1. IT-Security


ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese

IT-Security


Suchen

News RSS Quellen: 212x
News Kategorien unterhalb von IT-Security: 9x
News RSS Feeds dieser IT-Security Kategorie: RSS Feed IT Security
Benutze Feedly zum Abonieren.Folge uns auf feedly
Download RSS Feed App für Windows 10 Store (Leider gibt es nicht mehr viele Extensions mit welchen Sie RSS-Feeds in einer Software abonieren können. Der Browser Support für RSS-Feeds wurde eingestellt (Firefox,Chrome).

Eigene IT Security Webseite / Blog / Quelle hinzufügen

Seitennavigation

Seite 1 von 5.787 Seiten (Bei Beitrag 1 - 35)
202.527x Beiträge in dieser Kategorie

Nächste 2 Seite | Letzte Seite

[ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ]

WHO Officially Classifies 'Gaming Disorder' As An Illness

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: yro.slashdot.org Direktlink direkt öffnen

Saturday the World Health Organization officially adopted the latest update to its International Classification of Diseases (ICD) -- and added "gaming disorder" to its list of modern diseases. It's in a list of harmful behaviors which also includes too much use of "the internet, computers, smartphones." Despite opposition from trade groups, which reportedly pointed to contradictory research on the subject and touted some of the virtues of video games, the latest ICD was officially approved at the 72nd World Health Assembly.... It's described as "a pattern of persistent or recurrent gaming behavior, which may be online or offline, manifested by impaired control over gaming, increasing priority given to gaming to the extent that gaming takes precedence over other life interests and daily activities and continuation or escalation of gaming despite the occurrence of negative consequences." The issue of gaming addiction isn't new: The American Psychiatric Association still has it listed as up for discussion (PDF) in the latest version of its diagnostic bible, the DSM-5.

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

Microsoft Teams With Alphabet's X and Brilliant For Online Quantum Computing Class

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: developers.slashdot.org Direktlink direkt öffnen

"Learn to build quantum algorithms from the ground up with a quantum computer simulated in your browser," suggests a new online course. "The very concept of a quantum computer can be daunting, let alone programming it, but Microsoft thinks it can offer a helping hand," reports Engadget: Microsoft is partnering with Alphabet's X and Brilliant on an online curriculum for quantum computing. The course starts with basic concepts and gradually introduces you to Microsoft's Q# language, teaching you how to write 'simple' quantum algorithms before moving on to truly complicated scenarios. You can handle everything on the web (including quantum circuit puzzles), and there's a simulator to verify that you're on the right track. The course "features Q# programming exercises with Python as the host language," explains Microsoft's press release. The course's web page promises that by the end of the course, "you'll know your way around the world of quantum information, have experimented with the ins and outs of quantum circuits, and have written your first 100 lines of quantum code -- while remaining blissfully ignorant about detailed quantum physics."

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

All The Latest Features of the Windows 10 May 2019 Update

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: bleepingcomputer.com Direktlink direkt öffnen

As with any major feature update, Microsoft brings new applications and features to Windows 10. The Windows 10 May 2019 Update is no different with new features such as the Windows Sandbox to test untrusted apps, a new Light Theme experience, and a decoupled Windows Search and Cortana. [...]
News Bewertung

Weiterlesen Weiterlesen

DSSuite: A Docker Container With My Tools

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: blog.didierstevens.com Direktlink direkt öffnen

I want to thank Xavier Mertens for creating a Docker container with my tools (GitHub): DSSuite. Details can be found in ISC diary entry “DSSuite – A Docker Container with Didier’s Tools“.
News Bewertung

Weiterlesen Weiterlesen

HPR2821: Interviewing some exhibitors at the 2019 vcfe.org event

Zur Kategorie wechselnPodcasts vom | Quelle: hackerpublicradio.org Direktlink direkt öffnen

I visited the vcfe.org event in Munich, Germany.

Below you will find some urls for the projects that I came across.

If you like these things, the next exhibition will be in September in Berlin (you can find more info on vcfb.de).

Regards, Jeroen Baten


News Bewertung

Weiterlesen Weiterlesen

Intense scanning activity detected for BlueKeep RDP flaw

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: zdnet.com Direktlink direkt öffnen

A threat actor hidden behind Tor nodes is scanning for Windows systems vulnerable to BlueKeep flaw.
News Bewertung

Weiterlesen Weiterlesen

Does changing veracrypt password compromise securty in any way ?

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

So, I have encrypted my HD drive with veracrypt and by mistake I have created a complex password which is somewhat hard to remember.

So, No one has access to my password or my disk/container/volume / whatever.

I just want to change my password so that I can remember it easily.

Will it compromise securty in anyway ?

submitted by /u/wordiscucked
[link] [comments]
News Bewertung

Weiterlesen Weiterlesen

Elon Musk on Twitter: 'Trains Should Be On Surface, Cars Below'

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: tech.slashdot.org Direktlink direkt öffnen

An anonymous reader writes: The SFGate site reports that Elon Musk engaged in a "bizarre Twitter fight" after someone suggested underground tunnels were better for trains than cars. "Opposite is true," Musk argued. "You can have 100's of layers of tunnels, but only one layer on surface (to first approximation), therefore trains should be on surface, cars below." Underground, he noted later, "you can have as many lanes as you want going in any direction." San Francisco transit authorities then pointed out that their high-capacity BART trains carry 28,000 people every hour through a tube under the San Francisco Bay, adding "That's nearly twice as much as cars over the bay." This being Twitter, BART "was attacked by a number of Musk fans and other BART critics, and was forced to defend everything from the odor on cars to the amount of public money the agency receives."

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

BlueKeep RCE Vulnerability in Remote Desktop Protocol Let Hackers Hijack Target Computers Without Login Credentials

Zur Kategorie wechselnHacking vom | Quelle: gbhackers.com Direktlink direkt öffnen

BlueKeep

Bluekeep a wormable critical RCE vulnerability in Remote desktop services let hackers access the vulnerable machine without authentication. As vulnerability is wormable, it could rapidly compromise millions of machine in a short period. Successful exploitation of the vulnerability allows a remote attacker to run arbitrary code on the target system, and the attacker can install […]

The post BlueKeep RCE Vulnerability in Remote Desktop Protocol Let Hackers Hijack Target Computers Without Login Credentials appeared first on GBHackers On Security.


News Bewertung

Weiterlesen Weiterlesen

'Boring Company' Video Suggests Company Is Abandoning Underground Rails

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: tech.slashdot.org Direktlink direkt öffnen

An anonymous reader quotes Business Insider: Shortly after news broke that Elon Musk's Boring Company landed its first tunnel-building project in Las Vegas, it released a video of two Teslas racing in its tunnel near Los Angeles -- one using the roads, and the other using a Boring Company tunnel. The Tesla in the tunnel took one minute and 36 seconds to get to the destination, reaching 127 mph, the video, posted early Friday, showed. The car using the roads arrived in four minutes and 45 seconds, after getting stuck at a red light. The video revealed that the Boring Company had done away with a key element of the tunnel's original design: rails that guide the car. The video revealed that a key element of the design of the Boring Company's 1.14-mile test tunnel in Hawthorne had changed. This demonstration of the tunnel differed from earlier ones in which cars were whisked along on rails. Replying to a tweet asking whether there were no more rails and the car was driving on Autopilot, Tesla's semi-autonomous driver-assist system, Musk said, "Pretty much." When asked why the original rail system had been abandoned, Musk added, "This is simple and just works." The automotive site Jalopnik complains this misses the dream of a vacuum-based hyperloop system transporting speedy proprietary vehicles on frictionless electrified skates: Yes, for those keeping score, in a mere two years we've gone from a futuristic vision of electric skates zooming around a variety of vehicles in a network of underground tunnels to -- and I cannot stress this enough -- a very small, paved tunnel that can fit one (1) car. The video's marketing conceit is that the car in the tunnel beats a car trying to go the same distance on roads. You'll never believe this, but the car that has a dedicated right of way wins... To recap: Musk's company spent two years developing a very narrow car tunnel.

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

HCL Exposed Sensitive Data, Passwords In Plain Text Across Its Subdomains

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: latesthackingnews.com Direktlink direkt öffnen

Data leakages do not always occur through unsecured databases. Such incidents can also result due to other flaws. Most recently

HCL Exposed Sensitive Data, Passwords In Plain Text Across Its Subdomains on Latest Hacking News.


News Bewertung

Weiterlesen Weiterlesen

H2Buster - A Threaded, Recursive, Web Directory Brute-Force Scanner Over HTTP/2

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: feedproxy.google.com Direktlink direkt öffnen


A threaded, recursive, web directory brute-force scanner over HTTP/2 using hyper, inspired by Gobuster.

Features
  • Fast and portable - install hyper and run.
  • Multiconnection scanning.
  • Multithreaded connections.
  • Scalable: scans can be as docile or aggressive as you configure them to be.
  • h2 and h2c support.
  • Configurable directory recursion depth.

Install
You only need to install one dependency. If you don't have hyper, run:
pip3 install -r requirements.txt

Usage
usage: h2buster.py [-h] -w wordlist -u target [-r directory_depth]
[-c connections] [-t threads]

h2buster: an HTTP/2 web directory brute-force scanner.

arguments:
-h, --help show this help message and exit
-w wordlist Directory wordlist
-u target Target URL/IP address. Default port is 443 and HTTPS
enabled. To specify otherwise, use ':port' or 'http://'
(port will default to 80 then).
-r directory_depth Maximum recursive directory depth. Minimum is 1, default
is 2, unlimited is 0.
-c connections Number of HTTP/2 connections. Default is 3.
-t threads Number of threads per connection. Default is 15.



News Bewertung

Weiterlesen Weiterlesen

How a Professor Beat Roulette, Crediting a Non-Existent Supercomputer

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: science.slashdot.org Direktlink direkt öffnen

I loved this story. The Hustle remembers how in 1964 a world-renowned medical professor found a way to beat roulette wheels, kicking off a five-year winning streak in which he amassed $1,250,000 ($8,000,000 today). He noticed that at the end of each night, casinos would replace cards and dice with fresh sets -- but the expensive roulette wheels went untouched and often stayed in service for decades before being replaced. Like any other machine, these wheels acquired wear and tear. Jarecki began to suspect that tiny defects -- chips, dents, scratches, unlevel surfaces -- might cause certain wheels to land on certain numbers more frequently than randomocity prescribed. The doctor spent weekends commuting between the operating table and the roulette table, manually recording thousands upon thousands of spins, and analyzing the data for statistical abnormalities. "I [experimented] until I had a rough outline of a system based on the previous winning numbers," he told the Sydney Morning Herald in 1969. "If numbers 1, 2, and 3 won the last 3 rounds, [I could determine] what was most likely to win the next 3...." With his wife, Carol, he scouted dozens of wheels at casinos around Europe, from Monte Carlo (Monaco), to Divonne-les-Bains (France), to Baden-Baden (Germany). The pair recruited a team of 8 "clockers" who posted up at these venues, sometimes recording as many as 20,000 spins over a month-long period. Then, in 1964, he made his first strike. After establishing which wheels were biased, he secured a £25,000 loan from a Swiss financier and spent 6 months candidly exacting his strategy. By the end of the run, he'd netted £625,000 (roughly $6,700,000 today). Jarecki's victories made headlines in newspapers all over the world, from Kansas to Australia. Everyone wanted his "secret" -- but he knew that if he wanted to replicate the feat, he'd have to conceal his true methodology. So, he concocted a "fanciful tale" for the press: He tallied roulette outcomes daily, then fed the information into an Atlas supercomputer, which told him which numbers to pick. At the time, wrote gambling historian, Russell Barnhart, in Beating the Wheel, "Computers were looked upon as creatures from outer space... Few persons, including casino managers, were vocationally qualified to distinguish myth from reality." Hiding behind this technological ruse, Jarecki continued to keep tabs on biased tables -- and prepare for his next big move... In the decades following Jarecki's dominance, casinos invested heavily in monitoring their roulette tables for defects and building wheels less prone to bias. Today, most wheels have gone digital, run by algorithms programmed to favor the house.

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

'The Future of AT&T Is An Ad-tracking Nightmare Hellworld'

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: slashdot.org Direktlink direkt öffnen

There's something scary in Fortune's new article about AT&T: "Say you and your neighbor are both DirecTV customers and you're watching the same live program at the same time," says Brian Lesser, who oversees the vast data-crunching operation that supports this kind of advertising at AT&T. "We can now dynamically change the advertising. Maybe your neighbor's in the market for a vacation, so they get a vacation ad. You're in the market for a car, you get a car ad. If you're watching on your phone, and you're not at home, we can customize that and maybe you get an ad specific to a car retailer in that location." Such targeting has caused privacy headaches for Yahoo, Google, and Facebook, of course. That's why AT&T requires that customers give permission for use of their data; like those other companies, it anonymizes that data and groups it into audiences -- for example, consumers likely to be shopping for a pickup truck -- rather than targeting specific individuals. Regardless of how you see a directed car ad, say, AT&T can then use geolocation data from your phone to see if you went to a dealership and possibly use data from the automaker to see if you signed up for a test-drive -- and then tell the automaker, "Here's the specific ROI on that advertising," says Lesser. AT&T claims marketers are paying four times the usual rate for that kind of advertising. "This is a terrifying vision of permanent surveillance," argues the Verge (in an article shared by schwit1): In order to make this work, AT&T would have to: - Own the video services you're watching so it can dynamically place targeted ads in your streams - Collect and maintain a dataset of your personal information and interests so it can determine when it should target this car ad to you - Know when you're watching something so it can actually target the ads - Track your location using your phone and combine it with the ad-targeting data to see if you visit a dealership after you see the ads - Collect even more data about you from the dealership to determine if you took a test-drive - Do all of this tracking and data collection repeatedly and simultaneously for every ad you see - Aggregate all of that data in some way for salespeople to show clients and justify a 4x premium over other kinds of advertising, including the already scary-targeted ads from Google and Facebook. If this was a story about Mark Zuckerberg and Facebook, this scheme would cause a week-long outrage cycle... AT&T can claim up and down that it's asked for permission to use customer information to do this, but there is simply no possible way the average customer has ever even read their AT&T contracts, let alone puzzled out that they're signing up to be permanently tracked and influenced by targeted media in this way.

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

Why So Many Businesses Can Never Recover After Cyber Attacks

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: hackread.com Direktlink direkt öffnen

By Uzair Amir

A cyber attack can cripple critical infrastructure and businesses and generate negative press. In other cases, it could open you and your business to litigation. This and other factors can seriously hurt a business, and it forces many of them to pay for data recovery or IT security services to undo the damage. However, many […]

This is a post from HackRead.com Read the original post: Why So Many Businesses Can Never Recover After Cyber Attacks


News Bewertung

Weiterlesen Weiterlesen

http://www.cnv.gov.py/index.htm

Zur Kategorie wechselnHacking vom | Quelle: zone-h.org Direktlink direkt öffnen

http://www.cnv.gov.py/index.htm notified by TUNOVATO
News Bewertung

Weiterlesen Weiterlesen

Google's breaches of privacy have gone TOO FAR!

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

Google's breaches of privacy have gone TOO FAR! submitted by /u/mynameisalex1
[link] [comments]

News Bewertung

Weiterlesen Weiterlesen

Google's breaches of privacy have gone TOO FAR!

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

Google's breaches of privacy have gone TOO FAR! submitted by /u/mynameisalex1
[link] [comments]

News Bewertung

Weiterlesen Weiterlesen

19420(20190526)

Zur Kategorie wechselnMalware / Trojaner / Viren vom | Quelle: virusradar.com Direktlink direkt öffnen

Update database signature 19420(20190526)
News Bewertung

Weiterlesen Weiterlesen

19420(20190526)

Zur Kategorie wechselnMalware / Trojaner / Viren vom | Quelle: virusradar.com Direktlink direkt öffnen

Update database signature 19420(20190526)
News Bewertung

Weiterlesen Weiterlesen

Xbox Two vs PlayStation 5: Which console is winning the race of anticipation?

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: hackread.com Direktlink direkt öffnen

By Uzair Amir

Excitement is mounting among gamers as Microsoft and Sony continue to tease tantalizing details of their upcoming next-generation console releases. The PlayStation 5 is expected to launch towards the end of 2020 and lead architect Mark Cerny has already revealed details of the powerful specs that fans can look forward to. The current consensus among […]

This is a post from HackRead.com Read the original post: Xbox Two vs PlayStation 5: Which console is winning the race of anticipation?


News Bewertung

Weiterlesen Weiterlesen

Xbox Two vs PlayStation 5: Which console is winning the race of anticipation?

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: hackread.com Direktlink direkt öffnen

By Uzair Amir

Excitement is mounting among gamers as Microsoft and Sony continue to tease tantalizing details of their upcoming next-generation console releases. The PlayStation 5 is expected to launch towards the end of 2020 and lead architect Mark Cerny has already revealed details of the powerful specs that fans can look forward to. The current consensus among […]

This is a post from HackRead.com Read the original post: Xbox Two vs PlayStation 5: Which console is winning the race of anticipation?


News Bewertung

Weiterlesen Weiterlesen

http://burukab.go.id

Zur Kategorie wechselnHacking vom | Quelle: zone-h.org Direktlink direkt öffnen

http://burukab.go.id notified by A-jaX
News Bewertung

Weiterlesen Weiterlesen

In A World First, Scientists Change Snail's Shell-Coiling Direction With CRISPR

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: science.slashdot.org Direktlink direkt öffnen

"Most snails are 'righties'. Now scientists have found genes that can change the shell coiling direction," writes the New York Times. ( Non-paywalled version here ) Suren Enfiajyan shares their report: Studying these snails offers clues to the evolution of body plans in many animals. It also could be important for understanding why up to 10 percent of people are born with sinus inversus, a condition where their internal organs are flipped like a lefty snail's shell. Now scientists are turning to Crispr -- the powerful gene editing tool -- to figure out why some snails turn out this way. A team in Japan led by Reiko Kuroda, a chemist and biologist, has successfully used the technique to manipulate a single gene responsible for shell direction in a species of great pond snail. The research, published last week in the journal Development, offers definitive proof of the genetic underpinnings of handedness in this species, and could lead to clues about left- and right-handed mysteries in other organisms. "Ten years ago you might not imagine there were any similarities in the left/right asymmetry of a snail and the left/right asymmetry of humans. But it's becoming increasingly obvious that is the case," said Angus Davison, an evolutionary geneticist, who has studied chiral pond snails, but was not a part of Dr. Kuroda's study... In the current study, Dr. Kuroda and Masanori Abe used Crispr to edit out the Lsdia1 gene, and then raised the resulting mutant snails. Confirming previous work, they showed that even in the first embryonic cell, genetic information started picking sides. And by the third cleavage, when four cells become eight, the mutant cells were rotating in the opposite direction of what is expected. These snails grew into lefties, and so did their offspring. Without two working copies of Lsdia1, snails can survive with Lsdia2 -- but their shells won't coil to the right. In the article Dr. Davison says that there's still more research to do. "Unfortunately, snail research doesn't move quickly."

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

In A World First, Scientists Change Snail's Shell-Coiling Direction With CRISPR

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: science.slashdot.org Direktlink direkt öffnen

"Most snails are 'righties'. Now scientists have found genes that can change the shell coiling direction," writes the New York Times. ( Non-paywalled version here ) Suren Enfiajyan shares their report: Studying these snails offers clues to the evolution of body plans in many animals. It also could be important for understanding why up to 10 percent of people are born with sinus inversus, a condition where their internal organs are flipped like a lefty snail's shell. Now scientists are turning to Crispr -- the powerful gene editing tool -- to figure out why some snails turn out this way. A team in Japan led by Reiko Kuroda, a chemist and biologist, has successfully used the technique to manipulate a single gene responsible for shell direction in a species of great pond snail. The research, published last week in the journal Development, offers definitive proof of the genetic underpinnings of handedness in this species, and could lead to clues about left- and right-handed mysteries in other organisms. "Ten years ago you might not imagine there were any similarities in the left/right asymmetry of a snail and the left/right asymmetry of humans. But it's becoming increasingly obvious that is the case," said Angus Davison, an evolutionary geneticist, who has studied chiral pond snails, but was not a part of Dr. Kuroda's study... In the current study, Dr. Kuroda and Masanori Abe used Crispr to edit out the Lsdia1 gene, and then raised the resulting mutant snails. Confirming previous work, they showed that even in the first embryonic cell, genetic information started picking sides. And by the third cleavage, when four cells become eight, the mutant cells were rotating in the opposite direction of what is expected. These snails grew into lefties, and so did their offspring. Without two working copies of Lsdia1, snails can survive with Lsdia2 -- but their shells won't coil to the right. In the article Dr. Davison says that there's still more research to do. "Unfortunately, snail research doesn't move quickly."

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

Will Disney+ Destroy Netflix?

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: entertainment.slashdot.org Direktlink direkt öffnen

"Netflix has 175 days left to pull off a miracle... or it's all over," argues a headline at Forbes for an article by the chief analyst at disruption research firm RiskHedge: Netflix is not the future of TV. Netflix changed how we watch TV, but it didn't really change what we watch... Netflix has achieved its incredible growth by taking distribution away from cable companies. Instead of watching The Office on cable, people now watch The Office on Netflix. This edge isn't sustainable. In a world where you can watch practically anything whenever you want, dominance in distribution is very fragile. Because the internet has opened up a whole world of choice, featuring great exclusive content is now far more important than anything else... Netflix management knows content is king. The company spent $12 billion developing original shows last year... To fund its new shows, Netflix is borrowing huge sums of debt. It currently owes creditors $10.4 billion, which is 59% more than it owed this time last year. The problem is that no matter how much Netflix spends, it has no chance to catch up with its biggest rival... in about 175 days, Disney is set to launch its own streaming service called Disney+. It's going to charge $6.99/month -- around $6 cheaper than Netflix. And it's pulling all its content off of Netflix. This is a big deal. Disney owns Marvel, Pixar Animations, Star Wars, ESPN, National Geographic, Modern Family, and The Simpsons. Not to mention all the classic characters like Mickey Mouse and Donald Duck. In six of the past seven years, Disney has produced the world's top-selling movie... Disney has shown it can produce movies and shows people want to watch. No competitor comes within 1,000 miles of Disney's world of content. Disney's ownership of iconic franchises like Star Wars gives it something no money can buy. Meanwhile, Netflix will lose a lot of its best content -- and potentially millions of subscribers who switch to Disney+. While Netflix is running into debt "trying out" new shows, Disney already has the best of the best in its arsenal.

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

Mozilla Patched 16 Security Flaws With Thunderbird 60.7

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: latesthackingnews.com Direktlink direkt öffnen

Mozilla has rolled-out the latest release of their Thunderbird email client with numerous security fixes. This month’s update carries the

Mozilla Patched 16 Security Flaws With Thunderbird 60.7 on Latest Hacking News.


News Bewertung

Weiterlesen Weiterlesen

Prolific Hacker SandboxEscaper Demos Windows 10 Zero-Day Exploit

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: hackercombat.com Direktlink direkt öffnen

Since 2015, Microsoft casually declared that Windows 10 is the last version of Windows, as Redmond geared-up on making their operating system a software-as-a-service (SAAS). It will forever be marketed...

The post Prolific Hacker SandboxEscaper Demos Windows 10 Zero-Day Exploit appeared first on .


News Bewertung

Weiterlesen Weiterlesen

Europawahlen: Schwere Verluste für Union und SPD, hohe Gewinne für Grüne

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: golem.de Direktlink direkt öffnen

Bei der Europawahl 2019 haben die Regierungsparteien Union und SPD historisch schlecht abgeschnitten. Besonders profitieren konnten die Grünen. Während die Piraten Stimmen verloren, legte eine andere Kleinstpartei besonders stark zu. (Europawahl 2019, Urheberrecht)
News Bewertung

Weiterlesen Weiterlesen

http://www.pka.gov.my/Eg.htm

Zur Kategorie wechselnHacking vom | Quelle: zone-h.org Direktlink direkt öffnen

http://www.pka.gov.my/Eg.htm notified by mohamed.xo
News Bewertung

Weiterlesen Weiterlesen

New Bitcoin Scam Leads to Ransomware and Info-Stealing Trojans

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: bleepingcomputer.com Direktlink direkt öffnen

A series of web sites are pushing a scam promising $5-30 worth of free bitcoins a day simply by running their Bitcoin Collector program. In reality, this program does nothing but install ransomware or password-stealing Trojans onto a victim's computer. [...]
News Bewertung

Weiterlesen Weiterlesen

MIDI Association Explains 'Capability Inquiry' Features In MIDI 2.0

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: entertainment.slashdot.org Direktlink direkt öffnen

Friday the MIDI Association published an introduction to MIDI 2.0, describing updates to the already-evolving 36-year-old standard, including MIDI-CI, Profiles and Property Exchange: MIDI 2.0 updates MIDI with new auto-configuration, extended resolution, increased expressiveness, and tighter timing -- all while maintaining a high priority on backward compatibility. This major update of MIDI paves the way for a new generation of advanced interconnected MIDI devices, while still preserving interoperability with the millions of existing MIDI 1.0 devices. One of the core goals of MIDI 2.0 is to also enhance the MIDI 1.0 feature set whenever possible. The additional capabilities that MIDI 2.0 brings to devices are enabled by MIDI-Capability Inquiry (MIDI-CI). The basic idea is that if devices have a bidirectional connection, they can exchange their capabilities with each other. Devices can share their configuration and what MIDI functions are supported. Devices use a bidirectional link to configure MIDI features when both devices agree to support that feature. MIDI-CI discovers and configures device features using three categories of inquiry: Profile Configuration, Property Exchange, and Protocol Negotiation. If a device does not support any new features, it uses the MIDI 1.0 as usual. Devices connected to that device will continue to use MIDI 1.0 in communication with that device... MIDI 2.0 has a new Universal MIDI Packet format for carrying MIDI 1.0 Protocol messages and MIDI 2.0 Protocol messages... The foundational specification, MIDI-CI has been published and is available for download. Other key MIDI 2.0 specifications are nearing completion in the MIDI Manufacturers Association. But it will take several years to write numerous Profile and Property Exchange specifications to follow.... [W]e do not expect any MIDI 2.0 products to be released in 2019. For MIDI to be fully useable, the industry needs devices, applications, operating systems, and DAWs to support these new specifications. It will take time for a whole system of devices to be available. The post emphasizes that the original MIDI 1.0 "is not being replaced. Rather it is being extended and is expected to continue, well integrated with the new MIDI 2.0 environment. It is part of the Universal MIDI Packet, the fundamental MIDI data format... "MIDI 2.0 is just part of the evolution of MIDI that has gone on for 36 years. The step by step evolution continues."

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

Web Hosting Guide: Top 5 Features Of Cloud Hosting For Websites

Zur Kategorie wechselnIT Security Tools vom | Quelle: articlesoffer.com Direktlink direkt öffnen

In the world of technology, cloud hosting/service has a huge impact on the success of a business. Today, where a website serves as an online platform for a company to …

The post Web Hosting Guide: Top 5 Features Of Cloud Hosting For Websites appeared first on .


News Bewertung

Weiterlesen Weiterlesen

What If We Could Reuse The Packaging on Consumer Products?

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: news.slashdot.org Direktlink direkt öffnen

"The shampoo bottle, the deodorant stick, razors and even your toothbrush -- they all get thrown away when they're empty or worn out. But if they were reusable -- or refillable -- just imagine how much waste could be avoided." That's how Bloomberg describes the new "Loop" initiative being tested for one year by the New Jersey recycling company TerraCycle: This week, Loop began its U.S. trial, allowing consumers to use steel, glass and durable plastic reusable packaging for everyday items. Kroger Co. and Walgreens, along with such consumer brands as Procter & Gamble, Nestle, The Clorox Co. and Unilever, are taking part... For the trial, Loop is available online to customers in New York, New Jersey and Pennsylvania. You can order products made by the participating companies that will be delivered to you in special reusable packaging. Under the program, manufacturers have redesigned product containers for some of their most well-known products. Loop will collect a refundable deposit, sometimes $5 to $10, that customers will get back when they return their containers. UPS will pick up your empties for no additional charge... Procter & Gamble has unveiled its Crest mouthwash in a sleek glass bottle -- with a rubber base to prevent breakage. It also has non-electric Oral B toothbrushes that have a head that pops off so users can keep the base and replace the brush. But it was the stainless steel ice cream container for Nestle's Haagen-Dazs (which isn't too cold to the touch but keeps ice cream cool longer) that was the crowd favorite at a Manhattan rollout this week.... During Loop's trial, returned containers will go to New Jersey and then Pennsylvania for washing, then back to the companies' factories for refilling... [W]hile reusable packaging may require more energy and materials when first made, Tom Szaky, chief executive of TerraCycle, said the carbon cost becomes equal to that of disposable packaging after just two or three uses. His goal, he said, is to produce items that can be reused 100 times... Szaky explained that Loop is all about bringing back the milkman model, where glass bottles of milk were left on your porch, and you put the empties there to be picked up... "We want you to see Loop packaging 50 years from now still going around," Szaky said.

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

WhatsApp Adverts To Begin in 2020, But What About End-To-End Encryption?

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: latesthackingnews.com Direktlink direkt öffnen

Despite a seemingly never-ending trail of blunders, glitches, and privacy breaches at Facebook, people still trust WhatsApp. However, as revealed

WhatsApp Adverts To Begin in 2020, But What About End-To-End Encryption? on Latest Hacking News.


News Bewertung

Weiterlesen Weiterlesen

Seitennavigation

Seite 1 von 5.787 Seiten (Bei Beitrag 1 - 35)
202.527x Beiträge in dieser Kategorie

Nächste 2 Seite | Letzte Seite

[ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ]