1. IT-Security

ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese
Anzeige

IT-Security


Suchen

EU-DSGVO: Innentäter abwehren, nicht Mitarbeiter überwachen

IT Security Nachrichten vom 18.02.2018 um 05:45 Uhr | Quelle searchsecurity.de
Die Datenschutz-Grundverordnung und das neue Bundes-Datenschutzgesetz sehen einen besonderen Datenschutz für Beschäftigte vor. Aktuelle Gerichtsurteile bestärken dies.
News bewerten

Weiterlesen Artikel ansehen

An Ethereum Startup Just Vanished After People Invested $374K

IT Security Nachrichten vom 20.11.2017 um 23:00 Uhr | Quelle news.slashdot.org
An anonymous reader quotes a report from Motherboard: A startup on the Ethereum platform vanished from the internet on Sunday after raising $374,000 USD from investors in an Initial Coin Offering (ICO) fundraiser. Confido is a startup that pitched itself as a blockchain-based app for making payments and tracking shipments. It sold digital tokens to investors over the Ethereum blockchain in an ICO that ran from November 6 to 8. During the token sale, Confido sold people bespoke digital tokens that represent their investment in exchange for ether, Ethereum's digital currency. But on Sunday, the company unceremoniously deleted its Twitter account and took down its website. A company representative posted a brief comment to the company's now-private subforum on Reddit, citing legal problems that prevent the Confido team from continuing their work. The same message was also posted to Medium but quickly deleted. "Right now, we are in a tight spot, as we are having legal trouble caused by a contract we signed," the message stated (a cached version of the Medium post is viewable). "It is likely that we will be able to find a solution to rectify the situation. However, we cannot assure you with 100% certainty that we will get through this." The message was apparently written by Confido's founder, one Joost van Doorn, who seems to have no internet presence besides a now-removed LinkedIn profile. Even the Confido representative on Reddit doesn't seem to know what's going on, though, posting hours after the initial message, "Look I have absolutely no idea what has happened here. The removal of all of our social media platforms and website has come as a complete surprise to me." Confido tokens had a market cap of $10 million last week, before the company disappeared, but now the tokens are worthless. And investors are crying foul.

Read more of this story at Slashdot.


News bewerten

Weiterlesen Artikel ansehen

Amazon Launches a Cloud Service For US Intelligence Agencies

IT Security Nachrichten vom 20.11.2017 um 22:20 Uhr | Quelle hardware.slashdot.org
Amazon Web Services on Monday introduced cloud service for the CIA and other members of the U.S. intelligence community. From a report: The launch of the so-called AWS Secret Region comes six years after AWS introduced GovCloud, its first data center region for public sector customers. AWS has since announced plans to expand GovCloud. The new Secret Region signals interest in using AWS from specific parts of the U.S. government. In 2013 news outlets reported on a $600 million contract between AWS and the CIA. That event singlehandledly helped Amazon in its effort to sign up large companies to use its cloud, whose core services have been available since 2006.

Read more of this story at Slashdot.


News bewerten

Weiterlesen Artikel ansehen

CCleaner jetzt mit Werbung: Avast Antivirus wird mit installiert

IT Security Nachrichten vom 20.11.2017 um 22:11 Uhr | Quelle winfuture.de
Tool, Ccleaner, Wartung, festplattenanalyse Der Softwarehersteller Avast hat nach der Übernahme des kleineren Anbieters Piriform begonnen, dessen beliebtes Tool CCleaner zu Werbezwecken zu nutzen, um so die hauseigene kostenlose Antivirus-Lösung an den Mann zu bringen. Ab sofort wird bei der Installation von CCleaner automatisch Avast Antivirus mitinstalliert - es sei denn der Nutzer greift ein. (Weiter lesen)
News bewerten

Weiterlesen Artikel ansehen

Getting Back into 3D Printing - Hak5 2310

IT Security Video vom 20.11.2017 um 21:45 Uhr | Quelle youtube.com

News bewerten

Weiterlesen Artikel ansehen

Apple Could Have Brought a Big iPhone X Feature To Older iPhone But Didn't, Developer Says

IT Security Nachrichten vom 20.11.2017 um 21:40 Uhr | Quelle mobile.slashdot.org
Steven Troughton-Smith, a prominent iOS developer best known for combing new software codes for references for upcoming features, over the weekend indicated that portrait mode lighting effects, a major feature in the current iPhone generation -- iPhone 8 Plus, and iPhone X, could technically be added to iPhone 7 Plus from last year. The feature works like this: you take a picture, go to the photos app on your new iPhone and play with the "Lighting" effects. He writes: So yeah you just need to hexedit the metadata in the HEIC. Not quite sure where, I copied a whole section from an iPhone X Portrait Mode photo and it worked. Original photo taken on 7 Plus on iOS 11. Someone could automate this. Just to add insult to injury, if you AirDrop that photo back to the iPhone 7 Plus now it shows the Portrait Lighting UI, and lets you change mode. So Portrait Lighting is 100% an artificial software limitation. 7 Plus photos can have it, 7 Plus can do it.

Read more of this story at Slashdot.


News bewerten

Weiterlesen Artikel ansehen

How To DDoS - Xerxes - The Most Powerful DoS Tool

IT Security Video vom 20.11.2017 um 21:32 Uhr | Quelle youtube.com

News bewerten

Weiterlesen Artikel ansehen

Staingate: Apple verlängert und erweitert MacBook-Austauschprogramm

IT Security Nachrichten vom 20.11.2017 um 21:24 Uhr | Quelle winfuture.de
Macbook, defekt, Staingate, Display-Defekt Apple verlängert noch einmal die Möglichkeit des kostenlosen Austauschs für sich ablösende Display-Beschichtungen bei verschiedenen MacBooks. Der unter dem Namen "Staingate" bekannt gewordenen Fehler scheint doch weiter verbreitet zu sein, als zunächst angenommen. (Weiter lesen)
News bewerten

Weiterlesen Artikel ansehen

http://www.rdcyusipang.gov.bt

Hacking vom 20.11.2017 um 21:08 Uhr | Quelle zone-h.org
http://www.rdcyusipang.gov.bt notified by ErrOr SquaD
News bewerten

Weiterlesen Artikel ansehen

It was El Reg wot won it: Bing banishes bogus Brit bank banner ad

IT Security Nachrichten vom 20.11.2017 um 21:06 Uhr | Quelle go.theregister.com

Link to fake TSB site canned after we help raise alarm

Microsoft has axed a Bing search result advert that masqueraded as a legit online banking website – but was in fact a sophisticated phishing operation.…


News bewerten

Weiterlesen Artikel ansehen

Eric Schmidt Says Google News Will 'Engineer' Russian Propaganda Out of the Feed

IT Security Nachrichten vom 20.11.2017 um 21:00 Uhr | Quelle tech.slashdot.org
Justin Ling, writing for Motherboard: Eric Schmidt, Executive Chariman of Alphabet, says the company is working to ferret out Russian propaganda from Google News after facing criticism that Kremlin-owned media sites had been given plum placement on the search giant's news and advertising platforms. "We're well aware of this one, and we're working on detecting this kind of scenario you're describing and deranking those kinds of sites," Schmidt said, after being asked why the world's largest search company continued to classify the Russian sites as news. Schmidt, in an interview at the Halifax International Security Forum over the weekend, name-checked two state-owned enterprises. "It's basically RT and Sputnik," Schmidt added. "We're well aware and we're trying to engineer the systems to prevent it."

Read more of this story at Slashdot.


News bewerten

Weiterlesen Artikel ansehen

Wi-Fi Encryption - Secure Digital Life #39

IT Security Video vom 20.11.2017 um 20:57 Uhr | Quelle youtube.com

News bewerten

Weiterlesen Artikel ansehen

BMW i3: Crashtest führt zu US-Verkaufsstopp und Rückrufaktion

IT Security Nachrichten vom 20.11.2017 um 20:56 Uhr | Quelle winfuture.de
BMW, Elektroauto, I3 BMW ruft alle in den USA verkauften i3s zurück und wird den Vertrieb bis auf weiteres einzufrieren. Das Fahrzeug konnte die strengen Vorgaben eines Crashtests nicht erfüllen, bei dem eine nicht angeschnallte Dummy-Puppe zum Einsatz kommt. (Weiter lesen)
News bewerten

Weiterlesen Artikel ansehen

http://www.nationalmuseum.gov.bt

Hacking vom 20.11.2017 um 20:50 Uhr | Quelle zone-h.org
http://www.nationalmuseum.gov.bt notified by ErrOr SquaD
News bewerten

Weiterlesen Artikel ansehen

http://www.cfm.gov.bt

Hacking vom 20.11.2017 um 20:49 Uhr | Quelle zone-h.org
http://www.cfm.gov.bt notified by ErrOr SquaD
News bewerten

Weiterlesen Artikel ansehen

Amazon Echo and Google Home patched against BlueBorne threat

IT Security Nachrichten vom 20.11.2017 um 20:42 Uhr | Quelle nakedsecurity.sophos.com
The attack doesn't require the targeted to be paired to the attacker’s device, or to be in discoverable mode
News bewerten

Weiterlesen Artikel ansehen

Windows 10 S: Laptops mit dem neuen Betriebssystem jetzt ab 179 Euro

IT Security Nachrichten vom 20.11.2017 um 20:35 Uhr | Quelle winfuture.de
Windows 10, Logo, Schule, Bildung, Windows 10 S Microsoft hat Windows 10 S bereits mit dem Surface Laptop eingeführt, doch bisher ließen die Geräte von Drittherstellern noch immer auf sich warten. Eigentlich war von Ende Oktober als Termin für die Verfügbarkeit die Rede, doch daraus wurde nichts. Jetzt ist es soweit, denn die ersten Laptops und sogar 2-in-1-Geräte mit Windows 10 S sind im deutschen Handel angekommen. (Weiter lesen)
News bewerten

Weiterlesen Artikel ansehen

Secureworks Releases Open Source IDS Tools

IT Security Nachrichten vom 20.11.2017 um 20:31 Uhr | Quelle feedproxy.google.com

Secureworks has released two open source tools, Flowsynth and Dalton, designed to help analysts test rules for intrusion detection systems (IDS) and intrusion prevention systems (IPS) such as Snort and Suricata.

read more


News bewerten

Weiterlesen Artikel ansehen

Plump & dreist: BankBot-Trojaner nimmt deutsche Konten ins Visier

IT Security Nachrichten vom 20.11.2017 um 20:31 Uhr | Quelle winfuture.de
Google, Play Store, Android 8, Play Protect Sicherheitsforscher warnen, dass der Trojaner BankBot auch deutsche Nutzer von Online-Banking-Apps ins Visier nimmt. Um der Schadsoftware, die sich in kleinen Android-Apps versteckt, zum Opfer zu fallen, müssen wie so oft aber viele Warnhinweise übersehen werden. (Weiter lesen)
News bewerten

Weiterlesen Artikel ansehen

Dark Side of Gig Economy: Some Instacart Workers Go On Strike Over Pay That Can Be as Low as $1 Per Hour

IT Security Nachrichten vom 20.11.2017 um 20:20 Uhr | Quelle news.slashdot.org
From a report: Instacart shoppers and drivers -- the people who gather your groceries and deliver them to you after you order via the Instacart app -- are on strike. While independent contractors can't technically strike, via a Facebook group some of the company's thousands of employees have organized a "no delivery day" in the hopes of getting higher wages, the San Francisco Chronicle reports. The strike is only taking place in a few of the 154 cities nationwide that Instacart operates in. The action may be small, but the grievances are big. While Instacart, the 5-year-old San Francisco startup, is valued at $3.4 billion, it allegedly pays its workers as little as $1 per order. Ars Technica has a great breakdown of all the issues surrounding how Instacart employees get paid and it's complex, with three different income streams coming together Voltron-like to form a wage. The result, though, is that some shoppers are being paid less than the federal minimum wage, like a Jackson, Miss., worker who put in a 19-hour week in Jackson, Mississippi, that paid out $37.75 (roughly $2/hour). That's far below the $14/hour wage that Ars Technica says Instacart is targeting.

Read more of this story at Slashdot.


News bewerten

Weiterlesen Artikel ansehen

Bipartisan Harvard-Gremium empfiehlt, Sicherheitsvorkehrungen für Wahlen zu hacken.

Hacking vom 20.11.2017 um 20:18 Uhr | Quelle google.com
SAN FRANCISCO, 20. November – Ein überparteiliches Projekt der Harvard University, das darauf abzielt, Wahlen vor Hacking und Propaganda zu schützen, wird heute seine ersten Empfehlungen veröffentlichen, wie US-Wahlen vor Hacking-Angriffen geschützt werden können. Der 27-seitige ...
News bewerten

Weiterlesen Artikel ansehen

Dealing With Data Loss Your Firewall Can't Stop

IT Security Nachrichten vom 20.11.2017 um 20:12 Uhr | Quelle feedproxy.google.com

Information security is built on the pillars of confidentiality, integrity, and availability. Confidentiality is about making sure your secrets stay secret.

read more


News bewerten

Weiterlesen Artikel ansehen

http://www.mfd.gov.np

Hacking vom 20.11.2017 um 20:12 Uhr | Quelle zone-h.org
http://www.mfd.gov.np notified by Dark Terr0rist
News bewerten

Weiterlesen Artikel ansehen

Another Tor Browser Feature Makes It Into Firefox: First-Party Isolation

IT Security Nachrichten vom 20.11.2017 um 19:41 Uhr | Quelle news.slashdot.org
An anonymous reader writes: Unbeknown to most users, Mozilla added a privacy-enhancing feature to the Firefox browser over the summer that can help users block online advertisers from tracking them across the Internet. The feature is named First-Party Isolation (FPI) and was silently added to the Firefox browser in August, with the release of Firefox 55. FPI works by separating cookies on a per-domain basis. This is important because most online advertisers drop a cookie on the user's computer for each site the user visits and the advertisers loads an ad. With FPI enabled, the ad tracker won't be able to see all the cookies it dropped on that user's PC, but only the cookie created for the domain the user is currently viewing. This will force the ad tracker to create a new user profile for each site the user visits and the advertiser won't be able to aggregate these cookies and the user's browsing history into one big fat profile. This feature was first implemented in the Tor Browser, a privacy-focused fork of the Firefox browser managed by the Tor Project, where it is known as Cross-Origin Identifier Unlinkability. FPI was added to Firefox as part of the Tor Uplift project, an initiative to bolster the Firefox codebase with some of the Tor Browser's unique privacy-focused features. The feature is not enabled by default. Information on how to enable it is in the linked article.

Read more of this story at Slashdot.


News bewerten

Weiterlesen Artikel ansehen

US intelligence can’t break vulnerability hoarding habit

IT Security Nachrichten vom 20.11.2017 um 19:28 Uhr | Quelle nakedsecurity.sophos.com
Vulnerabilities: keep them secret as a weapon against the bad guys or tell the world so we can all get patched?
News bewerten

Weiterlesen Artikel ansehen

Verwirrung um Apps: iPhone & iPad und Co. erhalten Update-Flut

IT Security Nachrichten vom 20.11.2017 um 19:25 Uhr | Quelle winfuture.de
Apple, Apps, App Store, Appstore Viele Nutzer von iPhone, iPad und AppleTV erleben seit dem Wochenende eine Flut an Updates, die für Apps über den App Store ausgeliefert werden. Da die Entwickler aber keine Neuerungen bereitgestellt haben, hat wohl Apple bei den Anwendungen Zertifikate erneuert. (Weiter lesen)
News bewerten

Weiterlesen Artikel ansehen

CENTCOM Says Massive Data Cache Found on Leaky Server is Benign

IT Security Nachrichten vom 20.11.2017 um 19:15 Uhr | Quelle threatpost.com
Pentagon contractor left 1.8 billion mostly benign publicly accessible social-media posts scraped from the internet on a publicly accessible Amazon storage bucket.
News bewerten

Weiterlesen Artikel ansehen

RDPY – RDP Security Tool For Hacking Remote Desktop Protocol

IT Security Nachrichten vom 20.11.2017 um 19:05 Uhr | Quelle darknet.org.uk
RDPY – RDP Security Tool For Hacking Remote Desktop Protocol

RDPY is an RDP Security Tool in Twisted Python with RDP Man in the Middle proxy support which can record sessions and Honeypot functionality.

RDPY is a pure Python implementation of the Microsoft RDP (Remote Desktop Protocol) protocol (client and server side). RDPY is built over the event driven network engine Twisted. RDPY support standard RDP security layer, RDP over SSL and NLA authentication (through ntlmv2 authentication protocol).

RDPY RDP Security Tool Features

RDPY provides the following RDP and VNC binaries:

  • RDP Man In The Middle proxy which record session
  • RDP Honeypot
  • RDP Screenshoter
  • RDP Client
  • VNC Client
  • VNC Screenshoter
  • RSS Player

RDPY is fully implemented in python, except the bitmap decompression algorithm which is implemented in C for performance purposes.

Read the rest of RDPY – RDP Security Tool For Hacking Remote Desktop Protocol now! Only available at Darknet.


News bewerten

Weiterlesen Artikel ansehen

Deep Learning Is Eating Software

IT Security Nachrichten vom 20.11.2017 um 19:00 Uhr | Quelle developers.slashdot.org
Pete Warden, engineer and CTO of Jetpac, shares his view on how deep learning is already starting to change some of the programming is done. From a blog post, shared by a reader last week: The pattern is that there's an existing software project doing data processing using explicit programming logic, and the team charged with maintaining it find they can replace it with a deep-learning-based solution. I can only point to examples within Alphabet that we've made public, like upgrading search ranking, data center energy usage, language translation, and solving Go, but these aren't rare exceptions internally. What I see is that almost any data processing system with non-trivial logic can be improved significantly by applying modern machine learning. This might sound less than dramatic when put in those terms, but it's a radical change in how we build software. Instead of writing and maintaining intricate, layered tangles of logic, the developer has to become a teacher, a curator of training data and an analyst of results. This is very, very different than the programming I was taught in school, but what gets me most excited is that it should be far more accessible than traditional coding, once the tooling catches up. The essence of the process is providing a lot of examples of inputs, and what you expect for the outputs. This doesn't require the same technical skills as traditional programming, but it does need a deep knowledge of the problem domain. That means motivated users of the software will be able to play much more of a direct role in building it than has ever been possible. In essence, the users are writing their own user stories and feeding them into the machinery to build what they want.

Read more of this story at Slashdot.


News bewerten

Weiterlesen Artikel ansehen

Nikon D850: Neues DSLR-Flaggschiff mit 45 Megapixel-Sensor

IT Security Nachrichten vom 20.11.2017 um 18:37 Uhr | Quelle winfuture.de
Kamera, ValueTech, Digitalkamera, Dslr, Nikon, D850 Bei den Smartphones scheint das Megapixel-Rennen ein wenig vorbei zu sein. Immer höher auflösende Sensoren sind ohnehin nur sinnvoll, wenn trotzdem noch immer genug Licht-Teilchen auf jedem Bildpunkt des Sensors landen. Möglich ist das allerdings bei den lichtstarken Optiken von DSLRs. Und Nikon hat hier ein neues Flaggschiff am Start: Die D850 bringt einen Sensor mit 45 Megapixeln mit. Und was das so bringt, können euch die Kollegen von ValueTech TV zeigen. (Weiter lesen)
News bewerten

Weiterlesen Artikel ansehen

Germany slaps ban on kids' smartwatches for being 'secret spyware'

IT Security Nachrichten vom 20.11.2017 um 18:35 Uhr | Quelle go.theregister.com

Hands up, whose parents are listening in on this class?

The German telecoms regulator has banned the sale of children's smartwatches that allow users to secretly listen in on nearby conversations.…


News bewerten

Weiterlesen Artikel ansehen

The Secret to Tech's Next Big Breakthroughs? Stacking Chips

IT Security Nachrichten vom 20.11.2017 um 18:20 Uhr | Quelle hardware.slashdot.org
Christopher Mims, writing for the Wall Street Journal: A funny thing is happening to the most basic building blocks of nearly all our devices. Microchips, which are usually thin and flat, are being stacked like pancakes (Editor's note: the link could be paywalled). Chip designers -- now playing with depth, not just length and width -- are discovering a variety of unexpected dividends in performance, power consumption and capabilities. Without this technology, the Apple Watch wouldn't be possible. Nor would the most advanced solid-state memory from Samsung, artificial-intelligence systems from Nvidia and Google, or Sony's crazy-fast next-gen camera. Think of this 3-D stacking as urban planning. Without it, you have sprawl -- microchips spread across circuit boards, getting farther and farther apart as more components are needed. But once you start stacking chips, you get a silicon cityscape, with everything in closer proximity. The advantage is simple physics: When electrons have to travel long distances through copper wires, it takes more power, produces heat and reduces bandwidth. Stacked chips are more efficient, run cooler and communicate across much shorter interconnections at lightning speed, says Greg Yeric, director of future silicon technology for ARM Research, part of microchip design firm ARM.

Read more of this story at Slashdot.


News bewerten

Weiterlesen Artikel ansehen

Windows feiert Geburtstag: Ein Rückblick auf 32 Jahre Erfolgsgeschichte

IT Security Nachrichten vom 20.11.2017 um 18:15 Uhr | Quelle winfuture.de
Microsoft, Betriebssystem, Logo, Windows 95 Microsoft feiert heute den 32. Geburtstag von Windows, denn am 20. November 1985 kam mit Windows 1.0 die erste Version des heute am weitesten verbreiteten und bisher kommerziell erfolgreichsten Be­triebs­sys­tems der Welt auf den Markt. (Weiter lesen)
News bewerten

Weiterlesen Artikel ansehen

BankBot Returns On Play Store – A Never Ending Android Malware Story

IT Security Nachrichten vom 20.11.2017 um 18:13 Uhr | Quelle feedproxy.google.com
Even after so many efforts by Google for making its Play Store away from malware, shady apps somehow managed to fool its anti-malware protections and infect people with malicious software. A team of researchers from several security firms has uncovered two new malware campaigns targeting Google Play Store users, of which one spreads a new version of BankBot, a persistent family of banking

News bewerten

Weiterlesen Artikel ansehen

http://bomberosbalao.gob.ec

Hacking vom 20.11.2017 um 18:12 Uhr | Quelle zone-h.org
http://bomberosbalao.gob.ec notified by ToP-TeaM
News bewerten

Weiterlesen Artikel ansehen

Seitennavigation

Seite 1 von 2.384 Seiten (Bei Beitrag 1 - 35)
83.409x Beiträge in dieser Kategorie

Nächste 2 Seite | Letzte Seite