1. IT-Security


ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese
Anzeige

IT-Security


Suchen

Twitter bug exposed private tweets of Android users to public for years

IT Security Nachrichten vom 18.01.2019 um 23:42 Uhr | Quelle hackread.com

By Carolina

A security bug in Twitter exposed private tweets of users to the public. The flaw only affected Android users of the Twitter app while iPhone users were not affected. According to Twitter, private tweets of users from November 3, 2014, to January 14, 2019, were exposed. Although the company did not say how many people were affected […]

This is a post from HackRead.com Read the original post: Twitter bug exposed private tweets of Android users to public for years


Newsbewertung

Weiterlesen

Huge prizes up for grabs for anyone who can hack a tesla

IT Security Nachrichten vom 18.01.2019 um 23:21 Uhr | Quelle reddit.com
Huge prizes up for grabs for anyone who can hack a tesla submitted by /u/RonaldvanderMeer
[link] [comments]

Newsbewertung

Weiterlesen

Strange extension

IT Security Nachrichten vom 18.01.2019 um 23:05 Uhr | Quelle reddit.com
Strange extension

Does anyone recognize this extension on Yandex? Any suggestions on how to search for it or what it does?

The fact that is coming from "Other" sources makes it even more suspicious.

https://i.redd.it/c53p91ow89b21.jpg

submitted by /u/Foreign_Addendum
[link] [comments]

Newsbewertung

Weiterlesen

The Government's Secret UFO Program Funded Research on Wormholes and Extra Dimensions

IT Security Nachrichten vom 18.01.2019 um 23:05 Uhr | Quelle yro.slashdot.org
Documents released by the Department of Defense reveal some of what its infamous Advanced Aerospace Threat Identification Program was working on. From a report: The Department of Defense funded research on wormholes, invisibility cloaking, and "the manipulation of extra dimensions" under its shadowy Advanced Aerospace Threat Identification Program, first described in 2017 by the New York Times and the Washington Post. On Wednesday, the Defense Intelligence Agency released a list of 38 research titles pursued by the program in response to a Freedom of Information Act (FOIA) request by Steven Aftergood, director of the Federation of American Scientists' Project on Government Secrecy. The list provides one of the best looks at the Pentagon's covert UFO operation or study of "anomalous aerospace threats." According to Aftergood's FOIA request, the document marked "For Official Use Only" was sent to Congress on January 2018. One such research topic, "Traversable Wormholes, Stargates, and Negative Energy," was led by Eric W. Davis of EarthTech International Inc, which describes itself as a facility "exploring the forefront reaches of science and engineering," with an interest in theories of spacetime, studies of the quantum vacuum, and the search for extraterrestrial intelligence.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

The Week in Ransomware - January 18th 2019 - Devs Back from Vacation

IT Security Nachrichten vom 18.01.2019 um 22:57 Uhr | Quelle bleepingcomputer.com
The ransomware developers must be back from vacation as there were a lot of new releases this week. In addition to new variants of existing ransomware such as Dharma, Scarab, Matrix, and more, we also had a few new variants pop up. [...]
Newsbewertung

Weiterlesen

Is a massive security flaw the storing or passwords in browsers etc. that can be viewed in clear text?

IT Security Nachrichten vom 18.01.2019 um 22:44 Uhr | Quelle reddit.com

When I use Chrome to auto-fill my stored credentials, often a site will allow the clear text viewing of a password field. I imagine if someone else had access to my machine, they could use this simple method to steal my credentials. This seems like a massive security flaw.

submitted by /u/australianjalien
[link] [comments]
Newsbewertung

Weiterlesen

WiFi firmware bug affects laptops, smartphones, routers, gaming devices

IT Security Nachrichten vom 18.01.2019 um 22:26 Uhr | Quelle zdnet.com
List of impacted devices includes PS4, Xbox One, Samsung Chromebooks, and Microsoft Surface devices.
Newsbewertung

Weiterlesen

Cassette Album Sales in the US Grew By 23% in 2018

IT Security Nachrichten vom 18.01.2019 um 22:25 Uhr | Quelle entertainment.slashdot.org
An anonymous reader shares a report: Thanks to such acts as Britney Spears, Twenty One Pilots and Guns N' Roses, along with soundtracks from the Guardians of the Galaxy franchise -- which boasts the year's top two sellers -- and Netflix's Stranger Things series, cassette tape album sales in the U.S. grew by 23 percent in 2018. According to Nielsen Music, cassette album sales climbed from 178,000 in 2017 to 219,000 copies in 2018. While that's a small number compared to the overall album market (141 million copies sold in 2018), that's a sizable number for a once-dead format. In 2014, for example, cassette album sales numbered just 50,000. But, 20 years before that, back in 1994, when cassettes were still very much a hot-selling format, there were 246 million cassette albums sold that year, of an overall 615 million albums.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

android malware in the google play store could tell whether it was likely to be running on a genuine victim’s device or being analysed by a security team.

IT Security Nachrichten vom 18.01.2019 um 22:21 Uhr | Quelle reddit.com
android malware in the google play store could tell whether it was likely to be running on a genuine victim’s device or being analysed by a security team. submitted by /u/RonaldvanderMeer
[link] [comments]

Newsbewertung

Weiterlesen

Google Play Removes Malicious Malware-Ridden Apps

IT Security Nachrichten vom 18.01.2019 um 22:00 Uhr | Quelle threatpost.com
Two apps on Google Play were infecting devices with the Anubis mobile banking trojan.
Newsbewertung

Weiterlesen

Best practices for storing copies personal information (credit card info, SSN, etc)?

IT Security Nachrichten vom 18.01.2019 um 21:56 Uhr | Quelle reddit.com

I want to keep backups of my personal information in case of some accident where I may want access to it.

What is the best way to store this information securely? Are Apple’s notes (locked with a password) secure? Should I store it on a device locally, or on some cloud/server that encrypts data?

I also figure it’s safer to store the data as images instead of plaintext, similar to what people often do with their emails on personal websites to avoid it being scraped, but I’m not sure I’m right in this.

Looking for any sort of advice here past not storing the information anywhere—even if it’s a bad idea, I’m curious what the best way to do it is.

submitted by /u/cl31j6171e
[link] [comments]
Newsbewertung

Weiterlesen

Mitigating Breach Costs

IT Security Nachrichten vom 18.01.2019 um 21:50 Uhr | Quelle informationsecuritybuzz.com

The average cost of a cyber breach for companies now exceeds one-million dollars according to a new report by Radware. Justin Jett, Director of Audit and Compliance at Plixer: “The numbers reflect the reality that breaches are inevitable and expensive. However, both sides of that equation can be mitigated if companies can locate forensic data …

The ISBuzz Post: This Post Mitigating Breach Costs appeared first on Information Security Buzz.


Newsbewertung

Weiterlesen

Europe's Controversial 'Link Tax' in Doubt After Member States Rebel

IT Security Nachrichten vom 18.01.2019 um 21:45 Uhr | Quelle slashdot.org
Copyright activists just scored a major victory in the ongoing fight over the European Union's new copyright rules. An upcoming summit to advance the EU's copyright directive has been canceled, as member states objected to the incoming rules as too restrictive to online creators. From a report: The EU's forthcoming copyright rules had drawn attention from activists for two measures, designated as Article 11 and Article 13, that would give publishers rights over snippets of news content shared online (the so-called "link tax") and increase platform liability for user content. [...] After today, the directive's future is much less certain. Member states were gathered to approve a new version of the directive drafted by Romania -- but eleven countries reportedly opposed the text, many of them citing familiar concerns over the two controversial articles. Crucially, Italy's new populist government takes a far more skeptical view of the strict copyright proposals. Member states have until the end of February to approve a new version of the text, although it's unclear what compromise might be reached. Further reading: EU Cancels 'Final' Negotiations On EU Copyright Directive As It Becomes Clear There Isn't Enough Support.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

EPIC Seeks Injunction to Block Census Citizenship Question

IT Security Nachrichten vom 18.01.2019 um 21:44 Uhr | Quelle reddit.com
EPIC Seeks Injunction to Block Census Citizenship Question submitted by /u/filthyheathenmonkey
[link] [comments]

Newsbewertung

Weiterlesen

Exploit for Recent Flash Zero-Day Added to Fallout Exploit Kit

IT Security Nachrichten vom 18.01.2019 um 21:30 Uhr | Quelle feedproxy.google.com

An updated version of the Fallout exploit kit recently emerged with an exploit for a recent Flash zero-day included in its arsenal, Malwarebytes Labs security researchers warn.

read more


Newsbewertung

Weiterlesen

Exploit for Recent Flash Zero-Day Added to Fallout Exploit Kit

IT Security Nachrichten vom 18.01.2019 um 21:30 Uhr | Quelle feedproxy.google.com

An updated version of the Fallout exploit kit recently emerged with an exploit for a recent Flash zero-day included in its arsenal, Malwarebytes Labs security researchers warn.

read more


Newsbewertung

Weiterlesen

Exploiting routers

IT Security Nachrichten vom 18.01.2019 um 21:26 Uhr | Quelle reddit.com

In this post, I will be discussing our recent finding (CVE-2018-16119) while conducting vulnerability research on a home router: TP-Link’s WR1043ND home WiFi router. This post is a walkthrough to the steps taken to identify the vulnerability and how it can be exploited to gain remote code execution in the device.

https://www.secsignal.org/news/exploiting-routers-just-another-tp-link-0day/

submitted by /u/newminimal2009
[link] [comments]
Newsbewertung

Weiterlesen

Exploiting routers

IT Security Nachrichten vom 18.01.2019 um 21:26 Uhr | Quelle reddit.com

In this post, I will be discussing our recent finding (CVE-2018-16119) while conducting vulnerability research on a home router: TP-Link’s WR1043ND home WiFi router. This post is a walkthrough to the steps taken to identify the vulnerability and how it can be exploited to gain remote code execution in the device.

https://www.secsignal.org/news/exploiting-routers-just-another-tp-link-0day/

submitted by /u/newminimal2009
[link] [comments]
Newsbewertung

Weiterlesen

Recaf - A Modern Java Bytecode Editor

IT Security Nachrichten vom 18.01.2019 um 21:23 Uhr | Quelle feedproxy.google.com

Recaf is an open-source Java bytecode editor built on top of Objectweb's ASM. ASM is a bytecode manipulation library that abstracts away the constant pool and a few other class-file attributes. Since keeping track of the constant pool and managing proper stackframes are no longer necessary, complex changes can be made with relative ease. With additional features to assist in the process of editing classes, Recaf is the most feature rich free bytecode editor available.

Useful Information

While ASM makes bytecode manipulation very simple it does not mean you should dive head-first into editing compiled java programs without understanding some basic programming concepts and the Java class file architecture. Here are some references for these topics:


For screenshots check the screenshots directory. They appear throughout the documentation as well.

Libraries used:



Newsbewertung

Weiterlesen

Recaf - A Modern Java Bytecode Editor

IT Security Nachrichten vom 18.01.2019 um 21:23 Uhr | Quelle feedproxy.google.com

Recaf is an open-source Java bytecode editor built on top of Objectweb's ASM. ASM is a bytecode manipulation library that abstracts away the constant pool and a few other class-file attributes. Since keeping track of the constant pool and managing proper stackframes are no longer necessary, complex changes can be made with relative ease. With additional features to assist in the process of editing classes, Recaf is the most feature rich free bytecode editor available.

Useful Information

While ASM makes bytecode manipulation very simple it does not mean you should dive head-first into editing compiled java programs without understanding some basic programming concepts and the Java class file architecture. Here are some references for these topics:


For screenshots check the screenshots directory. They appear throughout the documentation as well.

Libraries used:



Newsbewertung

Weiterlesen

How offender profiling techniques can help you be more preemptive in detection and prevention.

IT Security Nachrichten vom 18.01.2019 um 21:21 Uhr | Quelle reddit.com
How offender profiling techniques can help you be more preemptive in detection and prevention. submitted by /u/RonaldvanderMeer
[link] [comments]

Newsbewertung

Weiterlesen

How offender profiling techniques can help you be more preemptive in detection and prevention.

IT Security Nachrichten vom 18.01.2019 um 21:21 Uhr | Quelle reddit.com
How offender profiling techniques can help you be more preemptive in detection and prevention. submitted by /u/RonaldvanderMeer
[link] [comments]

Newsbewertung

Weiterlesen

US midterms barely over when Russians came knocking on our servers (again), Democrats claim

IT Security Nachrichten vom 18.01.2019 um 21:05 Uhr | Quelle go.theregister.com

Лучшая защита – нападение?

Russian hackers attempted to infiltrate the Democratic National Committee (DNC) just after the US midterm elections last year, according to a new court filing.…


Newsbewertung

Weiterlesen

US midterms barely over when Russians came knocking on our servers (again), Democrats claim

IT Security Nachrichten vom 18.01.2019 um 21:05 Uhr | Quelle go.theregister.com

Лучшая защита – нападение?

Russian hackers attempted to infiltrate the Democratic National Committee (DNC) just after the US midterm elections last year, according to a new court filing.…


Newsbewertung

Weiterlesen

'Hacker' Rui Pinto is under house arrest

Hacking vom 18.01.2019 um 21:02 Uhr | Quelle breachforums.com
Judge of the Budapest court has already ordered coercive measure. The hacker Rui Pinto, accused of accessing the email accounts of Benfica, will be under house arrest, this friday. The hacker, arrested last Wednesday in Hungary, attended a court in Budapest this morning to be heard by a judge, who eventually decreed one of the least burdensome coercion measures.

Read the News
https://translate.google.com/translate?h...-YY4247908
Newsbewertung

Weiterlesen

US Regulators Have Met To Discuss Imposing a Record-Setting Fine Against Facebook For Some of Its Privacy Violations: Report

IT Security Nachrichten vom 18.01.2019 um 21:00 Uhr | Quelle yro.slashdot.org
U.S. regulators have met to discuss imposing a record-setting fine against Facebook for violating a legally binding agreement with the government to protect the privacy of its users' personal data, The Washington Post reported Friday [Editor's note: the link may be paywalled; alternative source], citing three people familiar with the deliberations. From the report: The fine under consideration at the Federal Trade Commission, a privacy and security watchdog that began probing Facebook last year, would mark the first major punishment levied against Facebook in the United States since reports emerged in March that Cambridge Analytica, a political consultancy, accessed personal information on about 87 million Facebook users without their knowledge. The penalty is expected to be much larger than the $22.5 million fine the agency imposed on Google in 2012. That fine set a record for the greatest penalty for violating an agreement with the FTC to improve its privacy practices.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

US Regulators Have Met To Discuss Imposing a Record-Setting Fine Against Facebook For Some of Its Privacy Violations: Report

IT Security Nachrichten vom 18.01.2019 um 21:00 Uhr | Quelle yro.slashdot.org
U.S. regulators have met to discuss imposing a record-setting fine against Facebook for violating a legally binding agreement with the government to protect the privacy of its users' personal data, The Washington Post reported Friday [Editor's note: the link may be paywalled; alternative source], citing three people familiar with the deliberations. From the report: The fine under consideration at the Federal Trade Commission, a privacy and security watchdog that began probing Facebook last year, would mark the first major punishment levied against Facebook in the United States since reports emerged in March that Cambridge Analytica, a political consultancy, accessed personal information on about 87 million Facebook users without their knowledge. The penalty is expected to be much larger than the $22.5 million fine the agency imposed on Google in 2012. That fine set a record for the greatest penalty for violating an agreement with the FTC to improve its privacy practices.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Fallout EK Retools for a Fresh New 2019 Look

IT Security Nachrichten vom 18.01.2019 um 20:58 Uhr | Quelle threatpost.com
The Fallout EK has added the latest Flash vulnerability to its bad of tricks, among other tune-ups.
Newsbewertung

Weiterlesen

Fallout EK Retools for a Fresh New 2019 Look

IT Security Nachrichten vom 18.01.2019 um 20:58 Uhr | Quelle threatpost.com
The Fallout EK has added the latest Flash vulnerability to its bad of tricks, among other tune-ups.
Newsbewertung

Weiterlesen

Fallout Exploit Kit is Back with New Vulnerabilities and Payloads

IT Security Nachrichten vom 18.01.2019 um 20:39 Uhr | Quelle bleepingcomputer.com
The Fallout exploit kit is back in business after a short downtime, with new tools under its belt: a new Flash exploit for CVE-2018-15982, HTTPS support, a new landing page format, and the capability to deliver payloads using Powershell [...]
Newsbewertung

Weiterlesen

Fallout Exploit Kit is Back with New Vulnerabilities and Payloads

IT Security Nachrichten vom 18.01.2019 um 20:39 Uhr | Quelle bleepingcomputer.com
The Fallout exploit kit is back in business after a short downtime, with new tools under its belt: a new Flash exploit for CVE-2018-15982, HTTPS support, a new landing page format, and the capability to deliver payloads using Powershell [...]
Newsbewertung

Weiterlesen

Firefox To Remove UI Dark Pattern From Screenshot Tool After Months of Complaints

IT Security Nachrichten vom 18.01.2019 um 20:30 Uhr | Quelle news.slashdot.org
After months of user complaints, Mozilla will remove a misleading "dark pattern" from its page screenshot utility. From a report: The problematic feature is the "Save" button that appears when Firefox users take a screenshot. The issue is that the Save button doesn't save the screenshot to the PC, as most users would naturally expect, but uploads the image to a Mozilla server. This is both a privacy violation, as some users don't appreciate being tricked into uploading sensitive images saved on remote servers, but also an incovenience as users would still have to download the image locally, but in multiple steps afterward.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Firefox To Remove UI Dark Pattern From Screenshot Tool After Months of Complaints

IT Security Nachrichten vom 18.01.2019 um 20:30 Uhr | Quelle news.slashdot.org
After months of user complaints, Mozilla will remove a misleading "dark pattern" from its page screenshot utility. From a report: The problematic feature is the "Save" button that appears when Firefox users take a screenshot. The issue is that the Save button doesn't save the screenshot to the PC, as most users would naturally expect, but uploads the image to a Mozilla server. This is both a privacy violation, as some users don't appreciate being tricked into uploading sensitive images saved on remote servers, but also an incovenience as users would still have to download the image locally, but in multiple steps afterward.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

What Is Computer Digital Forensics? How Can You Qualify As One?

IT Security Nachrichten vom 18.01.2019 um 20:25 Uhr | Quelle hackercombat.com

When a normal person hears the phrase computer forensics, immediately comes to mind an image of a shadowy figure wearing reflective glasses and a white lab coat inside a server...

The post What Is Computer Digital Forensics? How Can You Qualify As One? appeared first on .


Newsbewertung

Weiterlesen

What Is Computer Digital Forensics? How Can You Qualify As One?

IT Security Nachrichten vom 18.01.2019 um 20:25 Uhr | Quelle hackercombat.com

When a normal person hears the phrase computer forensics, immediately comes to mind an image of a shadowy figure wearing reflective glasses and a white lab coat inside a server...

The post What Is Computer Digital Forensics? How Can You Qualify As One? appeared first on .


Newsbewertung

Weiterlesen

Seitennavigation

Seite 4 von 4.772 Seiten (Bei Beitrag 105 - 140)
167.013x Beiträge in dieser Kategorie

Auf Seite 3 zurück | Nächste 5 Seite | Letzte Seite
[ 1 ] [ 2 ] [ 3 ] [4] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ]