Alter Stand
Kategorie-Datenstand: 17.12.2016 um 06:30 Uhr
Seitencache-Datum: 23.04.2018 20:07:38 IT-Security
 
  1. IT-Security

ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese
Anzeige

IT-Security


Suchen

Tracking Security Innovation - Business Security Weekly #82

IT Security Video vom 23.04.2018 um 23:53 Uhr | Quelle youtube.com

1-Klick Newsbewertung vornehmen

Weiterlesen Artikel ansehen

Article Discussion on Leadership, Communication, and Innovation - Business Security Weekly #82

IT Security Video vom 23.04.2018 um 23:49 Uhr | Quelle youtube.com

1-Klick Newsbewertung vornehmen

Weiterlesen Artikel ansehen

Google Accused of Showing 'Total Contempt' for Android Users' Privacy

IT Security Nachrichten vom 23.04.2018 um 23:40 Uhr | Quelle tech.slashdot.org
On the heels of a terse privacy debate, Google may have found another thing to worry about: its attempt to rethink the traditional texting system. From a report: Joe Westby is Amnesty International's Technology and Human Rights researcher. Recently, in response to Google's launch of a new messaging service called "Chat", Westby argued that Google, "shows total contempt for Android users' privacy." "With its baffling decision to launch a messaging service without end-to-end encryption, Google has shown utter contempt for the privacy of Android users and handed a precious gift to cybercriminals and government spies alike, allowing them easy access to the content of Android users' communications. Following the revelations by CIA whistleblower Edward Snowden, end-to-end encryption has become recognized as an essential safeguard for protecting people's privacy when using messaging apps. With this new Chat service, Google shows a staggering failure to respect the human rights of its customers," Westby contended. Westby continued, saying: "In the wake of the recent Facebook data scandal, Google's decision is not only dangerous but also out of step with current attitudes to data privacy."

Share on Google+

Read more of this story at Slashdot.


1-Klick Newsbewertung vornehmen

Weiterlesen Artikel ansehen

http://www.kehakiman.gov.my/n.txt

Hacking vom 23.04.2018 um 23:22 Uhr | Quelle zone-h.org
http://www.kehakiman.gov.my/n.txt notified by NewbieXHacker
1-Klick Newsbewertung vornehmen

Weiterlesen Artikel ansehen

Nintendo Switch users about to get pwned after unpatchable flaw found in Nvidia Tegra chips

IT Security Nachrichten vom 23.04.2018 um 23:17 Uhr | Quelle go.theregister.com

Researcher reveals demo attack code, full release in June

Security researcher Kate Temkin has released proof-of-concept code to launch an exploit chain called Fusée Gelée, which relies on an as-yet-undisclosed vulnerability in past versions of Nvidia's Tegra system-on-a-chip.…


1-Klick Newsbewertung vornehmen

Weiterlesen Artikel ansehen

Microsoft Is Adding a Dark Theme Coming to Windows 10's File Explorer

IT Security Nachrichten vom 23.04.2018 um 23:01 Uhr | Quelle bleepingcomputer.com
In the latest Redstone 5 skip ahead build for Windows 10 Insiders, Microsoft has added a hidden feature that enables a dark theme in File Explorer. While the new theme is in the very beginning development stages (hopefully!!), it's currently not a sight to behold. [...]
1-Klick Newsbewertung vornehmen

Weiterlesen Artikel ansehen

AI Trained on Images from Cosmological Simulations Surprisingly Successful at Classifying Real Galaxies in Hubble Images

IT Security Nachrichten vom 23.04.2018 um 23:00 Uhr | Quelle science.slashdot.org
A machine learning method which has been widely used in face recognition and other image- and speech-recognition applications, has shown promise in helping astronomers analyze images of galaxies and understand how they form and evolve. From a report: In a new study, accepted for publication in Astrophysical Journal and available online [PDF], researchers used computer simulations of galaxy formation to train a deep learning algorithm, which then proved surprisingly good at analyzing images of galaxies from the Hubble Space Telescope. The researchers used output from the simulations to generate mock images of simulated galaxies as they would look in observations by the Hubble Space Telescope. The mock images were used to train the deep learning system to recognize three key phases of galaxy evolution previously identified in the simulations. The researchers then gave the system a large set of actual Hubble images to classify. The results showed a remarkable level of consistency in the neural network's classifications of simulated and real galaxies. "We were not expecting it to be all that successful. I'm amazed at how powerful this is," said coauthor Joel Primack, professor emeritus of physics and a member of the Santa Cruz Institute for Particle Physics (SCIPP) at UC Santa Cruz. "We know the simulations have limitations, so we don't want to make too strong a claim. But we don't think this is just a lucky fluke."

Share on Google+

Read more of this story at Slashdot.


1-Klick Newsbewertung vornehmen

Weiterlesen Artikel ansehen

Orangeworm Hackers Infect X-Ray and MRI Machines In Their Quest for Patient Data

IT Security Nachrichten vom 23.04.2018 um 22:38 Uhr | Quelle bleepingcomputer.com
Security researchers can't explain how and why malware has infected computers that control MRI and X-ray machines at countless of healthcare organizations across the world. [...]
1-Klick Newsbewertung vornehmen

Weiterlesen Artikel ansehen

Piep! Lautstarker Feuermelder schaltet Rechenzentrum der Nasdaq ab

IT Security Nachrichten vom 23.04.2018 um 22:30 Uhr | Quelle winfuture.de
Google, Server, Datenzentrum Schon in der vergangenen Woche ereignete sich ein kurioser Vorfall in einem Rechenzentrum in Schweden. Aufgrund der Auslösung eines Brandmelders und des Löschsystems entstand ein extrem lauter Ton, der Festplatte zerstörte und damit letztendlich die Nasdaq beeinträchtigte. (Weiter lesen)
1-Klick Newsbewertung vornehmen

Weiterlesen Artikel ansehen

New Attack Group Orangeworm Targets Healthcare Sector in US, Asia, and Europe: Symantec

IT Security Nachrichten vom 23.04.2018 um 22:20 Uhr | Quelle it.slashdot.org
Security researchers at Symantec say a group of hackers has been targeting firms related to health care in order to steal intellectual property. The security firm observed a hacking team, called Orangeworm, compromise the systems of pharmaceutical firms, medical-device manufacturers, health-care providers, and even IT companies working with medical organizations in the US, Europe, and Asia markets. Victims don't appear to have been chosen at random but "carefully and deliberately." You can read the full report here.

Share on Google+

Read more of this story at Slashdot.


1-Klick Newsbewertung vornehmen

Weiterlesen Artikel ansehen

Orangeworm cyber espionage group target Healthcare organizations worldwide

Hacking vom 23.04.2018 um 21:45 Uhr | Quelle securityaffairs.co

Symantec researchers have monitored the activity of a cyber espionage group tracked as Orangeworm that targets organizations in the healthcare sector. Security experts at Symantec have published a report on the activity of a cyber espionage group tracked as Orangeworm that targets healthcare organizations. “Symantec has identified a previously unknown group called Orangeworm that has […]

The post Orangeworm cyber espionage group target Healthcare organizations worldwide appeared first on Security Affairs.


1-Klick Newsbewertung vornehmen

Weiterlesen Artikel ansehen

iPhone SE 2 soll schon im Mai über den Ladentisch gehen

IT Security Nachrichten vom 23.04.2018 um 21:09 Uhr | Quelle winfuture.de
Iphone, iPhone SE, Apple iPhone SE Apple plant der Gerüchteküche zufolge für dieses Jahr doch noch einen Nachfolger des 2016 erschienen, günstigen iPhone SE. Jetzt gibt es neue Informationen zu dem geplanten Verkaufsstart - der soll nämlich schon in den kommenden fünf Wochen sein. (Weiter lesen)
1-Klick Newsbewertung vornehmen

Weiterlesen Artikel ansehen

Was There a Civilization On Earth Before Humans?

IT Security Nachrichten vom 23.04.2018 um 21:00 Uhr | Quelle science.slashdot.org
Adam Frank, writing for The Atlantic: We're used to imagining extinct civilizations in terms of the sunken statues and subterranean ruins. These kinds of artifacts of previous societies are fine if you're only interested in timescales of a few thousands of years. But once you roll the clock back to tens of millions or hundreds of millions of years, things get more complicated. When it comes to direct evidence of an industrial civilization -- things like cities, factories, and roads -- the geologic record doesn't go back past what's called the Quaternary period 2.6 million years ago. For example, the oldest large-scale stretch of ancient surface lies in the Negev Desert. It's "just" 1.8 million years old -- older surfaces are mostly visible in cross section via something like a cliff face or rock cuts. Go back much farther than the Quaternary and everything has been turned over and crushed to dust. And, if we're going back this far, we're not talking about human civilizations anymore. Homo sapiens didn't make their appearance on the planet until just 300,000 years or so ago. [...] Given that all direct evidence would be long gone after many millions of years, what kinds of evidence might then still exist? The best way to answer this question is to figure out what evidence we'd leave behind if human civilization collapsed at its current stage of development. Mr. Frank, along with Gavin Schmidt, Director of the NASA Goddard Institute for Space Studies, have published their research on the subject [PDF].

Share on Google+

Read more of this story at Slashdot.


1-Klick Newsbewertung vornehmen

Weiterlesen Artikel ansehen

Hackers Behind Healthcare Espionage Infect X-Ray and MRI Machines

IT Security Nachrichten vom 23.04.2018 um 20:53 Uhr | Quelle feedproxy.google.com
Security researchers have uncovered a new hacking group that is aggressively targeting healthcare organizations and related sectors across the globe to conduct corporate espionage. Dubbed "Orangeworm," the hacking group has been found installing a wormable trojan on machines hosting software used for controlling high-tech imaging devices, such as X-Ray and MRI machines, as well as machines

1-Klick Newsbewertung vornehmen

Weiterlesen Artikel ansehen

http://ictschools.gov.in

Hacking vom 23.04.2018 um 20:32 Uhr | Quelle zone-h.org
http://ictschools.gov.in notified by TeaM_CC
1-Klick Newsbewertung vornehmen

Weiterlesen Artikel ansehen

EU Opens Competition Probe Into Apple's Bid For Music App Shazam

IT Security Nachrichten vom 23.04.2018 um 20:30 Uhr | Quelle apple.slashdot.org
EU antitrust regulators opened an investigation on Monday into Apple's bid for British music discovery app Shazam, concerned the deal might give the iPhone maker an unfair advantage in poaching users from its rivals. From a report: Apple announced the deal in December to help it better compete with industry leader Spotify. Shazam lets users identify songs by pointing a smartphone at the audio source. The European Commission said it was concerned about Apple's access to data on Shazam's users who use competing music streaming services in Europe.

Share on Google+

Read more of this story at Slashdot.


1-Klick Newsbewertung vornehmen

Weiterlesen Artikel ansehen

Sanctions against Kaspersky are 'logical next step,' senator says

IT Security Nachrichten vom 23.04.2018 um 20:18 Uhr | Quelle cnet.com
The call for additional restrictions on the cybersecurity company follows a ban by the US government.
1-Klick Newsbewertung vornehmen

Weiterlesen Artikel ansehen

Google Accused of Showing ‘Total Contempt’ for Android Users’ Privacy

IT Security Nachrichten vom 23.04.2018 um 20:11 Uhr | Quelle bleepingcomputer.com
Joe Westby is Amnesty International's Technology and Human Rights researcher. Recently, in response to Google's launch of a new messaging service, Westby argued that Google, "shows total contempt for Android users' privacy." [...]
1-Klick Newsbewertung vornehmen

Weiterlesen Artikel ansehen

Uppersafe Makes Its Point About Internet Safety With Disturbing Marketing Stunt

IT Security Nachrichten vom 23.04.2018 um 20:08 Uhr | Quelle forbes.com
Uppersafe is an internet privacy company protecting its customers from hackers who hack into your home’s video security system and then post those as live streams on the internet for all to see. To build awareness for this problem Uppersafe chose to stage a stunt, one inspired by dark altruism.
1-Klick Newsbewertung vornehmen

Weiterlesen Artikel ansehen

Trustjacking: iTunes’ Wi-Fi Sync Feature Vulnerable to Exploitation

IT Security Nachrichten vom 23.04.2018 um 20:07 Uhr | Quelle hackread.com

By Waqas

Hackers can exploit the vulnerability in iTunes’ Wi-Fi Sync feature and

This is a post from HackRead.com Read the original post: Trustjacking: iTunes’ Wi-Fi Sync Feature Vulnerable to Exploitation


1-Klick Newsbewertung vornehmen

Weiterlesen Artikel ansehen

A Gentle Introduction To Deep Learning with TensorFlow [Intermediate Level]

Programmierung vom 23.04.2018 um 20:00 Uhr | Quelle youtube.com

1-Klick Newsbewertung vornehmen

Weiterlesen Artikel ansehen

Lenovo IdeaPad 530S: Edles 14-Zoll-Notebook mit Windows 10 S

IT Security Nachrichten vom 23.04.2018 um 19:52 Uhr | Quelle winfuture.de
Notebook, Laptop, Lenovo, Lenovo IdeaPad 530S Der chinesische PC-Hersteller Lenovo bringt in Kürze gleich eine ganze Reihe von neuen Notebooks im klassischen Clamshell-Design auf den Markt, die vom Einsteiger- bis zum Premium-Segment diverse Bereiche ansprechen sollen und teilweise auch mit AMDs neuen, mobilen Ryzen-Prozessoren sowie Windows 10 S als Betriebssystem daherkommen. (Weiter lesen)
1-Klick Newsbewertung vornehmen

Weiterlesen Artikel ansehen

Hacking a Satellite is Surprisingly Easy

IT Security Nachrichten vom 23.04.2018 um 19:50 Uhr | Quelle it.slashdot.org
Caroline Haskins, writing for The Outline: Hundreds of multi-ton liabilities -- soaring faster than the speed of sound, miles above the surface of the earth -- are operating on Windows-95. They're satellites, responsible for everything from GPS positioning, to taking weather measurements, to carrying cell signals, to providing television and internet. For the countries that own these satellites, they're invaluable resources. Even though they're old, it's more expensive to take satellites down than it is to just leave them up. So they stay up. Unfortunately, these outdated systems makes old satellites prime targets for cyber attacks. [...] A malicious actor could fake their IP address, which gives information about a user's computer and its location. This person could then get access to the satellite's computer system, and manipulate where the satellite goes or what it does. Alternatively, an actor could jam the satellite's radio transmissions with earth, essentially disabling it. The cost of such an attack could be huge. If a satellite doesn't work, life-saving GPS or online information could be withheld to people on earth when they need it most. What's worse, if part of a satellite -- or an entire satellite -- is knocked out of its orbit from an attack, the debris could create a domino effect and cause extreme damage to other satellites.

Share on Google+

Read more of this story at Slashdot.


1-Klick Newsbewertung vornehmen

Weiterlesen Artikel ansehen

http://selurb.recife.pe.gov.br/ele.html

Hacking vom 23.04.2018 um 19:48 Uhr | Quelle zone-h.org
http://selurb.recife.pe.gov.br/ele.html notified by Team_CC
1-Klick Newsbewertung vornehmen

Weiterlesen Artikel ansehen

http://meioambiente.recife.pe.gov.br/ele.html

Hacking vom 23.04.2018 um 19:48 Uhr | Quelle zone-h.org
http://meioambiente.recife.pe.gov.br/ele.html notified by Team_CC
1-Klick Newsbewertung vornehmen

Weiterlesen Artikel ansehen

http://licenciamentoambiental.recife.pe.gov.br/ele.html

Hacking vom 23.04.2018 um 19:48 Uhr | Quelle zone-h.org
http://licenciamentoambiental.recife.pe.gov.br/ele.html notified by Team_CC
1-Klick Newsbewertung vornehmen

Weiterlesen Artikel ansehen

http://jardimbotanico.recife.pe.gov.br/ele.html

Hacking vom 23.04.2018 um 19:48 Uhr | Quelle zone-h.org
http://jardimbotanico.recife.pe.gov.br/ele.html notified by Team_CC
1-Klick Newsbewertung vornehmen

Weiterlesen Artikel ansehen

http://icps.recife.pe.gov.br/ele.html

Hacking vom 23.04.2018 um 19:48 Uhr | Quelle zone-h.org
http://icps.recife.pe.gov.br/ele.html notified by Team_CC
1-Klick Newsbewertung vornehmen

Weiterlesen Artikel ansehen

Nvidia Develops AI That Reconstructs Corrupted Images

IT Security Nachrichten vom 23.04.2018 um 19:36 Uhr | Quelle bleepingcomputer.com
Nvidia researchers have developed a new AI technology that can reconstruct holes or intentionally removed content from images. [...]
1-Klick Newsbewertung vornehmen

Weiterlesen Artikel ansehen

DVB-T Ende für weitere Regionen, DVB-T2 HD an weiteren Standorten

IT Security Nachrichten vom 23.04.2018 um 19:32 Uhr | Quelle winfuture.de
Tv, Fernsehen, Fernseher Die nächste Welle der Abschaltung von DVB-T läuft in dieser Woche an. Dazu starten ARD und ZDF in der Nacht vom 24. zum 25. April das neue terrestrische Antennenfernsehen DVB-T2 HD an weiteren Standorten. (Weiter lesen)
1-Klick Newsbewertung vornehmen

Weiterlesen Artikel ansehen

StaCoAn – Mobile App Static Analysis Tool

IT Security Nachrichten vom 23.04.2018 um 19:08 Uhr | Quelle darknet.org.uk
StaCoAn – Mobile App Static Analysis Tool

StaCoAn is a cross-platform tool which aids developers, bug bounty hunters and ethical hackers performing mobile app static analysis on the code of the application.

This tool will look for interesting lines in the code which can contain:

  • Hardcoded credentials
  • API keys
  • URL’s of API’s
  • Decryption keys
  • Major coding mistakes

This tool was created with a big focus on usability and graphical guidance in the user interface.

Read the rest of StaCoAn – Mobile App Static Analysis Tool now! Only available at Darknet.


1-Klick Newsbewertung vornehmen

Weiterlesen Artikel ansehen

Atlanta spent at least $2.6 million on ransomware recovery

IT Security Nachrichten vom 23.04.2018 um 19:01 Uhr | Quelle zdnet.com
The ransom was never paid, because the payment portal was pulled offline by the attacker.
1-Klick Newsbewertung vornehmen

Weiterlesen Artikel ansehen

4 Years In The Life Of A NodeJS Based Platform At Conde Nast

Programmierung vom 23.04.2018 um 19:00 Uhr | Quelle youtube.com

1-Klick Newsbewertung vornehmen

Weiterlesen Artikel ansehen

MIT Researchers Developed a 'System For Dream Control'

IT Security Nachrichten vom 23.04.2018 um 19:00 Uhr | Quelle science.slashdot.org
dmoberhaus writes: Researchers at MIT Media Lab have adapted a centuries' old technique for inducing hypnagogia for the 21st century. Known as Dormio, this system is able to extend and manipulate the period users spend in a transitional state of consciousness between wakefulness and sleep known as hypnagogia. This state is characterized by vivid hallucinations and microdreams, and as the MIT researchers demonstrated, the contents of these microdreams can be manipulated with the system and subsequently result in heightened creativity when the user awakes. Motherboard got the exclusive details on the system.

Share on Google+

Read more of this story at Slashdot.


1-Klick Newsbewertung vornehmen

Weiterlesen Artikel ansehen

SUSE Launches Beta Program for SUSE Linux Enterprise High Performance Computing

IT Security Nachrichten vom 23.04.2018 um 18:58 Uhr | Quelle news.softpedia.com
SUSE recently announced a public beta program for its SUSE Linux Enterprise High Performance Computing (HPC) product as part of the upcoming SUSE Linux Enterprise 15 operating system release. While SUSE is working hard on the major SUSE Linux Enterprise 15 release, they recently announced that the SUSE Linux Enterprise High Performance Computing (HPC) platform is now a dedicated SUSE Linux Enterprise product based on SUSE Linux Enterprise 15, available for public testing on 64-bit and ARM 64-bit architectures. SUSE Linux Enterprise 15 will introduce numerous new features and improvements, including a brand new installer that offers a single unified method to install one of the supported SUSE Linux Enterprise products, including the SUSE Linux Enterprise High Performance Computing module, which comes with a set of components used in high-performance computing e...
1-Klick Newsbewertung vornehmen

Weiterlesen Artikel ansehen

Seitennavigation

Seite 1 von 3.171 Seiten (Bei Beitrag 1 - 35)
110.958x Beiträge in dieser Kategorie

Nächste 2 Seite | Letzte Seite
[ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ]