1. IT-Security


ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese

IT-Security


Suchen

News RSS Quellen: 212x
News Kategorien unterhalb von IT-Security: 9x
News RSS Feeds dieser IT-Security Kategorie: RSS Feed IT Security
Benutze Feedly zum Abonieren.Folge uns auf feedly
Download RSS Feed App für Windows 10 Store (Leider gibt es nicht mehr viele Extensions mit welchen Sie RSS-Feeds in einer Software abonieren können. Der Browser Support für RSS-Feeds wurde eingestellt (Firefox,Chrome).

Eigene IT Security Webseite / Blog / Quelle hinzufügen

Seitennavigation

Seite 1 von 6.161 Seiten (Bei Beitrag 1 - 35)
215.624x Beiträge in dieser Kategorie

Nächste 2 Seite | Letzte Seite

[ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ]

I want to post, but what if ...?

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: forum.defcon.org Direktlink direkt öffnen

Welcome to the DEF CON forums! Q: How do you know if your post will be well received, or people will complain? A: You don't. Nobody knows! Part of being a hacker is trying new things. "What if I posted something and... ?" You can spend a lot of time thinking about all the possible events...
News Bewertung

Weiterlesen Weiterlesen

Ubuntu Security Notice USN-4066-1

Zur Kategorie wechselnIT Security Tools vom | Quelle: packetstormsecurity.com Direktlink direkt öffnen

Ubuntu Security Notice 4066-1 - It was discovered that libmspack incorrectly handled certain CHM files. A remote attacker could possibly use this issue to access sensitive information.
News Bewertung

Weiterlesen Weiterlesen

Huawei Says Hongmeng OS Isn't Designed as an Android Replacement

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: tech.slashdot.org Direktlink direkt öffnen

Huawei reportedly wants to keep using Google's Android operating system in its phones instead of jumping to its self-developed Hongmeng system. From a report: Company senior vice president Catherine Chen told reporters in Brussels this week that the Hongmeng OS isn't even designed for phones, according to Chinese state news agency Xinhua. Chen apparently said Hongmeng is for industrial use, noting that it contains far fewer lines of code than a phone OS, and has much lower latency than a phone, meaning it can process a very high volume of data messages with little delay. Latest episode in a confusing narrative about what Huawei even intends to do. The company's executives have previously said on record that its homegrown operating system is designed to replace Android on its handsets. One executive said the operating system would be released by last month -- a target that Huawei has missed.

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

What’s new in Azure DevOps Sprint 154

Zur Kategorie wechselnProgrammierung vom | Quelle: devblogs.microsoft.com Direktlink direkt öffnen

Sprint 154 has just finished rolling out to all organisations and you can check out all the cool features in the release notes. Here are just some of the features that you can start using today.

Add a GitHub release as an artifact source

You can link your GitHub releases as artifact source in Azure DevOps release pipelines. This will let you consume the GitHub release as part of your deployments.

Create and embed work items from a wiki page

We heard from feedback, that wiki is used to capture brainstorming documents, planning documents, ideas on features, spec documents, meeting minutes etc. Now you can easily create features and user stories directly from a planning document without leaving the wiki page, quickly and easily, saving you time and reducing context switching.

Instant search for work items

Ever lose the link to a work item you recently opened and not know where to go to find it? Never fear – the search bar now provides a list of recently accessed work items and full support for search syntax so you can find any work item right inline.

Tip: You can invoke the search box by typing the keyboard shortcut “/”.

Live updates for work items

We’ve made it even easier to stay up to date on the latest changes with the introduction of live updates. Now, just like on the Kanban board, if you have a work item open and someone on your team makes a change, you will get those updates immediately without needing to refresh.

View parent work item as a column

Another longstanding paper cut in the product is the inability to view parent information as you reorder the backlog, so we’re excited to introduce parent work item as a configurable column. You can now change the order of your PBIs with the Feature information in view!

These are just the tip of the iceberg, and there are plenty more features that we’ve released in Sprint 154. Check out the full list of features for this sprint in the release notes.

The post What’s new in Azure DevOps Sprint 154 appeared first on Azure DevOps Blog.


News Bewertung

Weiterlesen Weiterlesen

Israel's NSO Group: Our malware? Slurp your cloud backups plus phone data? They've misunderstood

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: go.theregister.com Direktlink direkt öffnen

After report claimed its sales pitches boasted of doing that

Israeli spyware firm NSO Group has denied it developed malware that can steal user data from cloud services run by Amazon, Apple, Facebook, Google and Microsoft.…


News Bewertung

Weiterlesen Weiterlesen

Kazakhstan decrypting citizens' Internet traffic for "security" (and censorship) - makes users less secure, not just against their own government, but against other criminals as well

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

Kazakhstan decrypting citizens' Internet traffic for "security" (and censorship) - makes users less secure, not just against their own government, but against other criminals as well submitted by /u/misconfig_exe
[link] [comments]

News Bewertung

Weiterlesen Weiterlesen

The Growing Threat of Targeted Ransomware

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: feedproxy.google.com Direktlink direkt öffnen

Ransomware targeting organizations is a growing threat. The extent of that threat is not always obvious. Except for the healthcare sector, disclosure of a ransomware attack is not generally required -- so victims will not necessarily report an incident. This is exacerbated by those victims who simply pay up and recover their files without the problem becoming obvious.

read more


News Bewertung

Weiterlesen Weiterlesen

Neue winSIM-Aktion: LTE All-Tarif jetzt mit 12 GB für 22,99 im Monat

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: winfuture.de Direktlink direkt öffnen

Mobilfunk, Tarife, Drillisch, WinSIM Der Mobilfunkanbieter Drillisch hat für seine Marke winSIM eine neue kurz­fris­ti­ge Tarif-Aktion gestartet. Wer schnell ist, kann sich bis einschließlich 23. Juli den regulären "LTE All 10 GB" jetzt mit zwei GB extra für 22,99 Euro im Monat sichern. (Weiter lesen)
News Bewertung

Weiterlesen Weiterlesen

Author of Dryad and Rubella Macro Builders Arrested

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: feedproxy.google.com Direktlink direkt öffnen

Dutch authorities this week announced the arrest a 20-year old man for allegedly developing and distributing Office Macro Builders. 

read more


News Bewertung

Weiterlesen Weiterlesen

DataSpii: the catastrophic data leak via browser extensions

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

DataSpii: the catastrophic data leak via browser extensions submitted by /u/WhooisWhoo
[link] [comments]

News Bewertung

Weiterlesen Weiterlesen

Finaler Trailer zu 'Es 2': Clown Pennywise lehrt uns das Fürchten

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: winfuture.de Direktlink direkt öffnen

Trailer, Kinofilm, Kino, Warner Bros., Horror, ES, Pennywise, Stephen King, Es - Kapitel 2 Die Neuverfilmung von Stephen Kings Horrorroman "Es" war 2017 einer der erfolgreichsten Kinofilme des Jahres. Kommenden September muss sich dann der Klub der Verlierer ein weiteres Mal zusammenfinden, denn der unheimliche Clown Pennywise treibt anscheinend erneut in der Kleinstadt Derry sein Unwesen. Vorab wurde nun ein neuer und zugleich auch letzter Trailer vor dem Kinostart gezeigt. (Weiter lesen)
News Bewertung

Weiterlesen Weiterlesen

Emulator 29.1.6 Canary

Zur Kategorie wechselnProgrammierung vom | Quelle: androidstudio.googleblog.com Direktlink direkt öffnen

Emulator 29.1.6 is now available in the Canary and Dev channels. Change:
  • Fixed issue where virtual scene camera would show a black screen.
Update on BSOD on Windows with Q Beta 5 system images

News Bewertung

Weiterlesen Weiterlesen

Roll20 brings pen-and-paper gameplay to your browser with features that save time and enhance your favorite parts of tabletop games.

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

Roll20 brings pen-and-paper gameplay to your browser with features that save time and enhance your favorite parts of tabletop games. submitted by /u/RonaldvanderMeer
[link] [comments]

News Bewertung

Weiterlesen Weiterlesen

Why Incident Response Must Adopt a Kill Chain Perspective

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: feedproxy.google.com Direktlink direkt öffnen

Even as incident response (IR) has evolved, it has struggled to see beyond individual events and create a more complete perspective. IR tools are still very effective, particularly as advances in orchestration and automation technology have turned many IR tools into SOAR tools, but they are limited by this narrow focus.

read more


News Bewertung

Weiterlesen Weiterlesen

Israel Spyware Firm Can Mine Data From Social Media: FT

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: feedproxy.google.com Direktlink direkt öffnen

An Israeli spyware firm thought to have hacked WhatsApp in the past has told clients it can scoop user data from the world's top social media, the Financial Times reported Friday.

read more


News Bewertung

Weiterlesen Weiterlesen

AVM verbessert Access Point Steering für den FritzRepeater 3000

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: winfuture.de Direktlink direkt öffnen

Avm, WLAN-Repeater, FritzRepeater, Repeater 3000, Repeater 1200, Repeater 600, Repeater 2400 Zum Wochenende gibt es wieder einmal eine neue experimentelle FritzOS-Labor-Version für alle freiwilligen Tester des Beta-Programms: Die Internet-Spezialisten von AVM haben dieses Mal ein Update für den FritzRepeater 3000 veröffentlicht. (Weiter lesen)
News Bewertung

Weiterlesen Weiterlesen

Tech Unemployment Hits 19-Year Low

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: news.slashdot.org Direktlink direkt öffnen

New submitter SpaceForceCommander writes: Tech unemployment hasn't been this low since the turn of the century, according to U.S. Bureau of Labor Statistics (BLS) data crunched by CompTIA. As of May, tech's unemployment rate sat at 1.3 percent. "There is now the very real prospect of tech worker shortages affecting industry growth," Tim Herbert, executive vice president for research and market intelligence at CompTIA, wrote in a statement accompanying the data. "Firms seeking to expand into new areas such as the Internet of Things, robotic process automation or artificial intelligence may be inhibited by a lack of workers with these advanced skills, not to mention shortages in the complementary areas of technology infrastructure and cybersecurity." Tech's unemployment rate previously hit 1.4 percent, in April 2007 and March 2018. (The BLS began measuring occupation-level employment data in January 2000.) However, not all segments within tech are adding jobs at the same rate; although custom software development and computer systems design gained 8,400 new positions in May, for example, both information services and telecommunications saw modest losses. Meanwhile, new data from PayScale suggests that wages within the tech industry grew 2.3 percent year-over-year in the second quarter of 2019. That's an indicator that the low unemployment rate is forcing employers to pay more in order to secure the talent they need.

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

Microsoft Launches Bug Bounty Program for Dynamics 365

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: feedproxy.google.com Direktlink direkt öffnen

Microsoft launches new bug bounty program for Dynamics 365

read more


News Bewertung

Weiterlesen Weiterlesen

Preview of Availability Zones for your Kubernetes cluster in Azure | Azure Friday

Zur Kategorie wechselnProgrammierung vom | Quelle: channel9.msdn.com Direktlink direkt öffnen

Justin Luk joins Scott Hanselman to discuss AKS preview features and enabling new functionality like Virtual Machine Scale Set node pools and Availability Zones. Availability Zones (AZ) is a high availability offering from Azure that protects applications and data from datacenter failures. By using AZ with Azure Kubernetes Service (AKS), you will get higher reliability and resiliency for your applications running on Kubernetes.


News Bewertung

Weiterlesen Weiterlesen

Google Increase Chrome OS Bounty Program Up-to $150,000

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: hackersonlineclub.com Direktlink direkt öffnen

Google Chrome Bug Bounty ProgramGoogle security increase their rewards for Bug Bounty Hunters up to $30000 and for chrome OS $150,000. Google also increase rewards for fuzz testing,...

The post Google Increase Chrome OS Bounty Program Up-to $150,000 appeared first on HackersOnlineClub.


News Bewertung

Weiterlesen Weiterlesen

TLS-Zertifikat: Gesamter Internetverkehr in Kasachstan kann überwacht werden

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: golem.de Direktlink direkt öffnen

In Kasachstan müssen Internetnutzer ab sofort ein spezielles TLS-Zertifikat installieren, um verschlüsselte Webseiten aufrufen zu können. Das Zertifikat ermöglicht eine staatliche Überwachung des gesamten Internetverkehrs in dem Land. (Man-in-the-Middle, Sicherheitslücke)
News Bewertung

Weiterlesen Weiterlesen

RYUK Ransomware debuts in China

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: cybersecurity-insiders.com Direktlink direkt öffnen

Hackers spreading RYUK Ransomware in the United States have now shifted their base to China. Well, this update was given by the Tencent Yujian Threat Intelligence Center which adds that the virus spreading gangs have already targeted 7 Logistics companies and 2 technology companies along with a few municipalities so far demanding 11 Bitcoins as […]

The post RYUK Ransomware debuts in China appeared first on Cybersecurity Insiders.


News Bewertung

Weiterlesen Weiterlesen

Marvel Ultimate Alliance 3: Superhelden-Crossover im Launch-Trailer

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: winfuture.de Direktlink direkt öffnen

Trailer, Nintendo, actionspiel, Nintendo Switch, Marvel, Comic-Con, San Diego ComicCon, SDCC, Sdcc 2019, Marvel Ultimate Alliance 3, Marvel Ultimate Alliance 3: The Black Order, The Black Order Ab heute ist Marvel Ultimate Alliance 3: The Black Order exklusiv für die Nintendo Switch erhältlich. Passend dazu hat Nintendo den offiziellen Veröffentlichungstrailer freigegeben, der Ausschnitte aus dem actionreichen Marvel-Crossover zeigt. In Marvel Ultimate Alliance 3: The Black Order stellen Spieler ihr eigenes Superhelden-Team zusammen, um dieses anschließend in den Kampf gegen Thanos zu schicken. Wer möchte, kann dabei auf bewährte Teams wie die X-Men oder Avengers setzen oder beliebig ... (Weiter lesen)
News Bewertung

Weiterlesen Weiterlesen

Chrome/Firefox itself are leaking Data!

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

Hey sec community,

a quick update about my last post, you can find it on my profile,

I find out that chrome and Firefox itself are leaking data, but the shocking news is for whom those browsers are leaking data!!!

read the post at Forbes: https://www.forbes.com/sites/kateoflahertyuk/2019/07/19/data-leak-warning-issued-to-millions-of-google-chrome-and-firefox-users

upvote this thread, maybe Google Devs will notice ;)

submitted by /u/drwalidsaib
[link] [comments]
News Bewertung

Weiterlesen Weiterlesen

Diesmal mit Plan: Chinesische Raumstation wurde zum Absturz gebracht

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: winfuture.de Direktlink direkt öffnen

Weltraum, Weltall, All, Tiangong-2 Die chinesische Raumstation Tiangong-2 ist in die Erdatmosphäre gestürzt. Im Gegensatz zum Vorgänger war das Ende der Raumstation diesmal aber ganz gezielt eingeleitet worden. Der Großteil des Weltraum-Labors ist beim Wiedereintritt verglüht, einige Teile sind aber in den Pazifik gestürzt. (Weiter lesen)
News Bewertung

Weiterlesen Weiterlesen

Researchers Easily Trick Security Firm Cylance's AI-Based Antivirus Into Thinking Programs Like WannaCry and Other Malware Are Benign

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: it.slashdot.org Direktlink direkt öffnen

By taking strings from an online gaming program and appending them to malicious files, researchers were able to trick Cylance's AI-based antivirus engine into thinking programs like WannaCry and other malware are benign. From a report: AI has been touted by some in the security community as the silver bullet in malware detection. Its proponents say it's superior to traditional antivirus since it can catch new variants and never-before-seen malware -- think zero-day exploits -- that are the Achilles heel of antivirus. One of its biggest proponents is the security firm BlackBerry Cylance, which has staked its business model on the artificial intelligence engine in its endpoint PROTECT detection system, which the company says has the ability to detect new malicious files two years before their authors even create them. But researchers in Australia say they've found a way to subvert the machine-learning algorithm in PROTECT and cause it to falsely tag already known malware as "goodware." The method doesn't involve altering the malicious code, as hackers generally do to evade detection. Instead, the researchers developed a "global bypass" method that works with almost any malware to fool the Cylance engine. It involves simply taking strings from a non-malicious file and appending them to a malicious one, tricking the system into thinking the malicious file is benign. The benign strings they used came from an online gaming program, which they have declined to name publicly so that Cylance will have a chance to fix the problem before hackers exploit it. "As far as I know, this is a world-first, proven global attack on the ML [machine learning] mechanism of a security company," says Adi Ashkenazy, CEO of the Sydney-based company Skylight Cyber, who conducted the research with CTO Shahar Zini. "After around four years of super hype [about AI], I think this is a humbling example of how the approach provides a new attack surface that was not possible with legacy [antivirus software]."

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

Weary Eyes And Fictitious Faces: Why Fingerprints Are Best For Biometric Authentication

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: informationsecuritybuzz.com Direktlink direkt öffnen

Biometric technology is already revolutionising both physical and cyber-security in the UK. While the latest breakthroughs are impressive, we’re only just touching the tip of the iceberg. Regardless of which method we’re using – whether it is fingerprint, facial, retinal or voice recognition solutions – there is no escaping the fact that biometric developments have been incorporated …

The ISBuzz Post: This Post Weary Eyes And Fictitious Faces: Why Fingerprints Are Best For Biometric Authentication appeared first on Information Security Buzz.


News Bewertung

Weiterlesen Weiterlesen

Kazakhstan Government Filtering Civilian Internet Browsing

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: hackercombat.com Direktlink direkt öffnen

North Korea, China, and Iran, just three countries that we can easily remember as having government regimes that seriously censor the Internet. These territories implement state-level Internet traffic filtering that...

The post Kazakhstan Government Filtering Civilian Internet Browsing appeared first on .


News Bewertung

Weiterlesen Weiterlesen

Ex-NSA Contractor to Be Sentenced in Stolen Documents Case

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: feedproxy.google.com Direktlink direkt öffnen

A former National Security Agency contractor awaits sentencing in Baltimore’s federal court for storing two decades’ worth of classified documents at his Maryland home.

read more


News Bewertung

Weiterlesen Weiterlesen

19714(20190719)

Zur Kategorie wechselnMalware / Trojaner / Viren vom | Quelle: virusradar.com Direktlink direkt öffnen

Update database signature 19714(20190719)
News Bewertung

Weiterlesen Weiterlesen

Recommended Online Masters Programs?

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

I am looking for an online masters program in Cybersecurity or related discipline. Does anyone have any first hand recommendations?

I have a non-technical Bachelors degree but working in the field now. I am not looking to become an engineer or drastically change careers. I am just looking to understand Cybersecurity more, maybe more more towards government work in the future, and/or obtain a management role.

Some of the programs I have been looking at are: Virginia Tech Masters Information Technology, Liberty MS Cybersecurity, Penn Masters Computer and Information Technology, George Washington M.eng. Cybersecurity Policy & Compliance, Syracuse MS Cybersecurity, Georgia Tech MS Cybersecurity.

submitted by /u/spartyon11
[link] [comments]
News Bewertung

Weiterlesen Weiterlesen

Free Analytical Tools you can use today.... For Free!

Zur Kategorie wechselnIT Security Video vom | Quelle: youtube.com Direktlink direkt öffnen


News Bewertung

Weiterlesen Weiterlesen

Google Increases Bug Bounty Program Rewards

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: feedproxy.google.com Direktlink direkt öffnen

Google on Thursday informed security researchers that they can now earn significantly higher rewards if they submit vulnerability reports through the company’s bug bounty programs.

read more


News Bewertung

Weiterlesen Weiterlesen

Gamer enttäuscht: Google Stadia soll kein "Netflix für Spiele" sein

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: winfuture.de Direktlink direkt öffnen

Google, Gaming, Spiele, Streaming, Cloud, Games, Google Stadia Auf Reddit beantwortete Google viele Fragen zu seinem kommenden Cloud-Gaming-Dienst Stadia. Dabei räumte man mit den Gerüchten auf, welche besagt hatten, die Streaming-Plattform werde ein Abo-Service in der Art eines "Netflix für Spiele". Dem soll nämlich nicht so sein. (Weiter lesen)
News Bewertung

Weiterlesen Weiterlesen

China's Tech Giants Have a Second Job: Helping Beijing Spy on Its People

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: yro.slashdot.org Direktlink direkt öffnen

Tencent and Alibaba are among the firms that assist authorities in hunting down criminal suspects, silencing dissent and creating surveillance cities. From a report: Alibaba Group's sprawling campus has collegial workspaces, laid-back coffee bars and, on the landscaped grounds, a police outpost. Employees use the office to report suspected crimes to the police, according to people familiar with the operation. Police also use it to request data from Alibaba for their own investigations, these people said, tapping into the trove of information the tech giant collects through its e-commerce and financial-payment networks. In one case, the police wanted to find out who had posted content related to terrorism, said a former Alibaba employee. "They came to me and asked me for the user ID and information," he recalled. He turned it over. The Chinese government is building one of the world's most sophisticated, high-tech systems to keep watch over its citizens, including surveillance cameras, facial-recognition technology and vast computers systems that comb through terabytes of data. Central to its efforts are the country's biggest technology companies, which are openly acting as the government's eyes and ears in cyberspace. Companies including Alibaba Group Holding, Tencent Holdings and Baidu, are required to help China's government hunt down criminal suspects and silence political dissent. Their technology is also being used to create cities wired for surveillance.

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

Seitennavigation

Seite 1 von 6.161 Seiten (Bei Beitrag 1 - 35)
215.624x Beiträge in dieser Kategorie

Nächste 2 Seite | Letzte Seite

[ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ]