1. Startseite

EnglishFrenchGermanItalianPortugueseRussianSpanish

Webseiten News

News vom: 13.04.2017 um 19:24 Uhr

Hallo,

es gab die letzten 2 Tage viele Verbindungsabbrüche und 502,503,504 Fehler in euren Browsern aufgrund eines Serverproblems.

Jetzt läuft alles wie gewohnt weiter :-)


Weitere News Beiträge ansehen: Webseiten News (15)

Startseite und alle Kategorien


Suchen

Wer Edge nicht nutzt, kann den Browser deinstallieren

Windows Tipps vom 26.04.2017 um 00:00 Uhr | Quelle pcwelt.de
Der Internet-Browser Microsoft Edge ist bei Windows 10 automatisch mit installiert. Eine Deinstallation ist nicht vorgesehen. Wer den Browser trotzdem entfernen möchte findet hier eine Lösung dafür.

Weiterlesen Artikel komplett ansehen

Auto Lender Exposes Loan Data For Up To 1 Million Applicants

IT Security Nachrichten vom 26.04.2017 um 00:00 Uhr | Quelle threatpost.com
A trove of consumer auto loan data—some 1 million records—has been locked down after a researcher found an exposed and accessible database online.

Weiterlesen Artikel komplett ansehen

Facebook Shows Related Articles and Fact Checkers Before You Open Links

IT Security Nachrichten vom 26.04.2017 um 00:00 Uhr | Quelle news.slashdot.org
An anonymous reader quotes a report from TechCrunch: Facebook wants you to think about whether a headline is true and see other perspectives on the topic before you even read the article. In its next step against fake news, Facebook today begins testing a different version of its Related Articles widget that normally appears when you return to the News Feed after opening a link. Now Facebook will also show Related Articles including third-party fact checkers before you read an article about a topic that many people are discussing. If you saw a link saying "Chocolate cures cancer!" from a little-known blog, the Related Article box might appear before you click to show links from the New York Times or a medical journal noting that while chocolate has antioxidants that can lower your risk for cancer, it's not a cure. If an outside fact checker like Snopes had debunked the original post, that could appear in Related Articles too. Facebook says this is just a test, so it won't necessarily roll out to everyone unless it proves useful. It notes that Facebook Pages should not see a significant change in the reach of their News Feed posts. There will be no ads surfaced in Related Articles.

Read more of this story at Slashdot.


Weiterlesen Artikel komplett ansehen

Zunehmende Cyberbedrohung für Automatisierungssysteme

IT Security Nachrichten vom 26.04.2017 um 00:00 Uhr | Quelle security-insider.de
„Zwei von fünf industriell genutzten Computern waren im zweiten Halbjahr 2016 Cyberattacken ausgesetzt. Auch stieg der Anteil attackierter Rechner von 17 Prozent im Juli 2016 auf 24 Prozent im Dezember 2016 an.“

Weiterlesen Artikel komplett ansehen

Windows 10 Redstone 3-Konzept: So (gut) könnte die UI aussehen

IT Security Nachrichten vom 26.04.2017 um 00:00 Uhr | Quelle winfuture.de
Microsoft, Betriebssystem, Windows, Windows 10, Design, Interface, Oberfläche, Ui, Benutzeroberfläche, Konzept, User Interface, Redstone 3, Windows 10 Redstone 3, Project NEON, Windows Redstone 3, CSHELL Für das nächste Update mit dem Codenamen Redstone 3 soll Microsoft an einer so genannten "Composable Shell" arbeiten. Das ist ein universelles Framework, das die Skalierung der Benutzeroberfläche über alle unterstützten Geräte vereinheitlichen soll. Wie ein "fließender" Übergang der UI aussehen könnte, hat nun ein Nutzer nachgebaut. (Weiter lesen)

Weiterlesen Artikel komplett ansehen

Five Years Later, Legal Megaupload Data Is Still Trapped On Dead Servers

IT Security Nachrichten vom 26.04.2017 um 00:00 Uhr | Quelle yro.slashdot.org
An anonymous reader quotes a report from Ars Technica: It's been more than five years since the government accused Megaupload and its founder Kim Dotcom of criminal copyright infringement. While Dotcom himself was arrested in New Zealand, U.S. government agents executed search warrants and grabbed a group of more than 1,000 servers owned by Carpathia Hosting. That meant that a lot of users with gigabytes of perfectly legal content lost access to it. Two months after the Dotcom raid and arrest, the Electronic Frontier Foundation filed a motion in court asking to get back data belonging to one of those users, Kyle Goodwin, whom the EFF took on as a client. Years have passed. The U.S. criminal prosecution of Dotcom and other Megaupload executives is on hold while New Zealand continues with years of extradition hearings. Meanwhile, Carpathia's servers were powered down and are kept in storage by QTS Realty Trust, which acquired Carpathia in 2015. Now the EFF has taken the extraordinary step of asking an appeals court to step in and effectively force the hand of the district court judge. Yesterday, Goodwin's lawyers filed a petition for a writ of mandamus (PDF) with the U.S. Court of Appeals for the 4th Circuit, which oversees Virginia federal courts. "We've been asking the court for help since 2012," said EFF attorney Mitch Stolz in a statement about the petition. "It's deeply unfair for him to still be in limbo after all this time."

Read more of this story at Slashdot.


Weiterlesen Artikel komplett ansehen

Organizations Fail to Maintain the Principal of Least Privilege

IT Security Nachrichten vom 26.04.2017 um 00:00 Uhr | Quelle feedproxy.google.com

Security requires that confidential commercial data is protected; compliance requires the same for personal information. The difficulty for business is the sheer volume of data generated makes it difficult to know where all the data resides, and who has access to it. A new report shows that 47% of analyzed organizations in 2016 had at least 1,000 sensitive files open to every employee; and 22% had 12,000 or more.

read more


Weiterlesen Artikel komplett ansehen

How To Spot A Bitcoin Scam

IT Security Nachrichten vom 26.04.2017 um 00:00 Uhr | Quelle forbes.com
There are any number of ways fraud merchants can swindle you through Bitcoin transactions. Here's how to avoid trouble.

Weiterlesen Artikel komplett ansehen

If Loose Lips Sink Ships, What do They do to Enterprise Security?

IT Security Nachrichten vom 26.04.2017 um 00:00 Uhr | Quelle feedproxy.google.com

Image Credit: United States Navy

read more


Weiterlesen Artikel komplett ansehen

Samsung Smart TV pwnable over Wi-Fi Direct, pentester says

IT Security Nachrichten vom 26.04.2017 um 00:00 Uhr | Quelle go.theregister.com

Sammy says trust-known-MACs code is a feature not a bug

A security researcher is complaining that Samsung isn't making a serious response to a vulnerability in its Smart TVs.…


Weiterlesen Artikel komplett ansehen

NSA-Exploits: So prüft ihr eure Windows-PCs auf Anfälligkeit

IT Security Nachrichten vom 26.04.2017 um 00:00 Uhr | Quelle winfuture.de
Windows, Sicherheitslücke, Hack, Nsa, SemperVideo, Exploit Durch die jüngsten Leaks von Interna des US-Geheimdienstes NSA sind auch Exploits öffentlich geworden, mit denen die Spione ihre Überwachungs-Malwares auf Ziel-Rechner brachten. Und diese wurden bereits kurz nach dem Bekanntwerden von Kriminellen missbraucht, um neue Einfallstore zu finden, mit denen Systeme in Botnetze eingebunden werden können. (Weiter lesen)

Weiterlesen Artikel komplett ansehen

Kali Linux 2017.1 Security OS Brings Wireless Injection Attacks to 802.11 AC

IT Security Nachrichten vom 26.04.2017 um 00:00 Uhr | Quelle news.softpedia.com
Offensive Security, the developers of the BackTrack-derived Kali Linux open-source, security-oriented operating system announced the availability of the Kali Linux 2017.1 rolling release. Since Kali Linux become a rolling distro, the importance of such updated images was never the same, but Kali Linux 2017.1 appears to be a major release of the ethical hacking distro, adding a bunch of exciting new features and improvements to the Debian-based operating system. "As with all new releases, you have the common denominator of updated packages, an updated kernel that provides more and better hardware support, as well as a slew of updated tools – but this release has a few more surprises up its sleeve," reads the release announcement. Here's what's new in Kali Linux 2017.1 Prominent new features of Kali Linux 2017.1 include the implementation of drivers for RTL8812AU wireless chipsets, b...

Weiterlesen Artikel komplett ansehen

ZUK Mobile Division is Shutting Down, New Devices to be Named Lenovo Moto

IT Security Nachrichten vom 26.04.2017 um 00:00 Uhr | Quelle news.softpedia.com
A post on China’s biggest social network, Weibo revealed an interesting reason why the ZUK Z3 smartphone won’t be launched. Apparently, Lenovo plans to shut down the ZUK Mobile division, which was launched in 2015. Analyst Pan Jiutang revealed that Lenovo intends to shut down the division in the coming weeks and focus on competition in China, according to GizChina. Earlier this year, Lenovo did say that it encountered issues with turning Motorola’s business around and recording profits. Now, Lenovo wants to start branding all new smartphones Lenovo Moto, despite the fact that the initial plan was to unite Moto and Lenovo divisions under the same brand name, and it seems that ZUK Mobile won’t be joining them. ZUK Mobile division is focused on offering affordable smartphones with lower-end specs. ZUI to be featured on Moto phones sold in China ZUK...

Weiterlesen Artikel komplett ansehen

US ISP Goes Down As Two Malware Families Go To War Over Its Modems

IT Security Nachrichten vom 26.04.2017 um 00:00 Uhr | Quelle tech.slashdot.org
An anonymous reader writes from a report via Bleeping Computer: Two malware families battling for turf are most likely the cause of an outage suffered by Californian ISP Sierra Tel at the beginning of the month, on April 10. The attack, which the company claimed was a "malicious hacking event," was the work of BrickerBot, an IoT malware family that bricks unsecured IoT and networking devices. "BrickerBot was active on the Sierra Tel network at the time their customers reported issues," Janit0r told Bleeping Computer in an email, "but their modems had also just been mass-infected with malware, so it's possible some of the network problems were caused by this concomitant activity." The crook, going by Janit0r, tried to pin some of the blame on Mirai, but all the clues point to BrickerBot, as Sierra Tel had to replace bricked modems altogether, or ask customers to bring in their modems at their offices to have them reset and reinstalled. Mirai brought down over 900,000 Deutsche Telekom modems last year, but that outage was fixed within hours with a firmware update. All the Sierra Tel modems bricked in this incident were Zyxel HN-51 models, and it took Sierra Tel almost two weeks to fix all bricked devices.

Read more of this story at Slashdot.


Weiterlesen Artikel komplett ansehen

Joomla 3.7: Unkritische Schwachstellen ausgebügelt

IT Security Nachrichten vom 26.04.2017 um 00:00 Uhr | Quelle heise.de
Das Content Managment System ist in einer aktualisierten Version erschienen. Neben neuen Funktionen haben die Entwickler auch mehrere Sicherheitslücken gestopft.

Weiterlesen Artikel komplett ansehen

KDE Plasma 5.9.5 Is the Last in the Series, KDE Plasma 5.10 Is Coming End of May

IT Security Nachrichten vom 26.04.2017 um 00:00 Uhr | Quelle news.softpedia.com
As expected, today KDE announced the availability of the fifth maintenance update to the current stable, yet short-lived KDE Plasma 5.9 desktop environment for GNU/Linux operating systems, versioned 5.9.5. KDE Plasma 5.9.5 is here more than a month after the release of the KDE Plasma 5.9.4 update, which most probably many of you use on your favorite GNU/Linux distributions. But the time has come to update your installations to KDE Plasma 5.9.5, the last point release in the series, adding more than 60 improvements across various components. "Today KDE releases a bugfix update to KDE Plasma 5, versioned 5.9.5. Plasma 5.9 was released in January with many feature refinements and new modules to complete the desktop experience. This release adds a month's worth of new translations and fixes from KDE's contributors. The bugfixes are typically small but important," reads today's announcement. KDE P...

