TSecurity News Portal
 
  1. Startseite

ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese
Anzeige

Webseiten News

News vom: 16.08.2018 um 19:03 Uhr

TSecurity RSS Feeds wieder repariert...

Weitere News Beiträge ansehen: Webseiten News (30)

Startseite und alle Kategorien


Suchen

Linux encryption app Cryptkeeper has universal password: 'p'

IT Security Nachrichten vom 31.01.2017 um 04:35 Uhr | Quelle go.theregister.com

And that should be the end of that, shouldn't it?

Popular Linux encryption app Cryptkeeper contains a single-letter universal decryption password: 'p'.…


Weiterlesen Artikel ansehen

Razer Buys Mobile Company Nextbit, Makers of Innovative Robin Smartphone

IT Security Nachrichten vom 31.01.2017 um 04:34 Uhr | Quelle news.softpedia.com
Nextbit, the company that successfully Kickstarted the innovative Robin smartphone back in 2015, has just announced that it will be joining the Razer family. The announcement took everyone by surprise since Razer isn't known for its smartphone aspirations. The good news for Nextbit's fans is that the company will now have more resources to spend on their next project, whatever that might be. Concerning their only product, the cloud-oriented Robin, Nextbit assured customers that it will continue to provide support for the smartphone. The Robin is not available for purchase anymore, and neither the accessories that go along with the smartphone. However, Nextbit announced that it will continue to offer ...

Weiterlesen Artikel ansehen

Itech News Portal Script 6.28 SQL Injection

PoC vom 31.01.2017 um 04:33 Uhr | Quelle packetstormsecurity.com
Itech News Portal Script version 6.28 suffers from a remote SQL injection vulnerability.

Weiterlesen Artikel ansehen

Woman Built House From the Ground Up Using Nothing But YouTube Tutorials

IT Security Nachrichten vom 31.01.2017 um 04:30 Uhr | Quelle news.slashdot.org
schwit1 quotes a report from Digital Trends: In this generation of self-starters and self-made women and men, do-it-yourself isn't just an option, it's a way of life. And if there's not an app for that, chances are there's a YouTube video for it. That was certainly the case for a woman named Cara Brookins, who is living proof that if you're willing to learn, you absolutely can. In 2008, Brookins was in the midst of a family struggle, having left a husband she called "violent and abusive." Looking to make a fresh start for herself, she took the idea of rebuilding quite literally, perhaps using the physical experience of constructing a house as an extension of her emotional and mental journey. Though she had no previous experience in construction or architecture, Brookins found a series of YouTube tutorials on building a home and got to work. Over the course of nine months, Brookins worked tirelessly with the help of her four children to build a new home for themselves. "I had rented this cabin for a Thanksgiving getaway," the mother of four told CBS News. "And driving there, we passed this house that had been ravaged by a tornado. It was this beautiful dream house and it was sort of wide open. You don't often get the opportunity to see the interior workings of a house, but looking at these 2x4s and these nails, it just looked so simple. I thought, "I could put this wall back up if I really tried. Maybe I should just start from scratch.'"

Read more of this story at Slashdot.


Weiterlesen Artikel ansehen

Android 7.1.2 Nougat Beta Rolls Out to Pixel and Nexus Devices

IT Security Nachrichten vom 31.01.2017 um 03:59 Uhr | Quelle news.softpedia.com
Google has just announced a brand new Android update that further closes the gap between Nougat and the next version of the operating system. Android 7.1.2 Nougat is an incremental update that focuses on refinements, so don't expect any new features for the time being. The Mountain View company also stated that the final version of Android 7.1.2 Nougat will be released in the coming months, but the first beta version is going out today. Taking a look at the devices listed as being compatible with the new Android 7.1.2 Nougat, one phone and one tablet seem to have been skipped and will not be getting the update at all: Nexus 6 and Nexus 9. The good news is while these Nexus devices will remain on Android 7.1.1 Nougat and will not receive any major OS updates, they will still get Google's security patches that are releas...

Weiterlesen Artikel ansehen

LinuxCon, CloudOpen, and ContainerCon Come to China for the First Time in 2017

IT Security Nachrichten vom 31.01.2017 um 03:37 Uhr | Quelle news.softpedia.com
The Linux Foundation, a non-profit organization promoting the adoption of the latest Linux and Open Source technologies to the enterprise industry, is announcing the upcoming schedule for LinuxCon, CloudOpen, and ContainerCon conferences. Taking in place for the first time in China, between June 19-20, 2017, the LinuxCon, ContainerCon and CloudOpen events will be held at the China National Convention Center in Beijing, where it is expected that thousands of attendees will share their knowledge, collaborate on new technologies, and learn about the latest Open Source and GNU/Linux technologies, including cloud, containers, microservices, and networking. LinuxCon China 2017 will be the most important event of the year for the Chinese community, where developers, project leaders, and lead maintainers from all over the world will gather together to collaborate and further advanc...

Weiterlesen Artikel ansehen

PHP Product Designer Script Arbitrary File Upload

PoC vom 31.01.2017 um 03:22 Uhr | Quelle packetstormsecurity.com
PHP Product Designer Script suffers from a remote file upload vulnerability.

Weiterlesen Artikel ansehen

Trump's Next Immigration Move To Affect H-1B Visas; Require Tech Companies To Try To Hire Americans First: Bloomberg

IT Security Nachrichten vom 31.01.2017 um 03:05 Uhr | Quelle yro.slashdot.org
AdamnSelene writes: A report in Bloomberg describes a draft executive order that will hit the tech industry hard and potentially change the way those companies recruit workers from abroad. The H-1B, L-1, E-2, and B1 work visa programs would be targeted by requiring companies to prioritize higher-paid immigrant workers over lower-paid workers. In addition, the order will impose statistical reporting requirements on tech companies who sponsor workers under these programs. The order is expected to impact STEM workers from India the most. Penguinisto adds: If (perhaps when) the president follows through, his next move could limit or at least seriously alter the way H-1B visas are distributed, putting U.S. citizens at a higher priority, and possibly restricting H1-B visas tighter. From the article: "If implemented, the reforms could shift the way American companies like Microsoft, Amazon and Apple recruit talent and force wholesale changes at Indian companies such as Infosys and Wipro. Businesses would have to try to hire Americans first and if they recruit foreign workers, priority would be given to the most highly paid. "Our country's immigration policies should be designed and implemented to serve, first and foremost, the U.S. national interest," the draft proposal reads, according to a copy reviewed by Bloomberg. "Visa programs for foreign workers should be administered in a manner that protects the civil rights of American workers and current lawful residents, and that prioritizes the protection of American workers -- our forgotten working people -- and the jobs they hold."

Read more of this story at Slashdot.


Weiterlesen Artikel ansehen

WTF is your problem, Netgear? Another hijack hole found in its routers

IT Security Nachrichten vom 31.01.2017 um 03:03 Uhr | Quelle go.theregister.com

Programming blunders allow miscreants to snatch home gateways' admin passwords

Researchers are warning of a serious security hole that can be exploited to hijack potentially hundreds of thousands of Netgear routers.…


Weiterlesen Artikel ansehen

Half the Web Is Now Encrypted. That Makes Everyone Safer

Nachrichten vom 31.01.2017 um 02:54 Uhr | Quelle wired.com
Half the Web Is Now Encrypted. That Makes Everyone Safer
Computer security news is usually pretty dismal. But today the web got safer in a very important way. The post Half the Web Is Now Encrypted. That Makes Everyone Safer appeared first on WIRED.

Weiterlesen Artikel ansehen

Razer Buys Nextbit

IT Security Nachrichten vom 31.01.2017 um 02:45 Uhr | Quelle hardware.slashdot.org
BrianFagioli quotes a report from BetaNews: Today, startup Nextbit announced that it has been acquired by PC accessory maker Razer. True, it seems like an odd acquisition, but not any stranger than Razer buying THX. With that said, getting into the smartphone game seems like a very risky business, as more established companies -- such as HTC -- are struggling lately. Has Razer made a mistake? "I'm thrilled to announce that we're joining the Razer family! They're rebels like us, they speak from the heart, and they share our need to push boundaries. Nextbit will operate as an independent division inside Razer, focused on unique mobile design and experiences. To put it simply, we'll be doing exactly what we've been doing all along, only bigger and better," says Tom Moss, Co-Founder and CEO, Nextbit. Nexbit turned a lot of heads a couple of years ago when it released the Robin, "the first Android phone that makes running out of space history." The device's onboard storage is merged with the accompanied cloud storage, allowing Robin to seamlessly back up your apps and photos, archive the stuff you're not using and restore items when you need them. Unfortunately, you will no longer be able to purchase the Robin from Nextbit as the company has stopped selling the device and all accessories. Though, they "will continue to fulfill warranties for 6 more months" and "will continue to provide software updates and security patches through February 2018."

Read more of this story at Slashdot.


Weiterlesen Artikel ansehen

Hacking Printers Advisory 2

PoC vom 31.01.2017 um 02:26 Uhr | Quelle packetstormsecurity.com
This post is about accessing a printers file system through ordinary PostScript or PJL based print jobs -- since decades a documented feature of both languages. The attack can be performed by anyone who can print, for example through USB or network. It can even be carried out by a malicious website, using advanced cross site printing techniques in combination with a novel technique we call CORS spoofing.

Weiterlesen Artikel ansehen

LG's UltraFine 5K Display Becomes Useless When It's Within Two Meters of a Router

IT Security Nachrichten vom 31.01.2017 um 02:25 Uhr | Quelle tech.slashdot.org
The LG UltraFine 5K Display was designed in part by Apple to work with the New MacBook Pro and as a replacement for the Thunderbolt Display, which was discontinued late last year. According to 9to5Mac, the display apparently wasn't designed to work next to routers as it will flicker, disconnect, or freeze computers when it's within two meters of a router due to electromagnetic interference. The Verge reports: In emails to 9to5Mac, LG acknowledged the problem -- which LG says isn't an issue for any of its other monitors -- noting that routers "may affect the performance of the monitor" and that users should "have the router placed at least two meters away from the monitor" to avoid issues. Once the monitor was moved into a different room away from the router, 9to5Mac says the issues subsided. Despite the fact that it's insane to require a router to be far away from what is likely the main computer in your home, there's been no indication that LG is working on a fix for the issue, which may be more troublesome.

Read more of this story at Slashdot.


Weiterlesen Artikel ansehen

Hacking Printers Advisory 1

PoC vom 31.01.2017 um 02:24 Uhr | Quelle packetstormsecurity.com
This post is about manipulating and obtaining documents printed by other users, which can be accomplished by infecting the printer with PostScript malware.

Weiterlesen Artikel ansehen

Nachgehakt: Nabu sieht viele Ursachen

Nachrichten vom 31.01.2017 um 02:12 Uhr | Quelle google.com
Pößneck. "Warum kommen zur Zeit keine Vögel in meinen Garten, obwohl ich Futter zur Verfügung stelle?", fragt sich ein Leser, der unsere Berichterstattung über die Stunde der Wintervögel der Naturschutzbundes (Nabu) verfolgt hatte, und meldete sich bei ...

Weiterlesen Artikel ansehen

PHP Logo Designer Script Arbitrary File Upload

PoC vom 31.01.2017 um 02:11 Uhr | Quelle packetstormsecurity.com
PHP Logo Designer Script suffers from a remote file upload vulnerability.

Weiterlesen Artikel ansehen

OPSI Managed Client Remote Command Execution

PoC vom 31.01.2017 um 02:03 Uhr | Quelle packetstormsecurity.com
A remote attacker with knowledge of a single machine name and the corresponding OPSI machine key is able to execute arbitrary commands on any OPSI Managed client in the same managed environment by using the Remote Procedure Call (RPC) Interface of the OPSI-Server. The attacker is able to use the SYSTEM privileges of the OPSI Agent on any managed client computer and execute arbitrary commands leading to an elevation of privileges. Affected includes OPSI Server version 4.0.7.26 and OPSI ClientAgent version 4.0.7.10-1.

Weiterlesen Artikel ansehen

Firefox 52 to Allow Us to Send & Open Tabs From One Device to Another with Sync

IT Security Nachrichten vom 31.01.2017 um 02:02 Uhr | Quelle news.softpedia.com
Many of us are already enjoying all the goodies implemented by Mozilla in the latest Firefox 51.0 update of the popular open-source web browser for Linux, Windows, and Mac, but the company is now working on the next major release. Firefox 52 is already in the Beta channel for early adopters, web developers, and everyone else who wants to discover its new features. According to Mozilla's rapid release calendar for the Firefox web browser, it would appear that Firefox 52 will be the next ESR (Extended Support Release). As for the new features, at least those that have been already revealed by Mozilla in the preliminary release notes, it looks like Firefox 52 will update the Firefox Sync technology to allow us to send and open tabs from one device to another,...

Weiterlesen Artikel ansehen

TrueConf Server 4.3.7 Cross Site Scripting / Open Redirect / CSRF

PoC vom 31.01.2017 um 01:59 Uhr | Quelle packetstormsecurity.com
TrueConf Server versions 4.3.7.12255 and 4.3.7.12219 suffer from cross site request forgery, cross site scripting, and open redirection vulnerabilities.

Weiterlesen Artikel ansehen

Sophos Web Appliance 4.2.1.3 Remote Command Injection

PoC vom 31.01.2017 um 01:57 Uhr | Quelle packetstormsecurity.com
Sophos Web Appliance version 4.2.1.3 is vulnerable to two remote command injection vulnerabilities.

Weiterlesen Artikel ansehen

WordPress User Access Manager 1.2.6.7 Cross Site Scripting

PoC vom 31.01.2017 um 01:53 Uhr | Quelle packetstormsecurity.com
WordPress User Access Manager plugin version 1.2.6.7 suffer from a cross site scripting vulnerability.

Weiterlesen Artikel ansehen

OpenSSL 1.1.0 Remote Client Denial Of Service

PoC vom 31.01.2017 um 01:45 Uhr | Quelle packetstormsecurity.com
OpenSSL version 1.1.0 remote client denial of service proof of concept exploit.

Weiterlesen Artikel ansehen

Scientists Find 'Oldest Human Ancestor' -- A Big-Mouthed Sea Creature With No Anus

IT Security Nachrichten vom 31.01.2017 um 01:45 Uhr | Quelle science.slashdot.org
An anonymous reader quotes a report from BBC: Researchers have discovered the earliest known ancestor of humans -- along with a vast range of other species. They say that fossilized traces of the 540-million-year-old creature are "exquisitely well preserved." The microscopic sea animal is the earliest known step on the evolutionary path that led to fish and -- eventually -- to humans. Details of the discovery from central China appear in Nature journal. The research team says that Saccorhytus is the most primitive example of a category of animals called "deuterostomes" which are common ancestors of a broad range of species, including vertebrates (backboned animals). Saccorhytus was about a millimeter in size, and is thought to have lived between grains of sand on the sea bed. The researchers were unable to find any evidence that the animal had an anus, which suggests that it consumed food and excreted from the same orifice. The study was carried out by an international team of researchers, from the UK, China and Germany. Among them was Prof Simon Conway Morris, from the University of Cambridge. The study suggests that its body was symmetrical, which is a characteristic inherited by many of its evolutionary descendants, including humans. Saccorhytus was also covered with a thin, relatively flexible skin and muscles, leading the researchers to conclude that it moved by contracting its muscles and got around by wriggling. The researchers say that its most striking feature is its large mouth, relative to the rest of its body. They say that it probably ate by engulfing food particles, or even other creatures. Also interesting are the conical structures on its body. These, the scientists suggest, might have allowed the water that it swallowed to escape and so might have been a very early version of gills.

Read more of this story at Slashdot.


Weiterlesen Artikel ansehen

Palo Alto Networks Terminal Services Agent 7.0.3-13 Integer Overflow

PoC vom 31.01.2017 um 01:43 Uhr | Quelle packetstormsecurity.com
Palo Alto Networks Terminal Services Agent version 7.0.3-13 suffers from an integer overflow vulnerability.

Weiterlesen Artikel ansehen

Tech Had to Lash Out Against Trump’s Ban. It’s Personal

Nachrichten vom 31.01.2017 um 01:42 Uhr | Quelle wired.com
Tech Had to Lash Out Against Trump’s Ban. It’s Personal
Among industries, tech spoke out more loudly than all the rest this weekend. That's because Trump's ban went to the heart of how their businesses work. The post Tech Had to Lash Out Against Trump's Ban. It's Personal appeared first on WIRED.

Weiterlesen Artikel ansehen

Caregiver Script 2.57 SQL Injection

PoC vom 31.01.2017 um 01:40 Uhr | Quelle packetstormsecurity.com
Caregiver Script version 2.57 suffers from a remote SQL injection vulnerability.

Weiterlesen Artikel ansehen

Auction Script 6.49 SQL Injection

PoC vom 31.01.2017 um 01:39 Uhr | Quelle packetstormsecurity.com
Auction Script version 6.49 suffers from a remote SQL injection vulnerability.

Weiterlesen Artikel ansehen

Itech B2B Script 4.28 SQL Injection

PoC vom 31.01.2017 um 01:38 Uhr | Quelle packetstormsecurity.com
Itech B2B Script version 4.28 suffers from a remote SQL injection vulnerability.

Weiterlesen Artikel ansehen

Itech Classifieds Script 7.27 SQL Injection

PoC vom 31.01.2017 um 01:36 Uhr | Quelle packetstormsecurity.com
Itech Classifieds Script version 7.27 suffers from a remote SQL injection vulnerability.

Weiterlesen Artikel ansehen

http://www.ufpe.br/caa/adrix.gif

Hacking vom 31.01.2017 um 01:24 Uhr | Quelle zone-h.org
http://www.ufpe.br/caa/adrix.gif notified by aDriv4

Weiterlesen Artikel ansehen

With net neutrality pretty much dead in the US, your privacy is next

IT Security Nachrichten vom 31.01.2017 um 01:23 Uhr | Quelle go.theregister.com

American ISP giants' stooges urge watchdog to tear down safeguards on customer data

Full of confidence in Ajit Pai – the new boss at the FCC, America's communications watchdog – groups representing US telcos are seeking a repeal of the regulator's privacy rules.…


Weiterlesen Artikel ansehen

The Machinery Is in Place to Make Trump Protests Permanent

Nachrichten vom 31.01.2017 um 01:12 Uhr | Quelle wired.com
The Machinery Is in Place to Make Trump Protests Permanent
Thanks to social media, pop-up protests could become as much a fixture of the new administration as President Trump's tweets. The post The Machinery Is in Place to Make Trump Protests Permanent appeared first on WIRED.

Weiterlesen Artikel ansehen

Google Quietly Makes 'Optional' Web DRM Mandatory In Chrome

IT Security Nachrichten vom 31.01.2017 um 01:05 Uhr | Quelle yro.slashdot.org
JustAnotherOldGuy quotes a report from Boing Boing: The World Wide Web Consortium's Encrypted Media Extensions (EME) is a DRM system for web video, being pushed by Netflix, movie studios, and a few broadcasters. It's been hugely controversial within the W3C and outside of it, but one argument that DRM defenders have made throughout the debate is that the DRM is optional, and if you don't like it, you don't have to use it. That's not true any more. Some time in the past few days, Google quietly updated Chrome (and derivative browsers like Chromium) so that Widevine (Google's version of EME) can no longer be disabled; it comes switched on and installed in every Chrome instance. Because of laws like section 1201 of the U.S. Digital Millennium Copyright Act (and Canada's Bill C11, and EU implementations of Article 6 of the EUCD), browsers that have DRM in them are risky for security researchers to audit. These laws provide both criminal and civil penalties for those who tamper with DRM, even for legal, legitimate purposes, and courts and companies have interpreted this to mean that companies can punish security researchers who reveal defects in their products. Further reading: Boing Boing and Hacker News.

Read more of this story at Slashdot.


Weiterlesen Artikel ansehen

Update: zipdump.py Version 0.0.5

IT Security Nachrichten vom 31.01.2017 um 01:00 Uhr | Quelle blog.didierstevens.com
A small feature in this new version: start the -E option value with # to count and group. Example: C:\Demo>zipdump.py -E “#%HEADASCII%;%HEADHEX%” Book1.xlsm 1: –…………..;d0cf11e0a1b11ae10000000000000000 1: <xml xmlns:v=”ur;3c786d6c20786d6c6e733a763d227572 12: <?xml version=”1;3c3f786d6c2076657273696f6e3d2231 zipdump_v0_0_5.zip (https) MD5: 5F49895D3EA97A870ECB1E262A738A04 SHA256: E16CE5A426840D2804E5EF544CF334715F501D0892496D02B6C5000B18CE10BA

Weiterlesen Artikel ansehen

Vuln: Microsoft Office CVE-2016-7262 Remote Code Execution Vulnerability

Exploits vom 31.01.2017 um 01:00 Uhr | Quelle securityfocus.com
Microsoft Office CVE-2016-7262 Remote Code Execution Vulnerability

Weiterlesen Artikel ansehen

Seitennavigation

Seite 6788 von 10.264 Seiten (Bei Beitrag 237545 - 237580)
359.238x Beiträge in dieser Kategorie

Auf Seite 6787 zurück | Nächste 6789 Seite | Letzte Seite
[ 6783 ] [ 6784 ] [ 6785 ] [ 6786 ] [ 6787 ] [6788] [ 6789 ] [ 6790 ] [ 6791 ] [ 6792 ] [ 6793 ] [ 6794 ] [ 6795 ] [ 6796 ] [ 6797 ] [ 6798 ]

Folge uns auf Twitter um einen Echtzeit-Stream zu erhalten. Updates alle 5 Minuten!

Die Webseite benutzt einen Cache von 10-15 Minuten