1. IT-Security


ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese
Anzeige

IT-Security


Suchen

National Security at the United Nations this Week

IT Security Nachrichten vom 18.01.2019 um 15:11 Uhr | Quelle justsecurity.org

Editors’ Note: Just Security is now producing a new weekly series that keeps readers up to date on developments at the United Nations at the intersection of national security, human rights, and the rule of law.

Somalia Expels U.N. Special Representative

On January 1, the Somali government declared United Nations envoy to Somalia, Nicholas Haysom, “persona non grata.” Haysom, a South African lawyer who had served as constitutional advisor to President Nelson Mandela, began as UN envoy in October 2018.  continue »


Newsbewertung

Weiterlesen

National Security at the United Nations this Week

IT Security Nachrichten vom 18.01.2019 um 15:11 Uhr | Quelle justsecurity.org

Editors’ Note: Just Security is now producing a new weekly series that keeps readers up to date on developments at the United Nations at the intersection of national security, human rights, and the rule of law.

Somalia Expels U.N. Special Representative

On January 1, the Somali government declared United Nations envoy to Somalia, Nicholas Haysom, “persona non grata.” Haysom, a South African lawyer who had served as constitutional advisor to President Nelson Mandela, began as UN envoy in October 2018.  continue »


Newsbewertung

Weiterlesen

Tamron hat sein 15-30 mm-Objektiv konsequent weiterentwickelt

IT Security Nachrichten vom 18.01.2019 um 15:11 Uhr | Quelle winfuture.de
ValueTech, Fotografie, Objektiv, Tamron, SP 15-30 mm F2.8 Di VC USD G2 Tamron hat sich entschlossen, sein Objektiv für Brennweiten von 15 bis 30 Millimetern zu überarbeiten. Unsere Kollegen von ValueTech TV haben das Produkt getestet und kamen zu der Erkenntnis, dass hier im Wesentlichen ein bereits ziemlich gutes Objektiv an einigen Punkten modernisiert wurde. Ein Upgrade vom Vorgänger ist allerdings nicht sinnvoll. (Weiter lesen)
Newsbewertung

Weiterlesen

Tamron hat sein 15-30 mm-Objektiv konsequent weiterentwickelt

IT Security Nachrichten vom 18.01.2019 um 15:11 Uhr | Quelle winfuture.de
ValueTech, Fotografie, Objektiv, Tamron, SP 15-30 mm F2.8 Di VC USD G2 Tamron hat sich entschlossen, sein Objektiv für Brennweiten von 15 bis 30 Millimetern zu überarbeiten. Unsere Kollegen von ValueTech TV haben das Produkt getestet und kamen zu der Erkenntnis, dass hier im Wesentlichen ein bereits ziemlich gutes Objektiv an einigen Punkten modernisiert wurde. Ein Upgrade vom Vorgänger ist allerdings nicht sinnvoll. (Weiter lesen)
Newsbewertung

Weiterlesen

Security In 5: Episode 410 - Tools, Tips And Tricks - Graylog, Open Source SIEM

IT Security Nachrichten vom 18.01.2019 um 15:10 Uhr | Quelle reddit.com
Security In 5: Episode 410 - Tools, Tips And Tricks - Graylog, Open Source SIEM submitted by /u/BinaryBlog
[link] [comments]

Newsbewertung

Weiterlesen

Security In 5: Episode 410 - Tools, Tips And Tricks - Graylog, Open Source SIEM

IT Security Nachrichten vom 18.01.2019 um 15:10 Uhr | Quelle reddit.com
Security In 5: Episode 410 - Tools, Tips And Tricks - Graylog, Open Source SIEM submitted by /u/BinaryBlog
[link] [comments]

Newsbewertung

Weiterlesen

The ICC Acquittal of Gbagbo: What Next for Crimes against Humanity?

IT Security Nachrichten vom 18.01.2019 um 15:07 Uhr | Quelle justsecurity.org
The International Criminal Court dismissed another case this week, ordering the release of two more defendants accused of serious international crimes. The Court's recent record raises questions regarding its interpretation of crimes against humanity and a prosecutorial strategy that focuses almost exclusively on those at the top of the chain of command.
Newsbewertung

Weiterlesen

The ICC Acquittal of Gbagbo: What Next for Crimes against Humanity?

IT Security Nachrichten vom 18.01.2019 um 15:07 Uhr | Quelle justsecurity.org
The International Criminal Court dismissed another case this week, ordering the release of two more defendants accused of serious international crimes. The Court's recent record raises questions regarding its interpretation of crimes against humanity and a prosecutorial strategy that focuses almost exclusively on those at the top of the chain of command.
Newsbewertung

Weiterlesen

That 773M Password 'Megabreach' is Years Old

IT Security Nachrichten vom 18.01.2019 um 15:06 Uhr | Quelle tech.slashdot.org
Security reporter Brian Krebs writes: My inbox and Twitter messages positively lit up today with people forwarding stories from Wired and other publications about a supposedly new trove of nearly 773 million unique email addresses and 21 million unique passwords that were posted to a hacking forum. A story in The Guardian breathlessly dubbed it "the largest collection ever of breached data found." But in an interview with the apparent seller, KrebsOnSecurity learned that it is not even close to the largest gathering of stolen data, and that it is at least two to three years old. The dump, labeled "Collection #1" and approximately 87GB in size, was first detailed earlier today by Troy Hunt, who operates the HaveIBeenPwned breach notification service. Hunt said the data cache was likely "made up of many different individual data breaches from literally thousands of different sources." KrebsOnSecurity sought perspective on this discovery from Alex Holden, CTO of Hold Security, a company that specializes in trawling underground spaces for intelligence about malicious actors and their stolen data dumps. Holden said the data appears to have first been posted to underground forums in October 2018, and that it is just a subset of a much larger tranche of passwords being peddled by a shadowy seller online.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

That 773M Password 'Megabreach' is Years Old

IT Security Nachrichten vom 18.01.2019 um 15:06 Uhr | Quelle tech.slashdot.org
Security reporter Brian Krebs writes: My inbox and Twitter messages positively lit up today with people forwarding stories from Wired and other publications about a supposedly new trove of nearly 773 million unique email addresses and 21 million unique passwords that were posted to a hacking forum. A story in The Guardian breathlessly dubbed it "the largest collection ever of breached data found." But in an interview with the apparent seller, KrebsOnSecurity learned that it is not even close to the largest gathering of stolen data, and that it is at least two to three years old. The dump, labeled "Collection #1" and approximately 87GB in size, was first detailed earlier today by Troy Hunt, who operates the HaveIBeenPwned breach notification service. Hunt said the data cache was likely "made up of many different individual data breaches from literally thousands of different sources." KrebsOnSecurity sought perspective on this discovery from Alex Holden, CTO of Hold Security, a company that specializes in trawling underground spaces for intelligence about malicious actors and their stolen data dumps. Holden said the data appears to have first been posted to underground forums in October 2018, and that it is just a subset of a much larger tranche of passwords being peddled by a shadowy seller online.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Impact of U.S. Government Shutdown on Cybersecurity: Feedback Friday

IT Security Nachrichten vom 18.01.2019 um 14:53 Uhr | Quelle feedproxy.google.com

The failure of President Donald Trump and the Democratic Party to reach an agreement over funding for the controversial Mexico border wall has led to the longest government shutdown in US history.

read more


Newsbewertung

Weiterlesen

Impact of U.S. Government Shutdown on Cybersecurity: Feedback Friday

IT Security Nachrichten vom 18.01.2019 um 14:53 Uhr | Quelle feedproxy.google.com

The failure of President Donald Trump and the Democratic Party to reach an agreement over funding for the controversial Mexico border wall has led to the longest government shutdown in US history.

read more


Newsbewertung

Weiterlesen

Microsoft partner portal 'exposes 'every' support request filed worldwide' today

IT Security Nachrichten vom 18.01.2019 um 14:47 Uhr | Quelle go.theregister.com

No customer data visible but hell's bells, Redmond, what have you borked now?

Exclusive  Alarmed Microsoft support partners can currently view support tickets submitted from all over the world, in what appears to be a very wide-ranging blunder by the Redmond-based biz.…


Newsbewertung

Weiterlesen

Microsoft partner portal 'exposes 'every' support request filed worldwide' today

IT Security Nachrichten vom 18.01.2019 um 14:47 Uhr | Quelle go.theregister.com

No customer data visible but hell's bells, Redmond, what have you borked now?

Exclusive  Alarmed Microsoft support partners can currently view support tickets submitted from all over the world, in what appears to be a very wide-ranging blunder by the Redmond-based biz.…


Newsbewertung

Weiterlesen

MEGA Data Breach

IT Security Nachrichten vom 18.01.2019 um 14:47 Uhr | Quelle informationsecuritybuzz.com

A newly revealed trove of 772,904,991 unique email addresses and more than 21 million unique passwords that have been aggregated from over 2,000 leaked databases was recently discovered by Troy Hunt, the security researcher who maintains HaveIBeenPwned. The records were stored on one of the most popular cloud storage sites, MEGA, until it got taken down, and then …

The ISBuzz Post: This Post MEGA Data Breach appeared first on Information Security Buzz.


Newsbewertung

Weiterlesen

MEGA Data Breach

IT Security Nachrichten vom 18.01.2019 um 14:47 Uhr | Quelle informationsecuritybuzz.com

A newly revealed trove of 772,904,991 unique email addresses and more than 21 million unique passwords that have been aggregated from over 2,000 leaked databases was recently discovered by Troy Hunt, the security researcher who maintains HaveIBeenPwned. The records were stored on one of the most popular cloud storage sites, MEGA, until it got taken down, and then …

The ISBuzz Post: This Post MEGA Data Breach appeared first on Information Security Buzz.


Newsbewertung

Weiterlesen

Tim Cook fordert DSGVO-ähnliche Rechte auch für US-Nutzer

IT Security Nachrichten vom 18.01.2019 um 14:46 Uhr | Quelle winfuture.de
Apple, Ceo, Tim Cook Apple-Chef Tim Cook meinte es ziemlich ernst, als er den Vorbild-Charakter der neuen europäischen Gesetzgebung zum Datenschutz betonte. In den USA nutzt er nun seinen Einfluss, um sich für entsprechende Regelungen stark zu machen. Vor allem sollten Nutzer hier gegenüber jenen gestärkt werden, die ständig Geschäfte mit den Daten der User machen. (Weiter lesen)
Newsbewertung

Weiterlesen

Tim Cook fordert DSGVO-ähnliche Rechte auch für US-Nutzer

IT Security Nachrichten vom 18.01.2019 um 14:46 Uhr | Quelle winfuture.de
Apple, Ceo, Tim Cook Apple-Chef Tim Cook meinte es ziemlich ernst, als er den Vorbild-Charakter der neuen europäischen Gesetzgebung zum Datenschutz betonte. In den USA nutzt er nun seinen Einfluss, um sich für entsprechende Regelungen stark zu machen. Vor allem sollten Nutzer hier gegenüber jenen gestärkt werden, die ständig Geschäfte mit den Daten der User machen. (Weiter lesen)
Newsbewertung

Weiterlesen

Bundesnetzagentur stoppt Abzocke durch Router-Hacking

Hacking vom 18.01.2019 um 14:41 Uhr | Quelle google.com
Die Regulierungsbehörde hat im Januar erneut in mehreren Fällen die Abrechnung von enormen Gebühren verhindert, die Hacker an ...
Newsbewertung

Weiterlesen

Bundesnetzagentur stoppt Abzocke durch Router-Hacking

Hacking vom 18.01.2019 um 14:41 Uhr | Quelle google.com
Die Regulierungsbehörde hat im Januar erneut in mehreren Fällen die Abrechnung von enormen Gebühren verhindert, die Hacker an ...
Newsbewertung

Weiterlesen

Two men charged with hacking into SEC in stock-trading scheme

IT Security Nachrichten vom 18.01.2019 um 14:39 Uhr | Quelle feedproxy.google.com

The hacking duo is believed to have exploited a software flaw and compromised several SEC workstations with malware in order to take early peeks at financial disclosures

The post Two men charged with hacking into SEC in stock-trading scheme appeared first on WeLiveSecurity


Newsbewertung

Weiterlesen

How to Set Up Keyboard Shortcuts for Extensions in Firefox 66

IT Security Nachrichten vom 18.01.2019 um 14:33 Uhr | Quelle news.softpedia.com
Mozilla is always looking to expand the capabilities of Firefox browser, and one of the new features coming to users in the next updates is support for keyboard shortcuts for the installed extensions. At this point, Mozilla Firefox users can configure certain extensions with keyboard shortcuts if they support this feature and offer customization options in this regard. For a tab management extension, for example, it would be possible to perform certain actions, like saving a tab, with just a keyboard shortcut. If the extension supports it, you are allowed to change the default hotkey, if not, there’s not much you can do about it. Mozilla is trying to change this experience beginning with Firefox 66, as the browser will include options to change the keyboard shortcuts for the installed extensions. Again, the extension must offer keyboard support, so basically what Firefox is going to do is offer a more straightforward interface to ...
Newsbewertung

Weiterlesen

Die DSGVO hebelt klassische Datenmanagement-Ansätze aus

IT Security Nachrichten vom 18.01.2019 um 14:30 Uhr | Quelle security-insider.de
Die Datenschutzgrundverordnung (DSGVO) ist für Unternehmen kein rein juristisches Problem. Sie greift mit ihren Anforderungen direkt in die betrieblichen Abläufe ein – und wirft damit technische und organisatorische Probleme auf. Sinnvoll beantworten kann diese nur ein Umdenken des Datenmanagements.
Newsbewertung

Weiterlesen

Völlig daneben: Miese IP-Lokalisierung hat schwere persönliche Folgen

IT Security Nachrichten vom 18.01.2019 um 14:25 Uhr | Quelle winfuture.de
App, Gps, Standort, standortdaten, Strava, Militärbasis Können die Standorte von IP-Adressen nicht genau ermittelt werden, wird bei einer Suche oft ein allgemeiner Marker genutzt. So kann es passieren, dass bestimmte Adressen ungewöhnlich häufig als IP-Standort auftauchen. Wie jetzt ein Bericht aufzeigt, kann dieser Umstand dazu führen, dass die Bewohner massiv mit Problemen zu kämpfen haben. (Weiter lesen)
Newsbewertung

Weiterlesen

Voipo alerts customers of potential security incident due to a misconfiguration.

IT Security Nachrichten vom 18.01.2019 um 14:21 Uhr | Quelle reddit.com
Voipo alerts customers of potential security incident due to a misconfiguration. submitted by /u/RonaldvanderMeer
[link] [comments]

Newsbewertung

Weiterlesen

What Does Brexit Mean For Cybersecurity?

IT Security Nachrichten vom 18.01.2019 um 14:17 Uhr | Quelle informationsecuritybuzz.com

Following last night’s failed Brexit deal vote, and the instability it has caused, Corin Imai, senior security advisor at DomainTools has given her views on where Britain’s exit from the European Union leaves the cybersecurity industry. Corin Imai, Senior Security Advisor at DomainTools: “The UK is likely to face a plethora of cybersecurity challenges once article 50 is triggered. Information …

The ISBuzz Post: This Post What Does Brexit Mean For Cybersecurity? appeared first on Information Security Buzz.


Newsbewertung

Weiterlesen

Oracle critical patch advisory addresses 284 flaws, 33 critical

Hacking vom 18.01.2019 um 14:15 Uhr | Quelle securityaffairs.co

Oracle released the first critical patch advisory for 2019 that addresses a total of 284 vulnerabilities, 33 of them are rated “critical”. Let’s give a close look at some of the vulnerabilities fixed by this patch advisory. The advisory fixed the CVE-2016-1000031 flaw, a remote code execution (RCE) bug in the Apache Commons FileUpload,  disclosed in November […]

The post Oracle critical patch advisory addresses 284 flaws, 33 critical appeared first on Security Affairs.


Newsbewertung

Weiterlesen

Gigantischer Datenklau: Wie Sie prüfen, ob Sie betroffen sind - und wie Sie sich schützen

IT Security Nachrichten vom 18.01.2019 um 14:12 Uhr | Quelle google.com
Der Security-Experte erklärte weiter, es handle sich um den größten einzelnen ... Die Angreifer hätten Lücken in der IT-Sicherheit ausgenutzt.
Newsbewertung

Weiterlesen

Täglichen Cyberattacken muss entgegengewirkt werden

IT Security Nachrichten vom 18.01.2019 um 14:07 Uhr | Quelle google.com
IT-BUSINESS befragte Matthias Zacher, Manager Research & Consulting und Projektleiter bei IDC, welchen Kurs die IT-Security im Jahr 2019 ...
Newsbewertung

Weiterlesen

Google Play Malware Used Phones' Motion Sensors To Conceal Itself

IT Security Nachrichten vom 18.01.2019 um 14:00 Uhr | Quelle mobile.slashdot.org
An anonymous reader quotes a report from Ars Technica: Malicious apps hosted in the Google Play market are trying a clever trick to avoid detection -- they monitor the motion-sensor input of an infected device before installing a powerful banking trojan to make sure it doesn't load on emulators researchers use to detect attacks. The thinking behind the monitoring is that sensors in real end-user devices will record motion as people use them. By contrast, emulators used by security researchers -- and possibly Google employees screening apps submitted to Play -- are less likely to use sensors. Two Google Play apps recently caught dropping the Anubis banking malware on infected devices would activate the payload only when motion was detected first. Otherwise, the trojan would remain dormant. Security firm Trend Micro found the motion-activated dropper in two apps -- BatterySaverMobi, which had about 5,000 downloads, and Currency Converter, which had an unknown number of downloads. Google removed them once it learned they were malicious. The motion detection wasn't the only clever feature of the malicious apps. Once one of the apps installed Anubis on a device, the dropper used requests and responses over Twitter and Telegram to locate the required command and control server. Once Anubis was installed, it used a built-in keylogger that can steal users' account credentials. The malware can also obtain credentials by taking screenshots of the infected users' screen.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

The Early Edition: January 18, 2019

IT Security Nachrichten vom 18.01.2019 um 13:58 Uhr | Quelle justsecurity.org

Signup to receive the Early Edition in your inbox here.

Before the start of business, Just Security provides a curated summary of up-to-the-minute developments at home and abroad. Here’s today’s news.

GOVERNMENT SHUTDOWN AND BORDER WALL

President Trump has postponed use of a military plane for House Speaker Nancy Pelosi (D-Calif.) to travel to Afghanistan, marking a further escalation in the dispute surrounding the partial government shutdown that has lasted nearly four weeks. …   continue »


Newsbewertung

Weiterlesen

SOCKS Proxy List - 01/19/2019 by Tisocks.net

Hacking vom 18.01.2019 um 13:45 Uhr | Quelle breachforums.com
SOCKS Proxy List by Tisocks.net
If you Need Socks5 , Please visit service and add fund via PM , BTC WMZ , WEX . Thanks all!!
Add fund : https://tisocks.net/addfund
Check socks5 Online here : https://checksocks5.com
LIVE | 35.193.155.198:9886 | 0.336 | SOCKS5 | Unknow | Unknow | tor-exit.1.aecyrexus.com | Anonymous Proxy | Checked at https://tisocks.net
LIVE | 35.193.155.198:9305 | 0.425 | SOCKS5 | Unknow | Unknow | tor42.quintex.com | Anonymous Proxy | Checked at https://tisocks.net
LIVE | 35.193.155.198:9316 | 0.465 | SOCKS5 | Unknow | Unknow | tor42.quintex.com | Anonymous Proxy | Checked at https://tisocks.net
LIVE | 35.193.155.198:9749 | 0.436 | SOCKS5 | Unknow | Unknow | tor41.quintex.com | Anonymous Proxy | Checked at https://tisocks.net
LIVE | 35.193.155.198:9592 | 0.525 | SOCKS5 | Unknow | Unknow | tor46.quintex.com | Anonymous Proxy | Checked at https://tisocks.net
LIVE | 35.193.155.198:9266 | 0.488 | SOCKS5 | Unknow | Unknow | tor00.telenet.unc.edu | Anonymous Proxy | Checked at https://tisocks.net
LIVE | 35.193.155.198:9509 | 0.959 | SOCKS5 | Unknow | Unknow | tor41.quintex.com | Anonymous Proxy | Checked at https://tisocks.net
LIVE | 35.193.155.198:10101 | 0.417 | SOCKS5 | Unknow | Unknow | tor-exit.eecs.umich.edu | Anonymous Proxy | Checked at https://tisocks.net
LIVE | 35.193.155.198:9963 | 0.961 | SOCKS5 | Unknow | Unknow | tor42.quintex.com | Anonymous Proxy | Checked at https://tisocks.net
LIVE | 35.193.155.198:10127 | 1.171 | SOCKS5 | Unknow | Unknow | tor00.telenet.unc.edu | Anonymous Proxy | Checked at https://tisocks.net
LIVE | 35.193.155.198:9407 | 1.261 | SOCKS5 | Unknow | Unknow | tor50.quintex.com | Anonymous Proxy | Checked at https://tisocks.net
LIVE | 35.193.155.198:10069 | 1.208 | SOCKS5 | Unknow | Unknow | tor37.quintex.com | Anonymous Proxy | Checked at https://tisocks.net
LIVE | 35.193.155.198:9649 | 1.314 | SOCKS5 | Unknow | Unknow | tor39.quintex.com | Anonymous Proxy | Checked at https://tisocks.net
LIVE | 77.247.94.153:8888 | 0.514 | SOCKS5 | Unknow | Unknow | | Unknow | Checked at https://tisocks.net
LIVE | 192.169.243.124:35723 | 0.284 | SOCKS5 | Arizona | 85260 | ip-192-169-243-124.ip.secureserver.net | United States | Checked at https://tisocks.net
Newsbewertung

Weiterlesen

Faraday v3.5 - Collaborative Penetration Test and Vulnerability Management Platform

IT Security Nachrichten vom 18.01.2019 um 13:38 Uhr | Quelle feedproxy.google.com

Here’s the main new features and improvements in Faraday v3.5:

New vulnerability form
We are happy to introduce our new vulnerability form which makes the creation and editing of vulnerabilities easier.  The new form brings you tabs to make it smaller and group different fields.

Custom fields
Add your own custom fields to your vulnerabilities. We currently support str, int and list types. You can also use these fields in your Executive Reports.

2nd-factor authentication
We added the optional feature for 2nd-factor authentication. You can use any mobile application to use our 2nd-factor authentication.




    Newsbewertung

    Weiterlesen

    One Tiny Windows 10 App Feature That Microsoft Should Launch ASAP

    IT Security Nachrichten vom 18.01.2019 um 13:36 Uhr | Quelle news.softpedia.com
    Nobody can deny that Windows 10 has evolved a lot in the latest feature updates, and there’s no doubt that the next releases would bring even more improvements. But at the same time, there are also features that some would think they just make sense in Windows 10 but for whatever reason, Microsoft has ignored them until now. One of them concerns the Microsoft Store, Microsoft’s very own bet that the company struggles so hard to make the one destination for everything in Windows 10. As a side note, if you really hope that people would start using the Microsoft Store, you need to keep an eye on every single piece of feedback about it, so when a certain request reaches thousands of votes, it’s pretty clear you have to make it happen. In Windows 10, this isn’t really the case, and while this isn’t the main reason some users stay away from the Microsoft Store, it’s one of the factors that contribute to its rather slow adoption. I’m talking about a button, a very simp...
    Newsbewertung

    Weiterlesen

    10 Cybersecurity Conference Trips You Should Make Time for This Year

    IT Security Nachrichten vom 18.01.2019 um 13:35 Uhr | Quelle feedproxy.google.com

    Not sure where to distribute IT budgets for ideal returns? Here's a roundup of the top 10 cybersecurity conference trips to make time for this year.

    The post 10 Cybersecurity Conference Trips You Should Make Time for This Year appeared first on Security Intelligence.


    Newsbewertung

    Weiterlesen

    Seitennavigation

    Seite 8 von 4.772 Seiten (Bei Beitrag 245 - 280)
    167.013x Beiträge in dieser Kategorie

    Auf Seite 7 zurück | Nächste 9 Seite | Letzte Seite
    [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [8] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ]