped the smartphone industry and bolstered the apps market. In a statement, Tim Cook said: iPhone has become one of the most important, world-changing and successful products in history. It's become more than a constant companion. iPhone is truly an essential part of our daily life and enables much of what we do throughout the day. Last week we passed another major milestone when we sold the billionth iPhone. We never set out to make the most, but we've always set out to make the best products that make a difference. Thank you to everyone at Apple for helping change the world every day.

Share on Google+

Read more of this story at Slashdot.


News bewerten:
... mehr

Attack With WPAD Protocol and PAC Files Can Leak HTTPS Traffic

IT-Security vom 27.07.2016 um 23:55 Uhr
Alex Chapman and Paul Stone from Context, a UK cyber security consultancy firm, have discovered a new attack method using the WPAD protocol and PAC files to leak information about the HTTPS sites a user is visiting. Their discovery is yet another drop in the lake of exploits that use the widely insecure WPAD protocol. WPAD stands for Web Proxy Auto-Discovery and is a protocol used to broadcast proxy configurations across a network. This "broadcasting" operation is done using proxy configurations called PAC files, or proxy auto-configs, which browsers or other Internet-connecting apps receives before being routed to their destination. Attack leaks full URL path for HTTPS websites Chapman and Stone say that an attacker already on a compromised network can sniff for transiting PAC files and inject their content with malicious code. This is possible wh...
News bewerten:
... mehr

Wine 1.9.15 Has Patches for Alone in the Dark, Bloodrayne and Kings Quest 8

IT-Security vom 27.07.2016 um 23:37 Uhr
Wine 1.9.15 has been made available for download for GNU/Linux users who want to run various Windows games and applications on their favorite distributions, along with Wine-Staging 1.9.15. With 22 fixes on board for various Windows apps and games (see below for details), Wine 1.9.15 introduces more shader instructions in Direct3D, adds performance improvements to GDI, improves the Active Scripting support, injects extra stream support in the C++ runtime, and offers better multi-joystick support on macOS. Among the Windows games that received improvements in the Wine 1.9.15 release, which is the latest development snapshot of the free implementation of Windows on Unix, we can mention Kings Quest 8, Metacell Demo, Tesla Effect, Bloodrayne 1 and 2, Aliens vs. Triangles Demo, Gauntlet, Max Payne Demo, and Alone in the Dark. Slow screen update issues were fixed for Kirikiri-based games Additionally,...
News bewerten:
... mehr

Comcast Excited To Have Lost 4,000 TV Subscribers This Spring

IT-Security vom 27.07.2016 um 23:20 Uhr
An anonymous reader writes from a report via The Consumerist: Comcast has released their second quarter results and they are happy to announce that they lost 4,000 TV subscribers in the last three months. Why are they so happy to announce such a loss? Because, compared to the same time last year where they lost 69,000 TV subscribers, the loss this year is much better for them. Comcast said in a statement to investors that "video customers net losses improved to 4,000, the best second quarter result in over 10 years." That Consumerist reports: "That means that for the most than a decade, the best Comcast can do in April to June of every year is to lose only 4,000 TV subscribers. At this time last year, Comcast reported 22.3 million TV subscribers, and at the same time this year, they report roughly 22.3 million TV subscribers. The major driver of increased subscriptions comes, as you'd guess, from broadband. Comcast reports an increase of 220,000 broadband customers in the second quarter which, in the overall growth of the company, entirely offsets a lost of 4,000 TV viewers."

Share on Google+

Read more of this story at Slashdot.


News bewerten:
... mehr

Protecting Android with more Linux kernel defenses

Android Tipps vom 27.07.2016 um 23:13 Uhr

Posted by Jeff Vander Stoep, Android Security team

Android relies heavily on the Linux kernel for enforcement of its security model. To better protect the kernel, we’ve enabled a number of mechanisms within Android. At a high level these protections are grouped into two categories—memory protections and attack surface reduction.

Memory protections

One of the major security features provided by the kernel is memory protection for userspace processes in the form of address space separation. Unlike userspace processes, the kernel’s various tasks live within one address space and a vulnerability anywhere in the kernel can potentially impact unrelated portions of the system’s memory. Kernel memory protections are designed to maintain the integrity of the kernel in spite of vulnerabilities.

Mark memory as read-only/no-execute

This feature segments kernel memory into logical sections and sets restrictive page access permissions on each section. Code is marked as read only + execute. Data sections are marked as no-execute and further segmented into read-only and read-write sections. This feature is enabled with config option CONFIG_DEBUG_RODATA. It was put together by Kees Cook and is based on a subset of Grsecurity’s KERNEXEC feature by Brad Spengler and Qualcomm’s CONFIG_STRICT_MEMORY_RWX feature by Larry Bassel and Laura Abbott. CONFIG_DEBUG_RODATA landed in the upstream kernel for arm/arm64 and has been backported to Android’s 3.18+ arm/arm64 common kernel.

Restrict kernel access to userspace

This feature improves protection of the kernel by preventing it from directly accessing userspace memory. This can make a number of attacks more difficult because attackers have significantly less control over kernel memory that is executable, particularly with CONFIG_DEBUG_RODATA enabled. Similar features were already in existence, the earliest being Grsecurity’s UDEREF. This feature is enabled with config option CONFIG_CPU_SW_DOMAIN_PAN and was implemented by Russell King for ARMv7 and backported to Android’s 4.1 kernel by Kees Cook.

Improve protection against stack buffer overflows

Much like its predecessor, stack-protector, stack-protector-strong protects against stack buffer overflows, but additionally provides coverage for more array types, as the original only protected character arrays. Stack-protector-strong was implemented by Han Shan and added to the gcc 4.9 compiler.

Attack surface reduction

Attack surface reduction attempts to expose fewer entry points to the kernel without breaking legitimate functionality. Reducing attack surface can include removing code, removing access to entry points, or selectively exposing features.

Remove default access to debug features

The kernel’s perf system provides infrastructure for performance measurement and can be used for analyzing both the kernel and userspace applications. Perf is a valuable tool for developers, but adds unnecessary attack surface for the vast majority of Android users. In Android Nougat, access to perf will be blocked by default. Developers may still access perf by enabling developer settings and using adb to set a property: “adb shell setprop security.perf_harden 0”.

The patchset for blocking access to perf may be broken down into kernel and userspace sections. The kernel patch is by Ben Hutchings and is derived from Grsecurity’s CONFIG_GRKERNSEC_PERF_HARDEN by Brad Spengler. The userspace changes were contributed by Daniel Micay. Thanks to Wish Wu and others for responsibly disclosing security vulnerabilities in perf.

Restrict app access to ioctl commands

Much of Android security model is described and enforced by SELinux. The ioctl() syscall represented a major gap in the granularity of enforcement via SELinux. Ioctl command whitelisting with SELinux was added as a means to provide per-command control over the ioctl syscall by SELinux.

Most of the kernel vulnerabilities reported on Android occur in drivers and are reached using the ioctl syscall, for example CVE-2016-0820. Some ioctl commands are needed by third-party applications, however most are not and access can be restricted without breaking legitimate functionality. In Android Nougat, only a small whitelist of socket ioctl commands are available to applications. For select devices, applications’ access to GPU ioctls has been similarly restricted.

Require seccomp-bpf

Seccomp provides an additional sandboxing mechanism allowing a process to restrict the syscalls and syscall arguments available using a configurable filter. Restricting the availability of syscalls can dramatically cut down on the exposed attack surface of the kernel. Since seccomp was first introduced on Nexus devices in Lollipop, its availability across the Android ecosystem has steadily improved. With Android Nougat, seccomp support is a requirement for all devices. On Android Nougat we are using seccomp on the mediaextractor and mediacodec processes as part of the media hardening effort.

Ongoing efforts

There are other projects underway aimed at protecting the kernel:

  • The Kernel Self Protection Project is developing runtime and compiler defenses for the upstream kernel.
  • Further sandbox tightening and attack surface reduction with SELinux is ongoing in AOSP.
  • Minijail provides a convenient mechanism for applying many containment and sandboxing features offered by the kernel, including seccomp filters and namespaces.
  • Projects like kasan and kcov help fuzzers discover the root cause of crashes and to intelligently construct test cases that increase code coverage—ultimately resulting in a more efficient bug hunting process.

Due to these efforts and others, we expect the security of the kernel to continue improving. As always, we appreciate feedback on our work and welcome suggestions for how we can improve Android. Contact us at security@android.com.


News bewerten:
... mehr

Linux Kernel 4.6.5 Has Numerous Nouveau Improvements, ARM and ARM64 Fixes

IT-Security vom 27.07.2016 um 23:12 Uhr
Today, July 27, 2016, Greg Kroah-Hartman announced the availability of the fifth maintenance update for the Linux 4.6 kernel series, urging all users to update as soon as possible. The Linux 4.6 kernel branch is no longer the most advanced one, but it is still the most stable as the recently released Linux 4.7 kernel is currently on the mainline channel, and will move to become the stable series when the first point release is published. Therefore, Linux 4.6.5 appears to be the latest stable kernel version available right now for GNU/Linux operating systems, bringing changes for a total of 220 files, with 1754 insertions and 998 deletions. Among the improvements, we can notice lots of updated drivers, in particular for things like ATA, crypto, EDAC, External Connector Class (extcon), general-purpose input/output (GPIO), GPU (mostly Nouveau, but also AMDGPU, AMDKFD, Powerplay, Atmel HLCDC, Int...
News bewerten:
... mehr

Android App Caught Stealing User Photos and Videos

IT-Security vom 27.07.2016 um 23:05 Uhr
Google has removed an Android app from the Play Store after security researchers from Symantec noticed the app was secretly scanning and stealing personal photos and videos from user devices. The app's name is HTML Source Code Viewer and it was developed by a developer named Sunuba Gaming. At the time Google removed it, the app had between 1,000 and 5,000 installs. The app's name is self-explanatory, and it allowed users to view the source code of a Web page. Users only had to enter a URL, and the app retrieved that site's source code and printed it on the screen. According to Symantec, the app did a little more than that. They say that HTML Source Code Viewer contained code that scanned the local "/DCIM/Camera" and "/DCIM/100LGDSC/" folders, the standard location on Android devices for storing images and videos. The app then took all the data it foun...
News bewerten:
... mehr

It's Official: Apple Has Sold Over 1 Billion iPhone Devices

IT-Security vom 27.07.2016 um 23:05 Uhr
It's quite surprising to hear this, but it looks like Apple has sold over 1 billion iPhone devices since the introduction of the smartphone that changed our lives as we knew them. Last month, iPhone turned 9 years old, and we're pretty sure that we used almost all the iPhone versions that the Cupertino company released since June 29, 2007. The fact of the matter is that we can't even believe it took so long for Apple to sell its billionth unit, but it happened, sometime last week, according to Apple's CEO Tim Cook. "Last week we passed another major milestone when we sold the billionth iPhone," said Tim Cook, Apple CEO. "We never set out to make the most, but we've always set out to make the best products that make a difference. Thank you to everyone at Apple for helping change the world every day." iPhone sales are still going down The news comes just one day after Apple published a
News bewerten:
... mehr

White House Beefs Up Cyber Threat Response Action Plan

Nachrichten vom 27.07.2016 um 22:54 Uhr
A new White House directive outlines the U.S. cyber threat response strategy along with issuing a color-coded cyber threat schema.
News bewerten:
... mehr

Rio Olympics Will Be First Sporting Event Watched By 'Eye In The Sky' Drone Cameras

IT-Security vom 27.07.2016 um 22:40 Uhr
tedlistens quotes a report from Fast Company: When the Olympic Games begin next month in Rio de Janeiro, billions of people are expected to watch athletes from countries around the world compete. But also watching over the Olympic and Paralympic events will be a set of futuristic, balloon-mounted surveillance camera systems capable of monitoring a wide swath of the city in high resolution and in real-time. Initially developed for use by U.S. forces in Iraq and Afghanistan by Fairfax, Virginia-based Logos Technologies, the technology is sold under the name Simera, and offers live aerial views of a large area, or what the company calls 'wide-area motion imagery,' captured from a balloon tethered some 200 meters above the ground. The system's 13 cameras make it possible for operators to record detailed, 120-megapixel imagery of the movement of vehicles and pedestrians below in an area up to 40 square kilometers, depending on how high the balloon is deployed, and for up to three days at a time. The Rio Olympics marks the "first time [Simera] will be deployed by a non-U.S. government at a large-scale event," according to the company. Simera is being compared to a live city-wide Google Maps combined with TiVo, as it can let law enforcement view ground-level activities in real time in addition to letting them rewind through saved images. Doug Rombough, Logo's vice president of business development, says the image clarity is not good enough to make out individual faces or license plate numbers, though it is clear enough to follow individual people and vehicles around the city. "However, a higher resolution video camera attached to the same balloon, which captures images at 60 times that of full HD resolution, or 15 times 4K, at three frames per second, will allow operators to get a closer look at anything or anyone that looks suspicious," reports Fast Company.

Share on Google+

Read more of this story at Slashdot.


News bewerten:
... mehr

Windows 10 bekommt neue Variante "Pro Education"

Nachrichten vom 27.07.2016 um 22:23 Uhr
Windows 10, Windows Insider, 9879 Microsoft hat bekanntgegeben, dass man im Zuge der Veröffentlichung des Windows 10 Anniversary Updates auch eine neue Variante des Betriebssystems für den Bildungssektor einführen wird. Der neue Stock Keeping Unit (SKU) Windows 10 Pro Education bleibt ausschließlich Schulen und Universitäten vorenthalten. (Weiter lesen)
News bewerten:
... mehr

Windows 10 bekommt neue Variante "Pro Education"

Nachrichten vom 27.07.2016 um 22:23 Uhr
Windows 10, Windows Insider, 9879Microsoft hat bekanntgegeben, dass man im Zuge der Veröffentlichung des Windows 10 Anniversary Updates auch eine neue Variante des Betriebssystems für den Bildungssektor einführen wird. Der neue Stock Keeping Unit (SKU) Windows 10 Pro Education bleibt ausschließlich Schulen und Universitäten vorenthalten. (Weiter lesen)
News bewerten:
... mehr

Trump Comments Straddle Line of Soliciting Computer Crime

Nachrichten vom 27.07.2016 um 22:03 Uhr
Donald Trump may have left himself an out today when he urged Russian hackers to find 30,000 emails deleted by Hillary Clinton from her private server.
News bewerten:
... mehr

C Top Programming Language For 2016, Finds IEEE's Study

IT-Security vom 27.07.2016 um 22:00 Uhr
IEEE Spectrum, a highly regarded magazine edited by the Institute of Electrical and Electronics Engineers, has released its annual programming languages list, sharing with the world how several languages fared against each other. To assess the languages the publication says it worked with a data journalist and looked into 10 online sources -- including social chatter, open-source code production, and job postings. The publication has rated C as the top programming language this year, followed by Java, Python, C++, and R. From their article:After two years in second place, C has finally edged out Java for the top spot. Staying in the top five, Python has swapped places with C++ to take the No. 3 position, and C# has fallen out of the top five to be replaced with R. R is following its momentum from previous years, as part of a positive trend in general for modern big-data languages that Diakopoulos analyses in more detail here. Google and Apple are also making their presence felt, with Google's Go just beating out Apple's Swift for inclusion in the Top Ten. Still, Swift's rise is impressive, as it's jumped five positions to 11th place since last year, when it first entered the rankings. Several other languages also debuted last year, a marked difference from this year, with no new languages entering the rankings.The publication has explained in detail the different metrics it uses to evaluate a language.

Share on Google+

Read more of this story at Slashdot.


News bewerten:
... mehr

Play Store Familienmediathek: Android-Apps lassen sich ab sofort teilen

Nachrichten vom 27.07.2016 um 21:30 Uhr
Google, App, Apps, Play Store, Freigabe, Familienmediathek Im Google Play Store startet jetzt ein im Mai angekündigtes Feature, mit dem Familien ihre Play-Store-App-Einkäufe gemeinsam nutzen können. Die Familien-Accounts werden nun nach und nach in einem Dutzend Ländern ausgerollt, Deutschland ist beim Start gleich mit dabei. (Weiter lesen)
News bewerten:
... mehr

New York DA Wants Apple, Google To Roll Back Encryption

IT-Security vom 27.07.2016 um 21:20 Uhr
An anonymous reader writes: Manhattan District Attorney Cyrus Vance Jr. called on Apple and Google to weaken their device encryption, arguing that thousands of crimes remained unsolved because no one can crack into the perpetrators' phones. Vance, speaking at the International Conference on Cyber Security here, said that law enforcement officials did not need an encryption "backdoor," sidestepping a concern of computer-security experts and device makers alike. Instead, Vance said, he only wanted the encryption standards rolled back to the point where the companies themselves can decrypt devices, but police cannot. This situation existed until September 2014, when Apple pushed out iOS 8, which Apple itself cannot decrypt. "Tim Cook was absolutely right when he told his shareholders that the iPhone changed the world," Vance said. "It's changed my world. It's letting criminals conduct their business with the knowledge we can't listen to them."

Share on Google+

Read more of this story at Slashdot.


News bewerten:
... mehr

Here WeGo: Navigation bietet mehr Funktionen mit neuem Namen

Nachrichten vom 27.07.2016 um 21:19 Uhr

Unter dem Namen Here WeGo starten die Entwickler die Navigations-App Here Maps neu und erweitern gleichzeitig den Funktionsumfang. Insbesondere bei der Wahl des Fortbewegungsmittels stehen nun zusätzliche Optionen zur Auswahl. Zudem lassen sich die Kosten für die Route berechnen.


News bewerten:
... mehr

LastPass Bug Lets Hackers Steal All Your Passwords

Nachrichten vom 27.07.2016 um 21:03 Uhr
A critical zero-day flaw has been discovered in the popular cloud password manager LastPass that could allow any remote attacker to compromise your account completely. LastPass is a password manager that also available as a browser extension that automatically fills credentials for you. All you need is to remember one master password to unlock all other passwords of your different online

News bewerten:
... mehr

James Cameron: Theater Experience Key To Containing Piracy

IT-Security vom 27.07.2016 um 20:40 Uhr
Director James Cameron says that the key to containing movie piracy is preserving the theater experience as something special. He made the remarks when reporters asked him about his views on Sean Parker's upcoming streaming service Screening Room which will reportedly allow users to watch a new movie on the same day as its theatre release. From a TorrentFreak article: Cameron believes that having first-run movies in the home will stop people heading off to the cinema, the place where filmmakers can really showcase their art and take the fight to piracy. "The biggest hedge against piracy is still the sanctity of the viewing experience in a movie theater -- when it comes to movies," he says. "With The Walking Dead or something like that, that's not what you're selling, but if we're talking about movies and theatrical exhibition, keeping it great, making it a special experience, is still the biggest hedge against [piracy]." Interestingly, Cameron also says that even if piracy somehow became legal and download speeds were drastically improved, viewing content outside the theatrical setting would still come up short. "You're still watching [movies] on a small platform, and it's not that social experience," he explains.

Share on Google+

Read more of this story at Slashdot.


News bewerten:
... mehr

Bugtraq: CVE-2016-2783 - Avaya VOSS/VSP Release 4.1.0.0 Vulnerable to SPB Traffic traversal

Exploits vom 27.07.2016 um 20:21 Uhr
CVE-2016-2783 - Avaya VOSS/VSP Release 4.1.0.0 Vulnerable to SPB Traffic traversal
News bewerten:
... mehr

Cybercrime-Bericht 2015: Das BKA und der Kampf mit dem Darknet

Nachrichten vom 27.07.2016 um 20:18 Uhr

Infolge des Amoklaufs von München sorgte das sogenannte Darknet für mediales Aufsehen, weil der Täter dort seine Waffe gekauft haben soll. Heute hat nun das Bundeskriminalamt (BKA) das Bundeslagebild Cybercrime 2015 vorgestellt – und das Darknet spielte dabei eine prominente Rolle.


News bewerten:
... mehr

In 2016 Your Wireless Keyboard Security Still SUCKS – KeySniffer

Nachrichten vom 27.07.2016 um 20:16 Uhr
So you’d probably imagine that Wireless Keyboard Security is a 1998 problem and you shouldn’t even have to worry about that any more. And you’d be wrong – two-thirds of wireless keyboards, from MAJOR manufacturers are not even vaguely secure. It turns out, in 2016 when cryptography is mainstream, open-source and fairly easy to implement...

Read the full post at darknet.org.uk

News bewerten:
... mehr

Detecting When a Smartphone Has Been Compromised

Reverse Engineering vom 27.07.2016 um 20:09 Uhr
Andrew "bunnie" Huang and Edward Snowden have designed a smartphone case that detects unauthorized transmissions by the phone. Paper. Three news articles. Looks like a clever design. Of course, it has to be outside the device; otherwise, it could be compromised along with the device. Note that this is still in the research design stage; there are no public prototypes....
News bewerten:
... mehr

Twitter Gets Update with Night Mode Option

IT-Security vom 27.07.2016 um 20:04 Uhr
Twitter announced that it updated its Android application with a night mode options. Twitter has been testing the feature for quite some time now. Back in May, there was word that Twitter was testing the feature in an alpha version of the application. Now it seems that the night mode feature will be going live to all Twitter users who have the application installed on their Android smartphones. Twitter’s night mode allows users to switch to a dark background when browsing inside the application. The feature is very useful, especially since many users enjoy browsing through their phone during the night and don’t wish to turn on the lights that would surely be bothersome to the eyes. In addition, the mode shifts the white background to a deep navy tone and turns all the text white. The switch to a darker background in low-light conditions is better for t...
News bewerten:
... mehr

You Can't Turn Off Cortana In the Windows 10 Anniversary Update

IT-Security vom 27.07.2016 um 20:00 Uhr
Microsoft will release Windows 10 Anniversary Update next week. Earlier this week we listed some of its best features. PCWorld is now reporting about a major change that may annoy some users: once you've installed the update, Cortana can no longer be disabled. From the article: Cortana, the personal digital assistant that replaced Windows 10's search function and taps into Bing's servers to answer your queries with contextual awareness, no longer has an off switch. The impact on you at home: Similar to how Microsoft blocked Google compatibility with Cortana, the company is now cutting off the plain vanilla search option. That actually makes a certain of amount of sense. Unless you turned off all the various cloud-connected bits of Windows 10, there's not a ton of difference between Cortana and the operating system's basic search capabilities.

Share on Google+

Read more of this story at Slashdot.


News bewerten:
... mehr

LastPass hat altes Sicherheitsproblem, betroffen sind Firefox-Nutzer

Nachrichten vom 27.07.2016 um 19:50 Uhr
passwort, Passwortverwaltung, passwortmanager, lastpass Der beliebte Passwortmanager LastPass kämpft einem Bericht zufolge mit einem neuen/alten Sicherheitsproblem. Dabei soll es Betrügern möglich sein, über speziell manipulierte Webseiten das Browser-Plugin von LastPass zu kompromittieren und anschließend die Daten der Nutzer auszuspähen. (Weiter lesen)
News bewerten:
... mehr

Google Officially Releases Family Library to the Play Store

IT-Security vom 27.07.2016 um 19:46 Uhr
Back in May during Google I/O, the company announced that it was working on a platform that it would allow users to share apps with up to six members of their family. Over the past few months, information on the Google Play Family Library kept popping up and now it seems that Google has finally released Family Library. Google Play Family Library is official now, users will be able to share applications with up to six members of their family. The feature helps users share purchases on Google Play, as all six family members share an account on the Play Store. Google Play Family Library allows users to share apps, games, movies, TV shows or books purchased in the Play Store. The applications can be shared across devices, as n...
News bewerten:
... mehr

Secure Eraser Standard Edition - Daten sicher löschen

Downloads vom 27.07.2016 um 19:37 Uhr
Datenschutz, Festplatten, Löschen, Secure Eraser In manchen Fällen ist die Löschfunktion von Windows nicht ausreichend, beispielsweise dann, wenn man eine Festplatte weiterverkaufen möchte: Sensible Daten können von Unbefugten wiederhergestellt werden, wenn ... (Weiter lesen)
News bewerten:
... mehr

Ransomware: SentinelOne bietet erste Cyber-Versicherung

Nachrichten vom 27.07.2016 um 19:32 Uhr
SentinelOne ist der erste Anbieter, der für Unternehmen eine Versicherung gegen Ransomware bereithält. Der Sicherheitsanbieter bezahlt bis zu 1000 Dollar pro Arbeitsplatz, wenn es Hackern gelingt, die Dateien eines Nutzers zu verschlüsseln. Voraussetzung ist allerdings, dass der Anwender die Sicherheitslösung von SentinelOne benutzt.
News bewerten:
... mehr

PC- & Notebook-Hersteller mögen USB Type-C nicht so recht

Nachrichten vom 27.07.2016 um 19:28 Uhr
Usb, USB Type-C, USB 3.1, USB 3 Während USB Type-C-Anschlüsse mit ihrer großen Vielseitigkeit und den reversibel einsetzbaren Steckern deutliche Verbesserungen mit sich bringen, lassen sich die Hersteller von PCs und Notebooks nicht so recht für den neuen Standard begeistern - aus Kostengründen. (Weiter lesen)
News bewerten:
... mehr

Olympics Committee Says Non-Sponsors Are Banned From Tweeting About the Olympics

IT-Security vom 27.07.2016 um 19:20 Uhr
An anonymous reader shares a Gizmodo report:The U.S. Olympics Committee has gone off the deep end, when it comes to intellectual property. It's willing to sue anyone to protect their trademarks, even when the use is no real threat. But the committee's latest claim is an entirely new level of absurdity. What's getting the U.S. Olympics Committee in a tizzy this time? Tweets. Specifically any company that tweets about the Olympic Games and isn't a sponsor. ESPN obtained a letter from the U.S. Olympic Committee chief marketing officer Lisa Baird who outlines the absurd demands. "Commercial entities may not post about the Trials or Games on their corporate social media accounts," Baird writes, apparently in earnest. "This restriction includes the use of USOC's trademarks in hashtags such as #Rio2016 or #TeamUSA. And according to ESPN, it gets even more absurd. Apparently the letter says that any company whose primary mission isn't media is forbidden from using any pictures taken at the Olympics, sharing, and even reposting anything from the official Olympics account.

Share on Google+

Read more of this story at Slashdot.


News bewerten:
... mehr

Google Releases Tips and Tricks Web Page for Android Users

IT-Security vom 27.07.2016 um 19:13 Uhr
The competition between mobile operating systems by Apple and Google continues on, as it’s difficult to determine which OS is more popular or which has the better functionality. While iOS definitely comes with some essential advantages, Android is more flexible and allows a plethora of tweaks. Android enjoys increased popularity among multiple smartphone manufacturers, while iOS is only found on Apple products. However, Apple does have a large and strong customer base, just enough to split smartphone users into two main categories, those who use iPhones and those who have Android phones. Many users migrate from Android to iOS and viceversa, a process that can be quite confusing to some, considering that the two operating systems do have some main differences, at least when it comes to the UI. Apple welcomes new us...
News bewerten:
... mehr

Windows: So erstellt man White- und Blacklists für Anwendungen

Nachrichten vom 27.07.2016 um 19:08 Uhr
Windows, SemperVideo, Registry, Blacklist, Whitelist Was unter anderem verschiedene Jugendschutz-Anwendungen unter Windows tun, können Nutzer auch manuell einrichten: Eine Whitelist für Anwendungen. Das führt dann dazu, dass sich nur noch die freigegebenen Programmdateien starten lassen. Bei allen anderen Applikationen gibt Windows dann lediglich eine Fehlermeldung aus, die den Nutzer darüber informiert, dass er hier nicht weiterkommt. (Weiter lesen)
News bewerten:
... mehr

Is Deer.io a Cyber-Crime Heaven?

IT-Security vom 27.07.2016 um 19:05 Uhr
Cyber-security firm Digital Shadows has published today an in-depth report that blames Deer.io, a site building platform from Russia, of harboring the online shops of many cyber-criminals. The company says that they have found many shops selling illegal goods, all hosted via its platform. Deer.io hosts shops for all sorts of cyber-criminal activities The most notorious name of all customers is Tessa88, one of the hackers at the middle of the recent MySpace and LinkedIn data breaches. Besides Tessa88's shop, Digital Shadows says that crooks used Deer.io shops to sell social media bots for spam and boosting follower counts, compromised social media accounts, and stolen accounts, a category which includes anything from banking and financial services to Uber credentials. Digital Shadows claims that Deer.io is only on...
News bewerten:
... mehr

NIST Recommends SMS Two-Factor Authentication Deprecation

Nachrichten vom 27.07.2016 um 18:57 Uhr
The U.S. National Institute for Standards and Technology (NIST) said SMS-based two factor authentication would soon be deprecated.
News bewerten:
... mehr

LG Display steckt weitere $ 1,75 Mrd. in Produktion flexibler OLED

Nachrichten vom 27.07.2016 um 18:47 Uhr
Apple, Iphone, iPhone 5, ipad pro, iPad Pro 9.7 Nach den zahlreichen Gerüchten über ein iPhone mit einem flexiblen OLED anstelle des aktuellen IPS-LCD bestätigt jetzt der Zulieferer LG Display den massiven Ausbau der Fertigung für kleine, flexible Displays. LG unterstreicht dabei, man habe bisher einfach zu wenig in Entwicklung und Produktion von flexiblen OLED für Smartphones gesteckt und werde das nun ändern. (Weiter lesen)
News bewerten:
... mehr

Trump Calls For Russia To Cyber-Invade the United States To Find Clinton's 'Missing' Emails

IT-Security vom 27.07.2016 um 18:40 Uhr
Republican presidential nominee Donald Trump publicly called on the Russian hackers allegedly responsible for the recent leak of DNC emails to launch another cyber-attack on the United States, this time to hack emails from Hillary Clinton's tenure as secretary of State, according to reporters who attended the press conference Wednesday. (Alternate source: NYTimes, Quartz, and MotherJones) "Russia, if you're listening, I hope you're able to find the 30,000 emails that are missing," Trump said. "I think you will probably be rewarded mightily by our press." Clinton came under investigation for her use of a personal email address while serving as secretary of state. After turning over to the FBI all correspondence about government business during her years in the State Department, Clinton revealed at a press conference last year that she had deleted about half of her emails that pertained to personal matters, like her daughter's wedding. Attorney General Loretta Lynch ultimately decided not to pursue criminal charges against Clinton. Update: Here's a video of Trump saying that.

Share on Google+

Read more of this story at Slashdot.


News bewerten:
... mehr

Android Developer Story: Culture Alley reaches millions of English learners on Google Play

Android Tipps vom 27.07.2016 um 18:38 Uhr
Posted by Lily Sheringham, Google Play team

Culture Alley developed the app Hello English to help Indians learn English through gamification, supporting over 15 dialects. More than 13 million people now use Hello English in India and around the world.

Hear Nishant Patni, Founder & CEO and Pranshu Bhandari, Co-Founder, explain how they optimized the app to address challenges faced by emerging markets. Learn how they used various Google Play tools to address varying levels of connectivity and device capabilities, and improve user retention.

Learn more best practices about building for billions and watch the ‘10 tips to build an app for billions of users’ video to get more tips. Also, get the Playbook for Developers app and stay up-to-date with more features and best practices that will help you grow a successful business on Google Play.


News bewerten:
... mehr

Black Hat: Angriffsmethode umgeht HTTPS und legt URLs offen

Nachrichten vom 27.07.2016 um 18:29 Uhr
Sicherheitsforscher demonstrieren auf der Hackerkonferenz, wie Angreifer durch HTTPS geschützte URLs im Klartext einsehen können. Sie setzen eine bösartige PAC-Datei ein und nutzen das WPAD-Protokoll. Das betrifft nicht nur die Privatsphäre der Nutzer, sondern erlaubt auch den Diebstahl von Anmeldedaten und Sessions.
News bewerten:
... mehr
Weitere Seiten anzeigen
Seite 1 / 1128 Seiten
Artikel in Kategorie: 56.363x
Zurück [2] [3] [4] [5] [6] [7] Vor