Weiterlesen Artikel komplett ansehen

iPhone 8 Delay Pegged to November Because of Samsung OLED Problems

IT Security Nachrichten vom 26.04.2017 um 00:00 Uhr | Quelle news.softpedia.com
Apple’s iPhone 8 is certainly one of the most exciting devices to come out of Cupertino facilities in a while, but it seems that the smartphone could face a two months release delay. Recent Korean reports confirm the previously rumored delay, but provide a different reason. According to a report from Nikkei Assian Review, one of the reasons why Apple’s iPhone 8 could be delayed is Samsung. Specifically, Samsung is facing some issues with production of OLED panels for Apple’s iPhone 8. Originally, Samsung planned to start production of OLED panels for the upcoming iPhone 8 in May, but the schedule will most likely be delayed to the end of June or even July. Apple is said to have ordered 70-90 million high-quality OLE...

Weiterlesen Artikel komplett ansehen

Oregon Fines Man For Writing a Complaint Email Stating 'I Am An Engineer'

IT Security Nachrichten vom 26.04.2017 um 00:00 Uhr | Quelle yro.slashdot.org
pogopop77 quotes a report from Motherboard: In September 2014, Mats Jarlstrom, an electronics engineer living in Beaverton, Oregon, sent an email to the state's engineering board. The email claimed that yellow traffic lights don't last long enough, which "puts the public at risk." "I would like to present these facts for your review and comments," he wrote. This email resulted not with a meeting, but with a threat from The Oregon State Board of Examiners for Engineering and Land Surveying [stating]: "ORS 672.020(1) prohibits the practice of engineering in Oregon without registration -- at a minimum, your use of the title 'electronics engineer' and the statement 'I'm an engineer' create violations." In January of this year, Jarlstrom was officially fined $500 by the state for the crime of "practicing engineering without being registered." Since the engineering board in Oregon said Jarlstrom should not be free to publish or present his ideas about the fast-turning yellow traffic lights, due to his "practice of engineering in Oregon without registration," he and the Institute for Justice sued them in federal court for violating his First Amendment rights. "I'm not practicing engineering, I'm just using basic mathematics and physics, Newtonian laws of motion, to make calculations and talk about what I found," he said. Sam Gedge, an attorney for the Institute for Justice, told Motherboard: "Mats has a clear First Amendment right to talk about anything from taxes to traffic lights. It's an instance of a licensing board trying to suppress speech."

Read more of this story at Slashdot.


Weiterlesen Artikel komplett ansehen

Samsung Prevents Burn-In of Virtual Home Button on the Galaxy S8

IT Security Nachrichten vom 26.04.2017 um 00:00 Uhr | Quelle news.softpedia.com
Samsung’s Galaxy S8 and Galaxy S8+ come with always-on home buttons on their displays, to replace the physical home button which was ditched on its year’s flagship. But there has been the question regarding burn-in caused by the capacitive home button. Samsung Netherlands confirmed on the company’s Twitter account that the home button won’t be burnt into the display of Galaxy S8 and Galaxy S8+ smartphones. GalaxyClub tested the feature and noticed that the home button changes its location slightly, with a few pixels at a time to prevent burn-in. It’s an ingenious mechanism that users don’t notice, but makes sure that no long-term damages are brought to the Infinity Display. Because the capacity home buttons moves only a few pixels at a time, there’s no risk of it leaving a permanent ma...

Weiterlesen Artikel komplett ansehen

Flyspray 1.0-rc4 Cross Site Scripting

PoC vom 26.04.2017 um 00:00 Uhr | Quelle packetstormsecurity.com
Flyspray version 1.0-rc4 suffers from a cross site scripting vulnerability.

Weiterlesen Artikel komplett ansehen

Microservice-Architekturen per Monitoring im Blick behalten

IT Security Nachrichten vom 26.04.2017 um 00:00 Uhr | Quelle security-insider.de
Wenn Software in Microservices aufgesplittet wird, wollen die unabhängigen Prozesse auch überwacht sein. Es gilt, das Monitoring im Netzwerk auf die Dienste und deren Basis – zum Beispiel die einzelnen Container – auszuweiten.

Weiterlesen Artikel komplett ansehen

Adventures In Automotive Networks And Control Units

PoC vom 26.04.2017 um 00:00 Uhr | Quelle packetstormsecurity.com
Adventures in Automotive Networks and Control Units (aka car hacking) is an overview of the original work by Charlie Miller and Chris Valasek that covers CAN bus sniffing, injection, and attacks against a Toyota Prius and Ford Escape. Also included are all the tools they used and related data.

Weiterlesen Artikel komplett ansehen

Blueprint for a Modern Enterprise Security Program

IT Security Nachrichten vom 26.04.2017 um 00:00 Uhr | Quelle feedproxy.google.com

There’s no doubt, we’re living in a data and intelligence-driven world when it comes to enterprise security. The volume, velocity, and complexity of information security data that must be processed to detect advanced attacks and, at the same time, support new business initiatives has been growing exponentially. However, data in its raw form is still only a means to an end.

read more


Weiterlesen Artikel komplett ansehen

An Artificial Womb Successfully Grew Baby Sheep -- and Humans Could Be Next

IT Security Nachrichten vom 26.04.2017 um 00:00 Uhr | Quelle science.slashdot.org
An anonymous reader quotes a report from The Verge: Inside what look like oversized ziplock bags strewn with tubes of blood and fluid, eight fetal lambs continued to develop -- much like they would have inside their mothers. Over four weeks, their lungs and brains grew, they sprouted wool, opened their eyes, wriggled around, and learned to swallow, according to a new study that takes the first step toward an artificial womb. One day, this device could help to bring premature human babies to term outside the uterus -- but right now, it has only been tested on sheep. The Biobag may not look much like a womb, but it contains the same key parts: a clear plastic bag that encloses the fetal lamb and protects it from the outside world, like the uterus would; an electrolyte solution that bathes the lamb similarly to the amniotic fluid in the uterus; and a way for the fetus to circulate its blood and exchange carbon dioxide for oxygen. Flake and his colleagues published their results today in the journal Nature Communications.

Read more of this story at Slashdot.


Weiterlesen Artikel komplett ansehen

Unlikely Rumor Says Apple Will Debut Two OLED iPhones This Year

IT Security Nachrichten vom 26.04.2017 um 00:00 Uhr | Quelle news.softpedia.com
Numerous reports from the past few months have pointed to the fact that Apple is working on three smartphones to announce later this year, one of which is the OLED iPhone 8. The other two devices are believed to be successors to last year’s iPhone 7 and iPhone 7 Plus. However, Chinese blog MicGadget claims to have talked to sources inside Foxconn, which revealed that Apple is actually working solely on the iPhone 8 and a larger iPhone 8 Plus, while the iPhone 7s and iPhone 7s Plus won’t make their debut this year. Both of the iPhone 8 and iPhone 8 Plus will have OLED displays and dual-camera setups, with the latter sporting a bigger size. While we can’t verify that the publication indeed spoke to people from Foxconn, we must categorize this latest rumor as untrue. Apple will announce new iPhones this fall Reports trailing back to spring last year have revealed th...

Weiterlesen Artikel komplett ansehen

Flaws in Hyundai App Allowed Hackers to Steal Cars

IT Security Nachrichten vom 26.04.2017 um 00:00 Uhr | Quelle feedproxy.google.com

South Korean carmaker Hyundai has released updates for its Blue Link mobile applications to address vulnerabilities that could have been exploited by hackers to locate, unlock and start vehicles.

read more


Weiterlesen Artikel komplett ansehen

OnePlus 5 zeigt sich erstmals per Bild, bietet neues Kamerasystem

IT Security Nachrichten vom 26.04.2017 um 00:00 Uhr | Quelle winfuture.de
Leak, OnePlus, Kameras, Rückseite, OnePlus 5 Das chinesische Startup OnePlus ist eine der ersten Adressen für Nutzer, die viel Smartphone für verhältnismäßig wenig Geld wollen. Auch das aktuelle Modell OnePlus 3T beweist das, der Hersteller bereitet aktuell auch den Nachfolger vor, das OnePlus 5, das ist nun auch erstmals auf einem Bild zu sehen. Und nein, wir haben uns nicht verzählt. (Weiter lesen)

Weiterlesen Artikel komplett ansehen

Interpol unplugs nearly 9,000 Asian command and control networks

IT Security Nachrichten vom 26.04.2017 um 00:00 Uhr | Quelle go.theregister.com

WordPress plug-in bug exploited in eight countries

An Interpol investigation has revealed a worrying degree of insecurity in sout-east Asian countries, with even government-operated Web servers infected to operate as command and control systems for bot-herders.…


Weiterlesen Artikel komplett ansehen

Charmed, I’m Sure: The Security BSides Tradition is Strong in Baltimore

IT Security Nachrichten vom 26.04.2017 um 00:00 Uhr | Quelle tripwire.com

Tickets went fast for BSides Charm 2017. In just over two hours, this 3-year-old event sold out and looks like it will welcome about 1,000 students, hackers, and Information Security professionals to Baltimore’s famous Inner Harbor this weekend. Not bad for a con that drew just under 300 attendees in 2015. Perhaps it’s no surprise […]… Read More

The post Charmed, I’m Sure: The Security BSides Tradition is Strong in Baltimore appeared first on The State of Security.


Weiterlesen Artikel komplett ansehen

Making Sense of the General Data Protection Regulation (GDPR)

IT Security Nachrichten vom 26.04.2017 um 00:00 Uhr | Quelle tripwire.com

The upcoming GDPR compliance deadline of May 2018 affects any organization across the world that collects, processes, or stores data on citizens of the European Union. The intent behind the GDPR is to better protect the privacy of EU citizens, and the mechanism to do so is through harmonizing the existing data privacy laws across […]… Read More

The post Making Sense of the General Data Protection Regulation (GDPR) appeared first on The State of Security.


Weiterlesen Artikel komplett ansehen

Five Questions to Ask Yourself About the Security of Your Cloud Workloads

IT Security Nachrichten vom 26.04.2017 um 00:00 Uhr | Quelle feedproxy.google.com

IT professionals must ask themselves tough questions about security to protect their organizations' critical data and hybrid cloud workloads.

The post Five Questions to Ask Yourself About the Security of Your Cloud Workloads appeared first on Security Intelligence.


Weiterlesen Artikel komplett ansehen

Disclosing Zero Days

IT Security Nachrichten vom 26.04.2017 um 00:00 Uhr | Quelle tripwire.com

Governments ought to disclose zero-day vulnerabilities and begin to collaborate to make digital disarmament more than just ‘a thing.’ The case for these policy changes is becoming increasingly clear as new public debates begin to take shape around online privacy, trust and the prevention of cyber conflict. However, much work lies ahead in correctly identifying […]… Read More

The post Disclosing Zero Days appeared first on The State of Security.


Weiterlesen Artikel komplett ansehen

Kritische Lücken: VMware sichert Anwendungen gegenüber Schadcode ab

IT Security Nachrichten vom 26.04.2017 um 00:00 Uhr | Quelle heise.de
Sicherheitsupdates schließen mehrere Schwachstellen in verschiedenen VMware-Anwendungen zum Umgang mit virtuellen Maschinen und für den Fernzugriff. Davon sind alle Betriebssysteme betroffen.

Weiterlesen Artikel komplett ansehen

Vuln: Oracle E-Business Suite CVE-2017-3556 Remote Security Vulnerability

Exploits vom 26.04.2017 um 00:00 Uhr | Quelle securityfocus.com
Oracle E-Business Suite CVE-2017-3556 Remote Security Vulnerability

Weiterlesen Artikel komplett ansehen

iPhone 7 Catches Fire on the Pillow Just Next to the Head of Sleeping Owner

IT Security Nachrichten vom 26.04.2017 um 00:00 Uhr | Quelle news.softpedia.com
If you’re reading this article on an iPhone, you better read fast because you never know what’s going to happen. An iPhone 7 Plus caught fire in the middle of the night while charging, with the owner sleeping only a few inches away from the device. While sleeping with the phone close to the head is not a recommended thing to do because of all the radiations, you now have another reason not to do it: the device could go boom and cause severe injuries. The Chinese owner of the iPhone 7 Plus explained she purchased the device in March, so it was barely one month old when it exploded. The woman, who only wanted to share her surname Chen, explained that she was sleeping at her home in Nanjing with the iPhone charging on a pillow right next to her. She was woken ...

Weiterlesen Artikel komplett ansehen

Seitennavigation

Seite 7 von 4.329 Seiten (Bei Beitrag 210 - 245)
151.488x Beiträge in dieser Kategorie

Auf Seite 6 zurück | Nächste 8 Seite | Letzte Seite