1. IT-Security


ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese
Anzeige

IT-Security


Suchen

Best Practices gegen Man-in-the-Cloud-Attacken

IT Security Nachrichten vom 19.01.2019 um 06:22 Uhr | Quelle it-daily.net

Das Nutzen von Cloud-Services gehört für die Mehrheit der Unternehmen längst zum festen Bestandteil der IT-Strategie. Die Möglichkeit des Datenzugriffs jederzeit und überall bringt zahlreiche Vorteile mit sich, allen voran verbesserte Flexibilität und erhöhte Produktivität.


Newsbewertung

Weiterlesen

Pirate Bay Downloaders Beware!! – Hackers Launching Dangerous Malware are via Torrent Files

Hacking vom 19.01.2019 um 05:55 Uhr | Quelle gbhackers.com
piratebay

Piratebay users are now being victimized by malware and phishing attack that hijacking the websites and steal the cryptocurrencies. A researcher who was trying to download a torrent from Piratebay, a torrent file drops .LNK shortcut file contained a CozyBear malware along with dangerous PowerShell commands. Piratebay is one of the worlds leading torrents site with […]

The post Pirate Bay Downloaders Beware!! – Hackers Launching Dangerous Malware are via Torrent Files appeared first on GBHackers On Security.


Newsbewertung

Weiterlesen

Pirate Bay Downloaders Beware!! – Hackers Launching Dangerous Malware are via Torrent Files

Hacking vom 19.01.2019 um 05:55 Uhr | Quelle gbhackers.com
piratebay

Piratebay users are now being victimized by malware and phishing attack that hijacking the websites and steal the cryptocurrencies. A researcher who was trying to download a torrent from Piratebay, a torrent file drops .LNK shortcut file contained a CozyBear malware along with dangerous PowerShell commands. Piratebay is one of the worlds leading torrents site with […]

The post Pirate Bay Downloaders Beware!! – Hackers Launching Dangerous Malware are via Torrent Files appeared first on GBHackers On Security.


Newsbewertung

Weiterlesen

Wie man in fünf Schritten Projektballast abwirft

IT Security Nachrichten vom 19.01.2019 um 05:50 Uhr | Quelle it-daily.net

Gerade im Jahresendspurt nimmt die Projektbelastung häufig zu. Die Betroffenen suchen nach Hilfestellungen, um ihren Alltag zu vereinfachen und die Effizienz in der Projektarbeit zu verbessern. Denn wächst die Effizienz, sparen die Projektbeteiligten Zeit und ihre Zufriedenheit steigt.


Newsbewertung

Weiterlesen

Can Anyone Really Track My Phone’s Precise Location?

IT Security Nachrichten vom 19.01.2019 um 05:41 Uhr | Quelle reddit.com
Can Anyone Really Track My Phone’s Precise Location? submitted by /u/wentzeldk
[link] [comments]

Newsbewertung

Weiterlesen

Please Advice

IT Security Nachrichten vom 19.01.2019 um 04:30 Uhr | Quelle reddit.com

Hello, I was wondering if you could give me some advice for any of the following questions to create a Red Team SOW

  1. Description of testing methodology
  2. How the respondent verifies findings are not false positives
  3. what is the time range for included remediation testing.
  4. Is it common to create video recordings of the exploits if needed?
  5. Is it common to provide phone support to demonstrate vulnerabilities or remediation suggestions?
  6. Describe the depth of the testing to be performed.
  7. Company methodology for training staff.
  8. Commercial or custom tools proposed to be used for testing.
  9. How you validate potential vulnerabilities with the intent to limit false positives.

Thank you :)

submitted by /u/c3cure
[link] [comments]
Newsbewertung

Weiterlesen

Researchers Created Artificial Cells That Can Communicate With Each Other

IT Security Nachrichten vom 19.01.2019 um 04:30 Uhr | Quelle science.slashdot.org
An anonymous reader quotes a report from Phys.Org: Friedrich Simmel and Aurore Dupin, researchers at the Technical University of Munich (TUM), have for the first time created artificial cell assemblies that can communicate with each other. The cells, separated by fatty membranes, exchange small chemical signaling molecules to trigger more complex reactions, such as the production of RNA and other proteins. Scientists around the world are working on creating artificial, cell-like systems that mimic the behavior of living organisms. Friedrich Simmel and Aurore Dupin have created such artificial cell assemblies in a fixed spatial arrangement. The highlight is that the cells are able to communicate with each other. Gels or emulsion droplets encapsulated in thin fat or polymer membranes serve as the basic building blocks for the artificial cells. Inside these 10- to 100-micron units, chemical and biochemical reactions can proceed uninhibited. The research team used droplets enclosed by lipid membranes and assembled them into artificial multicellular structures called micro-tissues. The biochemical reaction solutions used in the droplets can produce RNA and proteins, giving the cells a of a kind of gene expression ability. Small signal molecules can be exchanged between cells via their membranes or protein channels built into the membranes. This allows them to couple with each other temporally and spatially. The systems thus become dynamic, as in real life. Chemical pulses thus propagate through the cell structures and pass on information. The signals can also act as triggers, allowing initially identical cells to develop differently. "Our system is the first example of a multicellular system in which artificial cells with gene expression have a fixed arrangement and are coupled via chemical signals. In this way, we achieved a form of spatial differentiation," says Friedrich Simmel, Professor of Physics of Synthetic Biosystems at Technical University of Munich.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

http://sapoin-mtech.go.jp/BD.html

Hacking vom 19.01.2019 um 04:25 Uhr | Quelle zone-h.org
http://sapoin-mtech.go.jp/BD.html notified by ErrOr SquaD
Newsbewertung

Weiterlesen

http://srapune.gov.in/hero.htm

Hacking vom 19.01.2019 um 04:02 Uhr | Quelle zone-h.org
http://srapune.gov.in/hero.htm notified by ./Ikari404
Newsbewertung

Weiterlesen

Google Faces Renewed Protests and Criticism Over China Search Project

IT Security Nachrichten vom 19.01.2019 um 03:45 Uhr | Quelle tech.slashdot.org
On Friday, a coalition of Chinese, Tibetan, Uighur, and human rights groups organized demonstrations outside Google's offices in the U.S., U.K., Canada, India, Mexico, Chile, Argentina, Sweden, Switzerland, and Denmark, protesting the company's plan to launch a censored version of its search engine in China. The Intercept reports: Google designed the Chinese search engine, code-named Dragonfly, to blacklist information about human rights, democracy, religion, and peaceful protest, in accordance with strict rules on censorship in China that are enforced by the country's authoritarian Communist Party government. In December, The Intercept revealed that an internal dispute had forced Google to shut down a data analysis system that it was using to develop the search engine. This had "effectively ended" the project, sources said, because the company's engineers no longer had the tools they needed to build it. But Google bosses have not publicly stated that they will cease development of Dragonfly. And the company's CEO Sundar Pichai has refused to rule out potentially launching the search engine some time in the future, though he has insisted that there are no current plans to do so. The organizers of Friday's protests -- which were timed to coincide with Internet Freedom Day -- said that they would continue to demonstrate "until Google executives confirm that Project Dragonfly has been canceled, once and for all." Google "should be connecting the world through the sharing of information, not facilitating human rights abuses by a repressive government determined to crush all forms of peaceful online dissent," said Gloria Montgomery, director at Tibet Society UK. "Google's directors must urgently take heed of calls from employees and tens of thousands of global citizens demanding that they immediately halt project Dragonfly. If they don't, Google risks irreversible damage to its reputation."

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Firmware Vulnerability In Popular Wi-Fi Chipset Affects Laptops, Smartphones, Routers, Gaming Devices

IT Security Nachrichten vom 19.01.2019 um 03:03 Uhr | Quelle it.slashdot.org
Embedi security researcher Denis Selianin has discovered a vulnerability affecting the firmware of a popular Wi-Fi chipset deployed in a wide range of devices, such as laptops, smartphones, gaming rigs, routers, and Internet of Things (IoT) devices. According to Selianin, the vulnerability impacts ThreadX, a real-time operating system that is used as firmware for billions of devices. ZDNet reports: In a report published today, Selianin described how someone could exploit the ThreadX firmware installed on a Marvell Avastar 88W8897 wireless chipset to execute malicious code without any user interaction. The researcher chose this WiFi SoC (system-on-a-chip) because this is one of the most popular WiFi chipsets on the market, being deployed with devices such as Sony PlayStation 4, Xbox One, Microsoft Surface laptops, Samsung Chromebooks, Samsung Galaxy J1 smartphones, and Valve SteamLink cast devices, just to name a few. "I've managed to identify ~4 total memory corruption issues in some parts of the firmware," said Selianin. "One of the discovered vulnerabilities was a special case of ThreadX block pool overflow. This vulnerability can be triggered without user interaction during the scanning for available networks." The researcher says the firmware function to scan for new WiFi networks launches automatically every five minutes, making exploitation trivial. All an attacker has to do is send malformed WiFi packets to any device with a Marvell Avastar WiFi chipset and wait until the function launches, to execute malicious code and take over the device. Selianin says he also "identified two methods of exploiting this technique, one that is specific to Marvell's own implementation of the ThreadX firmware, and one that is generic and can be applied to any ThreadX-based firmware, which, according to the ThreatX homepage, could impact as much as 6.2 billion devices," the report says. Patches are reportedly being worked on.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Identical Twins Test 5 DNA Ancestry Kits, Get Different Results On Each

IT Security Nachrichten vom 19.01.2019 um 02:25 Uhr | Quelle science.slashdot.org
Freshly Exhumed writes: Uh-oh, something is not right with the results of most popular DNA ancestry kits, as a pair of identical twins have found. Charlsie Agro and her twin sister, Carly, bought home kits from AncestryDNA, MyHeritage, 23andMe, FamilyTreeDNA and Living DNA, and mailed samples of their DNA to each company for analysis. Despite having virtually identical DNA, the twins did not receive matching results from any of the companies. "The fact that they present different results for you and your sister, I find very mystifying," said Dr. Mark Gerstein, a computational biologist at Yale University. Gerstein's team analyzed the results, and he asserts that any results the Agro twins received from the same DNA testing company should have been identical. The raw data collected from both sisters' DNA is nearly exactly the same. "It's shockingly similar," he said.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Identical Twins Test 5 DNA Ancestry Kits, Get Different Results On Each

IT Security Nachrichten vom 19.01.2019 um 02:25 Uhr | Quelle science.slashdot.org
Freshly Exhumed writes: Uh-oh, something is not right with the results of most popular DNA ancestry kits, as a pair of identical twins have found. Charlsie Agro and her twin sister, Carly, bought home kits from AncestryDNA, MyHeritage, 23andMe, FamilyTreeDNA and Living DNA, and mailed samples of their DNA to each company for analysis. Despite having virtually identical DNA, the twins did not receive matching results from any of the companies. "The fact that they present different results for you and your sister, I find very mystifying," said Dr. Mark Gerstein, a computational biologist at Yale University. Gerstein's team analyzed the results, and he asserts that any results the Agro twins received from the same DNA testing company should have been identical. The raw data collected from both sisters' DNA is nearly exactly the same. "It's shockingly similar," he said.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Giving Algorithms a Sense of Uncertainty Could Make Them More Ethical

IT Security Nachrichten vom 19.01.2019 um 01:45 Uhr | Quelle developers.slashdot.org
An anonymous reader quotes a report from MIT Technology Review: Algorithms are increasingly being used to make ethical decisions. They are built to pursue a single mathematical goal, such as maximizing the number of soldiers' lives saved or minimizing the number of civilian deaths. When you start dealing with multiple, often competing, objectives or try to account for intangibles like "freedom" and "well-being," a satisfactory mathematical solution doesn't always exist. "We as humans want multiple incompatible things," says Peter Eckersley, the director of research for the Partnership on AI, who recently released a paper that explores this issue. "There are many high-stakes situations where it's actually inappropriate -- perhaps dangerous -- to program in a single objective function that tries to describe your ethics." These solutionless dilemmas aren't specific to algorithms. Ethicists have studied them for decades and refer to them as impossibility theorems. So when Eckersley first recognized their applications to artificial intelligence, he borrowed an idea directly from the field of ethics to propose a solution: what if we built uncertainty into our algorithms? Eckersley puts forth two possible techniques to express this idea mathematically. He begins with the premise that algorithms are typically programmed with clear rules about human preferences. We'd have to tell it, for example, that we definitely prefer friendly soldiers over friendly civilians, and friendly civilians over enemy soldiers -- even if we weren't actually sure or didn't think that should always be the case. The algorithm's design leaves little room for uncertainty. The first technique, known as partial ordering, begins to introduce just the slightest bit of uncertainty. You could program the algorithm to prefer friendly soldiers over enemy soldiers and friendly civilians over enemy soldiers, but you wouldn't specify a preference between friendly soldiers and friendly civilians. In the second technique, known as uncertain ordering, you have several lists of absolute preferences, but each one has a probability attached to it. Three-quarters of the time you might prefer friendly soldiers over friendly civilians over enemy soldiers. A quarter of the time you might prefer friendly civilians over friendly soldiers over enemy soldiers. The algorithm could handle this uncertainty by computing multiple solutions and then giving humans a menu of options with their associated trade-offs, Eckersley says.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Giving Algorithms a Sense of Uncertainty Could Make Them More Ethical

IT Security Nachrichten vom 19.01.2019 um 01:45 Uhr | Quelle developers.slashdot.org
An anonymous reader quotes a report from MIT Technology Review: Algorithms are increasingly being used to make ethical decisions. They are built to pursue a single mathematical goal, such as maximizing the number of soldiers' lives saved or minimizing the number of civilian deaths. When you start dealing with multiple, often competing, objectives or try to account for intangibles like "freedom" and "well-being," a satisfactory mathematical solution doesn't always exist. "We as humans want multiple incompatible things," says Peter Eckersley, the director of research for the Partnership on AI, who recently released a paper that explores this issue. "There are many high-stakes situations where it's actually inappropriate -- perhaps dangerous -- to program in a single objective function that tries to describe your ethics." These solutionless dilemmas aren't specific to algorithms. Ethicists have studied them for decades and refer to them as impossibility theorems. So when Eckersley first recognized their applications to artificial intelligence, he borrowed an idea directly from the field of ethics to propose a solution: what if we built uncertainty into our algorithms? Eckersley puts forth two possible techniques to express this idea mathematically. He begins with the premise that algorithms are typically programmed with clear rules about human preferences. We'd have to tell it, for example, that we definitely prefer friendly soldiers over friendly civilians, and friendly civilians over enemy soldiers -- even if we weren't actually sure or didn't think that should always be the case. The algorithm's design leaves little room for uncertainty. The first technique, known as partial ordering, begins to introduce just the slightest bit of uncertainty. You could program the algorithm to prefer friendly soldiers over enemy soldiers and friendly civilians over enemy soldiers, but you wouldn't specify a preference between friendly soldiers and friendly civilians. In the second technique, known as uncertain ordering, you have several lists of absolute preferences, but each one has a probability attached to it. Three-quarters of the time you might prefer friendly soldiers over friendly civilians over enemy soldiers. A quarter of the time you might prefer friendly civilians over friendly soldiers over enemy soldiers. The algorithm could handle this uncertainty by computing multiple solutions and then giving humans a menu of options with their associated trade-offs, Eckersley says.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Hackers Launching Ransomware and CryptoMiner via Love_You MalSpam Campaign

Hacking vom 19.01.2019 um 01:34 Uhr | Quelle gbhackers.com
MalSpam

The worst alliance of Ransomware and the CryptoMiner family in a spread spree, early January 2019. Malware Spam or MalSpam is the term used to designate malware that is delivered via email messages. Malicious spam (MalSpam) using zipped JavaScript (.js) files as email attachments–this is a well-established tactic used by cybercriminals to distribute malware. The […]

The post Hackers Launching Ransomware and CryptoMiner via Love_You MalSpam Campaign appeared first on GBHackers On Security.


Newsbewertung

Weiterlesen

Hackers Launching Ransomware and CryptoMiner via Love_You MalSpam Campaign

Hacking vom 19.01.2019 um 01:34 Uhr | Quelle gbhackers.com
MalSpam

The worst alliance of Ransomware and the CryptoMiner family in a spread spree, early January 2019. Malware Spam or MalSpam is the term used to designate malware that is delivered via email messages. Malicious spam (MalSpam) using zipped JavaScript (.js) files as email attachments–this is a well-established tactic used by cybercriminals to distribute malware. The […]

The post Hackers Launching Ransomware and CryptoMiner via Love_You MalSpam Campaign appeared first on GBHackers On Security.


Newsbewertung

Weiterlesen

DNC says Russia tried to hack its servers again in November 2018

IT Security Nachrichten vom 19.01.2019 um 01:27 Uhr | Quelle zdnet.com
Democrats say the spear-phishing attack, which was attributed to Russian group Cozy Bear, was unsuccessful.
Newsbewertung

Weiterlesen

Microsoft Suggests Windows 10 Mobile Users Switch To iOS or Android As Support Winds Down

IT Security Nachrichten vom 19.01.2019 um 01:03 Uhr | Quelle mobile.slashdot.org
Windows 10 Mobile devices will be officially unsupported starting on December 10, 2019. As a result, Microsoft is recommending users move to an Android or iOS device instead. Mac Rumors reports: Microsoft made the recommendation in a Windows 10 Mobile support document (via Thurrott) explaining its plans to stop offering security updates and patches for Windows 10 Mobile: "With the Windows 10 Mobile OS end of support, we recommend that customers move to a supported Android or iOS device. Microsoft's mission statement to empower every person and every organization on the planet to achieve more, compels us to support our Mobile apps on those platforms and devices." All customers who have a Windows 10 Mobile device will be able to keep using it after December 10, 2019, but no further updates will be available.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Logged today randomly into Alienware website

IT Security Nachrichten vom 19.01.2019 um 00:39 Uhr | Quelle reddit.com
Logged today randomly into Alienware website submitted by /u/KeinZantezuken
[link] [comments]

Newsbewertung

Weiterlesen

How secure is a password manager, really?

IT Security Nachrichten vom 19.01.2019 um 00:27 Uhr | Quelle reddit.com

I'm at that stage in life where managing passwords is just out of control so I've basically gone to just a couple to make it easy.

I really like the idea of a password manager to store my passwords but I always think about the target they are. It is literally the definition of putting all your eggs in one basket. An electronic basket hackers want to hack the fuck out of.

do you guys use any, if so what do you use what do you think about them, what have your experiences in general been?

submitted by /u/Megaseth
[link] [comments]
Newsbewertung

Weiterlesen

Tesla Is Cutting 7 Percent of Its Workforce To Reduce Model 3 Price

IT Security Nachrichten vom 19.01.2019 um 00:25 Uhr | Quelle tech.slashdot.org
Tesla CEO Elon Musk announced today that the company would cut 7% of its workforce in order to cut costs as the company prepares to ramp up production and boost margins as they get closer to releasing the long-awaited $35,000 version of the Model 3. CNBC reports: Musk says Tesla faces "an extremely difficult challenge" in making their products a competitive alternative to traditional vehicles, adding that he expects Q4 profit to come in significantly lower than Q3. Five experts weigh in on whether it's a challenge Musk and Tesla can overcome: - Oppenheimer managing director Colin Rusch agrees with Jed Dorsheimer on Tesla's job cuts, but isn't bullish on what they'll accomplish. - Canaccord Genuity's Jed Dorsheimer thinks the workforce cut is just fine, calling it "clean-up" after the company's latest push to ramp up Model 3 production came with a wealth of new hires. - "They're certainly in a better position than they were eight or nine months ago," says ROTH Capital's Craig Irwin. "Where we're going to see pressure on the stock today is the 'copy-paste' expectations of Q3 going through 2019 need to be reset." - Needham's Raji Gil thinks that Tesla may have overestimated how many people can actually afford a high-end electric vehicle. "Clearly, in my mind, they have an issue with demand," says Rusch, " If you do the math, you have to conclude that 90 percent of the reservations that have been built up over the past couple of years are folks that wanted the standard battery version of the vehicle, which is $35,000." - Westly Group founder Steve Westly loves where Elon Musk's company is right now, calling Tesla "the iPhone of electric vehicles," and saying they're well ahead of the game when it comes to a quickly-changing auto market.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Fallout Exploit Kit now includes exploit for CVE-2018-15982 Flash zero-day

Hacking vom 19.01.2019 um 00:22 Uhr | Quelle securityaffairs.co

Experts at Malwarebytes have reported that the code for the recently discovered Flash zero-day flaw was added to the Fallout Exploit kit. Experts at Malwarebytes observed a new version of the Fallout Exploit kit that include the code to exploit a recently discovered Flash zero-day vulnerability. The Fallout Exploit kit was discovered at the end […]

The post Fallout Exploit Kit now includes exploit for CVE-2018-15982 Flash zero-day appeared first on Security Affairs.


Newsbewertung

Weiterlesen

Cyber News Rundown: Ransomware Halts Texas Town

IT Security Nachrichten vom 19.01.2019 um 00:10 Uhr | Quelle reddit.com
Cyber News Rundown: Ransomware Halts Texas Town submitted by /u/Webroot_Official
[link] [comments]

Newsbewertung

Weiterlesen

Phishing Attack Allegedly Targeted US DNC After 2018 Midterms

IT Security Nachrichten vom 19.01.2019 um 00:00 Uhr | Quelle bleepingcomputer.com
According to documents added to an amended complaint filed on January 17, the Democratic National Committee says that it was allegedly targeted by a Russian intelligence-coordinated phishing attack just a few days after the 2018 midterms. [...]
Newsbewertung

Weiterlesen

Phishing Attack Allegedly Targeted US DNC After 2018 Midterms

IT Security Nachrichten vom 19.01.2019 um 00:00 Uhr | Quelle bleepingcomputer.com
According to documents added to an amended complaint filed on January 17, the Democratic National Committee says that it was allegedly targeted by a Russian intelligence-coordinated phishing attack just a few days after the 2018 midterms. [...]
Newsbewertung

Weiterlesen

Phishing Attack Allegedly Targeted US DNC After 2018 Midterms

IT Security Nachrichten vom 19.01.2019 um 00:00 Uhr | Quelle bleepingcomputer.com
According to documents added to an amended complaint filed on January 17, the Democratic National Committee says that it was allegedly targeted by a Russian intelligence-coordinated phishing attack just a few days after the 2018 midterms. [...]
Newsbewertung

Weiterlesen

Russian Hackers Allegedly Attempted To Breach the DNC After the 2018 Midterms

IT Security Nachrichten vom 18.01.2019 um 23:45 Uhr | Quelle politics.slashdot.org
An anonymous reader quotes a report from Fortune: Russian hackers attempted to breach Democratic National Committee email addresses in a spear-phishing campaign just after the 2018 midterms, according to a DNC court document filed Thursday night. "The content of these emails and their timestamps were consistent with a spear-phishing campaign that leading cybersecurity experts have tied to Russian intelligence," reads the complaint. "Therefore, it is probable that Russian intelligence again attempted to unlawfully infiltrate DNC computers in November 2018." The complaint [...] said there is no evidence that the attempted hack in Nov. 2018 was successful. Spear-phishing campaigns involve sending emails that appear to be from a trusted source in order to gain confidential information. According to CNN, the emails in question appeared to have been sent from a State Department official and contained a PDF attachment that, if opened, would allow the hacker access to the recipient's computer. The timing and content of these emails were consistent with the practices of the Russian hacking group known as Cozy Bear, one of the two groups that hacked the DNC prior to the 2016 U.S. presidential election. According to the cybersecurity firm FireEye, Cozy Bear attempted to hack over 20 entities in Nov. 2018, including clients in local government, transportation, defense, law enforcement, and military.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Twitter bug exposed private tweets of Android users to public for years

IT Security Nachrichten vom 18.01.2019 um 23:42 Uhr | Quelle hackread.com

By Carolina

A security bug in Twitter exposed private tweets of users to the public. The flaw only affected Android users of the Twitter app while iPhone users were not affected. According to Twitter, private tweets of users from November 3, 2014, to January 14, 2019, were exposed. Although the company did not say how many people were affected […]

This is a post from HackRead.com Read the original post: Twitter bug exposed private tweets of Android users to public for years


Newsbewertung

Weiterlesen

Huge prizes up for grabs for anyone who can hack a tesla

IT Security Nachrichten vom 18.01.2019 um 23:21 Uhr | Quelle reddit.com
Huge prizes up for grabs for anyone who can hack a tesla submitted by /u/RonaldvanderMeer
[link] [comments]

Newsbewertung

Weiterlesen

Strange extension

IT Security Nachrichten vom 18.01.2019 um 23:05 Uhr | Quelle reddit.com
Strange extension

Does anyone recognize this extension on Yandex? Any suggestions on how to search for it or what it does?

The fact that is coming from "Other" sources makes it even more suspicious.

https://i.redd.it/c53p91ow89b21.jpg

submitted by /u/Foreign_Addendum
[link] [comments]

Newsbewertung

Weiterlesen

The Government's Secret UFO Program Funded Research on Wormholes and Extra Dimensions

IT Security Nachrichten vom 18.01.2019 um 23:05 Uhr | Quelle yro.slashdot.org
Documents released by the Department of Defense reveal some of what its infamous Advanced Aerospace Threat Identification Program was working on. From a report: The Department of Defense funded research on wormholes, invisibility cloaking, and "the manipulation of extra dimensions" under its shadowy Advanced Aerospace Threat Identification Program, first described in 2017 by the New York Times and the Washington Post. On Wednesday, the Defense Intelligence Agency released a list of 38 research titles pursued by the program in response to a Freedom of Information Act (FOIA) request by Steven Aftergood, director of the Federation of American Scientists' Project on Government Secrecy. The list provides one of the best looks at the Pentagon's covert UFO operation or study of "anomalous aerospace threats." According to Aftergood's FOIA request, the document marked "For Official Use Only" was sent to Congress on January 2018. One such research topic, "Traversable Wormholes, Stargates, and Negative Energy," was led by Eric W. Davis of EarthTech International Inc, which describes itself as a facility "exploring the forefront reaches of science and engineering," with an interest in theories of spacetime, studies of the quantum vacuum, and the search for extraterrestrial intelligence.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

The Week in Ransomware - January 18th 2019 - Devs Back from Vacation

IT Security Nachrichten vom 18.01.2019 um 22:57 Uhr | Quelle bleepingcomputer.com
The ransomware developers must be back from vacation as there were a lot of new releases this week. In addition to new variants of existing ransomware such as Dharma, Scarab, Matrix, and more, we also had a few new variants pop up. [...]
Newsbewertung

Weiterlesen

Is a massive security flaw the storing or passwords in browsers etc. that can be viewed in clear text?

IT Security Nachrichten vom 18.01.2019 um 22:44 Uhr | Quelle reddit.com

When I use Chrome to auto-fill my stored credentials, often a site will allow the clear text viewing of a password field. I imagine if someone else had access to my machine, they could use this simple method to steal my credentials. This seems like a massive security flaw.

submitted by /u/australianjalien
[link] [comments]
Newsbewertung

Weiterlesen

WiFi firmware bug affects laptops, smartphones, routers, gaming devices

IT Security Nachrichten vom 18.01.2019 um 22:26 Uhr | Quelle zdnet.com
List of impacted devices includes PS4, Xbox One, Samsung Chromebooks, and Microsoft Surface devices.
Newsbewertung

Weiterlesen

Seitennavigation

Seite 3 von 4.772 Seiten (Bei Beitrag 70 - 105)
167.006x Beiträge in dieser Kategorie

Auf Seite 2 zurück | Nächste 4 Seite | Letzte Seite
[ 1 ] [ 2 ] [3] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ]