1. IT-Security >
  2. Cyber Security Nachrichten


ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese
Anzeige

Nachrichten


Suchen

Djvu Ransomware Spreading New .TRO Variant Through Cracks & Adware Bundles

IT Security Nachrichten vom 16.01.2019 um 01:12 Uhr | Quelle bleepingcomputer.com
In December 2018, a new ransomware called Djvu, which could be a variant of STOP,  was released that has been heavily promoted through crack downloads & adware bundles. Originally, this ransomware would append a variation of the .djvu string as an extension to encrypted files, but a recent variant has switched to the .tro extension. [...]
Newsbewertung

Weiterlesen

A Supercomputer In a 19th Century Church Is 'World's Most Beautiful Data Center'

IT Security Nachrichten vom 16.01.2019 um 01:03 Uhr | Quelle hardware.slashdot.org
"Motherboard spoke to the Barcelona Supercomputing Center about how it outfitted a deconsecrated 19th century chapel to host the MareNostrum 4 -- the 25th most powerful supercomputer in the world," writes Slashdot reader dmoberhaus. From the report: Heralded as the "most beautiful data center in the world," the MareNostrum supercomputer came online in 2005, but was originally hosted in a different building at the university. Meaning "our sea" in Latin, the original MareNostrum was capable of performing 42.35 teraflops -- 42.35 trillion operations per second -- making it one of the most powerful supercomputers in Europe at the time. Yet the MareNostrum rightly became known for its aesthetics as much as its computing power. According to Gemma Maspoch, head of communications for Barcelona Supercomputing Center, which oversees the MareNostrum facility, the decision to place the computer in a giant glass box inside a chapel was ultimately for practical reasons. "We were in need of hundreds of square meters without columns and the capacity to support 44.5 tons of weight," Maspoch told me in an email. "At the time there was not much available space at the university and the only room that satisfied our requirements was the Torre Girona chapel. We did not doubt it for a moment and we installed a supercomputer in it." According to Maspoch, the chapel required relatively few modifications to host the supercomputer, such as reinforcing the soil around the church so that it would hold the computer's weight and designing a glass box that would house the computer and help cool it. The supercomputer has been beefed up over the years. Most recently, the fourth iteration came online in 2017 "with a peak computing capacity of 11 thousand trillion operations per second (11.15 petaflops)," reports Motherboard. "MareNostrum 4 is spread over 48 server racks comprising a total of 3,456 nodes. A node consists of two Intel chips, each of which has 24 processors."

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

EDGAR Wrong: Ukrainians hacked SEC, stole docs for inside trading, says Uncle Sam

IT Security Nachrichten vom 16.01.2019 um 00:55 Uhr | Quelle go.theregister.com

Crooks banked $270,000 in just one move, it is claimed

A pair of Ukranian hackers broke into America's financial watchdog to swipe insider info for stock traders, it is claimed.…


Newsbewertung

Weiterlesen

Project Alias Hacks Amazon Echo and Google Home To Protect Your Privacy

IT Security Nachrichten vom 16.01.2019 um 00:20 Uhr | Quelle it.slashdot.org
fahrbot-bot writes: The gadget, called Alias, is an always-listening speaker, designed to fit on top of an Amazon Echo or Google Home, where it looks like a mass of melted candle wax. It's composed of a 3D-printed top layer, a mic array, a Raspberry Pi, and two speakers. It only connects to the internet during the initial setup process. Alias stays "off the grid" while you're using it, preventing your conversations from leaving the device. When the Alias hears its own (customizable) wake word, it'll stop broadcasting white noise and wake up Alexa or Google Assistant so you can use them as normal.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Reddit Security Incident

IT Security Nachrichten vom 16.01.2019 um 00:02 Uhr | Quelle informationsecuritybuzz.com

Following the news that Reddit has locked user accounts whilst it investigates a potential security incident, Raj Samani, Chief Scientist and McAfee Fellow commented below. Raj Samani, Chief Scientist and McAfee: “Again, 330 million users find themselves grappling with the fact that hackers might have had the potential to access a treasure trove of their data, putting their privacy …

The ISBuzz Post: This Post Reddit Security Incident appeared first on Information Security Buzz.


Newsbewertung

Weiterlesen

Google Docs, Sheets, Slides, and Sites Get Material Design

IT Security Nachrichten vom 16.01.2019 um 00:00 Uhr | Quelle bleepingcomputer.com
Google announced the adoption of Material Design in its Docs, Sheets, Slides, and Sites G Suite applications on the web, a new product look and feel which will be turned on by default for all end users [...]
Newsbewertung

Weiterlesen

IDenticard Zero-Days Allow Corporate Building Access, Location Recon

IT Security Nachrichten vom 15.01.2019 um 23:43 Uhr | Quelle threatpost.com
Multiple hardcoded passwords allow attackers to create badges to gain building entry, access video surveillance feeds, manipulate databases and more.
Newsbewertung

Weiterlesen

US Now Says All Online Gambling Illegal, Not Just Sports Bets

IT Security Nachrichten vom 15.01.2019 um 23:40 Uhr | Quelle news.slashdot.org
An anonymous reader quotes a report from Bloomberg: The U.S. Justice Department's decision that all internet gambling is illegal will cast a pall on the industry as businesses and state lotteries evaluate the implications of the change and the government's plans to enforce it. The U.S. now says federal law bars all internet gambling, reversing its position from 2011 that only sports betting is prohibited under a law passed 50 years earlier. Although the federal law specifically prohibits transmission of wagers and related information across state lines, the Justice Department's new interpretation will impact all online gambling because as a practical matter it's difficult to guarantee that no payments are routed through other states, said Aaron Swerdlow, an attorney with Glaser Weil Fink Howard Avchen & Shapiro LLP in Los Angeles. The reversal was prompted by the department's criminal division, which prosecutes illegal gambling. The opinion issued about seven years ago that the 1961 Wire Act only banned sports gambling was a misinterpretation of the statute, according to a 23-page opinion by the department's Office of Legal Counsel dated Nov. 2 and made public Monday. The new reading of the law probably will be tested in the courts as judges may entertain challenges to the government's view of the law's scope, the Justice Department said. It may also affect states that began selling lottery tickets online after the 2011 opinion, as well as casinos that offer online gambling. In contrast, the Supreme Court last May "cleared the way [...] for states to legalize sports betting, striking down a 1992 federal law that had prohibited most states from authorizing sports betting."

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Senator Leahy Questions Barr about Carpenter Case, Future of Privacy

IT Security Nachrichten vom 15.01.2019 um 23:33 Uhr | Quelle reddit.com
Senator Leahy Questions Barr about Carpenter Case, Future of Privacy submitted by /u/filthyheathenmonkey
[link] [comments]

Newsbewertung

Weiterlesen

'It's like they took a rug and covered it up': Flight booking web app used by scores of airlines still vuln to attack – claim

IT Security Nachrichten vom 15.01.2019 um 23:26 Uhr | Quelle go.theregister.com

Security hole can still be exploited to tamper with journeys, warn infosec bods

Exclusive  A security hole in a widely used airline reservation system remains open to exploit, allowing miscreants to edit strangers' travel details online, The Register has learned. A fix to close the vulnerability was incomplete, and thus ineffective, it is claimed.…


Newsbewertung

Weiterlesen

Researchers say people over 65 are seven times more likely to share fake news than 18 to 29-year-olds.

IT Security Nachrichten vom 15.01.2019 um 23:21 Uhr | Quelle reddit.com
Researchers say people over 65 are seven times more likely to share fake news than 18 to 29-year-olds. submitted by /u/RonaldvanderMeer
[link] [comments]

Newsbewertung

Weiterlesen

Firefox 69 Will Disable Adobe Flash Plugin by Default

IT Security Nachrichten vom 15.01.2019 um 23:01 Uhr | Quelle news.slashdot.org
Mozilla will take the next major step in disabling support for the Adobe Flash plugin later this year when it releases Firefox 69. From a report: Firefox 69 will be Mozilla's third last step to completely dropping support for the historically buggy plugin, which will reach end of life on December 31, 2020. Flash is the last remaining NPAPI plugin that Firefox supports. Mozilla flagged the change, spotted by Ghacks, in a new bug report that notes "we'll disable Flash by default in Nightly 69 and let that roll out". Firefox 69 stable will be released in early September, according to Mozilla's release calendar.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Zero-Day Vulnerabilities Leave Smart Buildings Open to Cyber Attacks

IT Security Nachrichten vom 15.01.2019 um 22:56 Uhr | Quelle bleepingcomputer.com
A team of researchers discovered six zero-day vulnerabilities in protocols and individual components used in smart buildings. The flaws could be used to steal sensitive information, access or delete critical files, or perform malicious actions. [...]
Newsbewertung

Weiterlesen

Data Breach Roundup: U.S. Healthcare, Cryptopia, SingHealth and Experian

IT Security Nachrichten vom 15.01.2019 um 22:44 Uhr | Quelle threatpost.com
January is off to a running start on the data breach front, while Experian is predicting new attack frontiers ahead.
Newsbewertung

Weiterlesen

REAL ID Puts Personal and National Security At Risk

IT Security Nachrichten vom 15.01.2019 um 22:40 Uhr | Quelle reddit.com
REAL ID Puts Personal and National Security At Risk submitted by /u/BBQCopter
[link] [comments]

Newsbewertung

Weiterlesen

Mit report also claims researchers rarely make good money from them

IT Security Nachrichten vom 15.01.2019 um 22:21 Uhr | Quelle reddit.com
Mit report also claims researchers rarely make good money from them submitted by /u/RonaldvanderMeer
[link] [comments]

Newsbewertung

Weiterlesen

Apple Replaced 11 Million iPhone Batteries in Its $29 Program

IT Security Nachrichten vom 15.01.2019 um 22:21 Uhr | Quelle apple.slashdot.org
Apple's $29 battery replacement program may have seriously dinged sales of its 2018 iPhone models. From a report: The company replaced 11 million iPhone batteries under the program, John Gruber of tech-focused blog DaringFireball reported Monday, citing Apple CEO Tim Cook at an all-hands meeting. Typically, the company replaces 1 million to 2 million batteries each year, DaringFireball noted. Cook cited the program's negative impact on Apple's revenue in a Jan. 2 sales warning to investors but didn't offer specific numbers.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Sharing Geo-location Information

IT Security Nachrichten vom 15.01.2019 um 22:00 Uhr | Quelle informationsecuritybuzz.com

An investigative report by Motherboard has uncovered how geo-location data frommobile carriers such as T-Mobile, Sprint and AT&T have been shared with third-party partners who sell the information to unauthorized entities not licensed to possess it. The story focused on a company known as Microbilt, that was found to sell geolocation information without regard to …

The ISBuzz Post: This Post Sharing Geo-location Information appeared first on Information Security Buzz.


Newsbewertung

Weiterlesen

US charges Ukrainian for SEC 2016 hack, others for insider trading

IT Security Nachrichten vom 15.01.2019 um 21:54 Uhr | Quelle zdnet.com
Hacker also participated in the notorious hack of three newswire services in 2014.
Newsbewertung

Weiterlesen

Windows 10 Version 1803 Cumulative Update Build 17134.556 Released

IT Security Nachrichten vom 15.01.2019 um 21:41 Uhr | Quelle bleepingcomputer.com
Microsoft says that 17134.556 for Windows 10 April 2018 Update includes quality improvements and no new features are being introduced in this update. [...]
Newsbewertung

Weiterlesen

CERN's New Collider Design Is Four Times Larger Than the LHC

IT Security Nachrichten vom 15.01.2019 um 21:41 Uhr | Quelle science.slashdot.org
If built, the Future Circular Collider will be 10 times more powerful than the Large Hadron Collider, and could discover new types of particles. From a report: The 2012 discovery of the Higgs boson particle at CERN's Large Hadron Collider (LHC) is widely considered to be one of the most important scientific breakthroughs in history. It validated a half-century of research about the basic building blocks of matter, and remains the crowning achievement of modern particle physics. Now, CERN wants to follow up on the LHC's smashing success with a super-sized structure called the Future Circular Collider (FCC). This next-generation particle accelerator would boast 10 times the observational power of the LHC and would stretch across 100 kilometers (62 miles), encircling the Swiss city of Geneva and much of the surrounding area. CERN published its first conceptual design report for the FCC on Tuesday. The four-volume roadmap was developed over five years by 1,300 contributors based at 150 universities, according to a statement.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Snyk - CLI And Build-Time Tool To Find & Fix Known Vulnerabilities In Open-Source Dependencies

IT Security Nachrichten vom 15.01.2019 um 21:38 Uhr | Quelle feedproxy.google.com

Snyk helps you find, fix and monitor known vulnerabilities in Node.js npm, Ruby and Java dependencies, both on an ad hoc basis and as part of your CI (Build) system.

Documentation
Full documentation is available on snyk.io

Installation
  1. Install the Snyk utility using npm install -g snyk.
  2. Once installed you will need to authenticate with your Snyk account: snyk auth
For more detail on how to authenticate take a look at the CLI authentication section of the Snyk documentation.

CLI
snyk [options] [command] [package]
Run snyk --help to get a quick overview of all commands or for full details on the CLI read the snyk.io CLI docs.
The package argument is optional. If no package is given, Snyk will run the command against the current working directory allowing you test you non-public applications.

Features
  • Find known vulnerabilities by running snyk test on a project either as a one off or as part of your CI process.
  • Fix vulnerabilities using snyk wizard and snyk protect.
    • snyk wizard walks you through finding and fixing known vulnerabilities in your project. Remediation options include configuring your policy file to update, auto patch and ignore vulnerabilities. (npm only)
    • snyk protect your code from vulnerabilities by applying patches and optionally suppressing specific vulnerabilities.
  • Alert snyk monitor records the state of dependencies and any vulnerabilities on snyk.io so you can be alerted when new vulnerabilities or updates/patches are disclosed that affect your repositories.
  • Prevent new vulnerable dependencies from being added to your project by running snyk test as part of your CI to fail tests when vulnerable Node.js or Ruby dependencies are added.

Docker
Snyk is also provided as a set of Docker images that carry the runtime environment of each package manager. For example, the npm image will carry all of the needed setup to run npm install on the currently running container. Currently there are images for npm, Ruby, Maven, Gradle and SBT.
The images can perform snyk test by default on the specified project which is mounted to the container as a read/write volume, and snyk monitor if the MONITOR environment variable is set when running the docker container. When running snyk monitor with the GENERATE_REPORT environment variable set, an HTML file called snyk_report.html and a CSS file called snyk_report.css will be generated. The image also writes a file called snyk-res.json for internal use and snyk-error.log for errors that we can look at if something goes wrong.
The following environment variables can be used when running the container on docker:
  • SNYK_TOKEN - Snyk API token, obtained from https://snyk.io/account.
  • USER_ID - [OPTIONAL] Current user ID on the host machine. If not provided will take the user ID of the currently running user inside the container. This is used for CI builds such as Jenkins where we are running with a non-privileged user and want to allow the user to access the mounted project folder.
  • MONITOR - [OPTIONAL] If set, tells the image that we want to run snyk monitor after running snyk test.
  • PROJECT_FOLDER - [OPTIONAL] If set, this will cd to the directory inside the mounted project dir to run snyk inside it.
  • ENV_FLAGS - [OPTIONAL] additional environment parameters to pass to snyk test when running the container.
Docker images are tagged according to the package manager runtime they include, the package manager version and snyk version. The general format of tags is [snyk-version]-[package-manager]-[package-manager-version] or just [package-manager]-[package-manager-version] if we want to use the latest version of snyk. Please see available tags to see the available options.
[snyk-version] - The version of snyk that is installed in the image, if version is omitted it will use the latest version. [package-manager] - One of the available package managers (e.g: npm, mvn, gradle, etc...).
[package-manager-version] - The version of the package manager that is installed inside the image.
Please see the following examples on how to run Snyk inside docker:

Node.js (npm)
We will need to mount the project root folder when running the image so that Snyk can access the code within the container. The host project folder will be mounted to /project on the container and will be used to read the dependencies file and write results for CI builds. Here's an example of running snyk test and snyk monitor in the image (with the latest version of Snyk) for npm:
docker run -it
-e "SNYK_TOKEN=<TOKEN>"
-e "USER_ID=1234"
-e "MONITOR=true"
-v "<PROJECT_DIRECTORY>:/project"
snyk/snyk-cli:npm test --org=my-org-name

RubyGems
We will need to mount the project root folder when running the image so that Snyk can access the code within the container. The host project folder will be mounted to /project on the container and will be used to read the dependencies file and write results for CI builds. Here's an example of running snyk test and snyk monitor in the image (with the latest version of Snyk) for RubyGems:
docker run -it
-e "SNYK_TOKEN=<TOKEN>"
-e "USER_ID=1234"
-e "MONITOR=true"
-v "<PROJECT_DIRECTORY>:/project"
snyk/snyk-cli:rubygems test --org=my-org-name

Maven 3.5.4
We will need to mount the project root folder when running the image so that Snyk can access the code within the container and mount the local .m2 and .ivy2 folders. The host project folder will be mounted to /project on the container and will be used to read the dependencies file and write results for CI builds. Here's an example of running snyk test and snyk monitor in the image (with the latest version of Snyk) for Maven:
docker run -it
-e "SNYK_TOKEN=<TOKEN>"
-e "USER_ID=1234"
-e "MONITOR=true"
-v "<PROJECT_DIRECTORY>:/project"
-v "/home/user/.m2:/home/node/.m2"
-v "/home/user/.ivy2:/home/node/.ivy2"
snyk/snyk-cli:maven-3.5.4 test --org=my-org-name

SBT 0.13.16 / SBT 1.0.4
We will need to mount the project root folder when running the image so that Snyk can access the code within the container and mount the local .m2 and .ivy2 folders. The host project folder will be mounted to /project on the container and will be used to read the dependencies file and write results for CI builds. Here are examples of running snyk test and snyk monitor in the image (with the latest version of Snyk) for SBT:
NOTE: the dependency-tree module is required for snyk to process Scala projects. Use version 0.8.2 for SBT 0.13.16 and version 0.9.0 for version SBT 1.0.4.
docker run -it
-e "SNYK_TOKEN=<TOKEN>"
-e "USER_ID=1234"
-e "MONITOR=true"
-v "<PROJECT_DIRECTORY>:/project"
-v "/home/user/.m2:/home/node/.m2"
-v "/home/user/.ivy2:/home/node/.ivy2"
snyk/snyk-cli:sbt-0.13.16 test --org=my-org-name
docker run -it
-e "SNYK_TOKEN=<TOKEN>"
-e "USER_ID=1234"
-e "MONITOR=true"
-v "<PROJECT_DIRECTORY>:/project"
-v "/home/user/.m2:/home/node/.m2"
-v "/home/user/.ivy2:/home/node/.ivy2"
snyk/snyk-cli:sbt-1.0.4 test --org=my-org-name

Gradle 2.8 / Gradle 4.4
We will need to mount the project root folder when running the image so that Snyk can access the code within the container and mount the local .m2 and .ivy2 folders. The host project folder will be mounted to /project on the container and will be used to read the dependencies file and write results for CI builds. Here's an example of running snyk test and snyk monitor in the image (with the latest version of Snyk) for Gradle:
docker run -it
-e "SNYK_TOKEN=<TOKEN>"
-e "USER_ID=1234"
-e "MONITOR=true"
-v "<PROJECT_DIRECTORY>:/project"
-v "/home/user/.m2:/home/node/.m2"
-v "/home/user/.ivy2:/home/node/.ivy2"
snyk/snyk-cli:gradle-2.8 test --org=my-org-name
docker run -it
-e "SNYK_TOKEN=<TOKEN>"
-e "USER_ID=1234"
-e "MONITOR=true"
-v "<PROJECT_DIRECTORY>:/project"
-v "/home/user/.m2:/home/node/.m2"
-v "/home/user/.ivy2:/home/node/.ivy2"
snyk/snyk-cli:gradle-4.4 test --org=my-org-name



Newsbewertung

Weiterlesen

Unreal Engine - Das sind die Gaming-Highlights im Jahr 2019

IT Security Nachrichten vom 15.01.2019 um 21:32 Uhr | Quelle winfuture.de
Trailer, Epic Games, Videospiele, Computerspiele, unreal engine 4, Unreal Engine, Grafik-Engine Epic Games zeigt in einem Trailer einige der am meisten erwarteten Spiele des Jahres 2019, die auf Grundlage der Unreal Engine entwickelt werden. Dazu zählen etwa Highlights wie Assetto Corsa Competizione, Gears 5 oder Biomutant. (Weiter lesen)
Newsbewertung

Weiterlesen

microsoft has vexed its windows 7 users with a misbehaving update that caused licensing and networking errors.

IT Security Nachrichten vom 15.01.2019 um 21:21 Uhr | Quelle reddit.com
microsoft has vexed its windows 7 users with a misbehaving update that caused licensing and networking errors. submitted by /u/RonaldvanderMeer
[link] [comments]

Newsbewertung

Weiterlesen

Microsoft Says Outlook Mobile Now Ready For Pentagon Use

IT Security Nachrichten vom 15.01.2019 um 21:16 Uhr | Quelle bleepingcomputer.com
Outlook for iOS and Android can now be used by Department of Defense and Office 365 US Government Community Cloud High customers after their architecture was updated to use native Microsoft sync technology with direct connections to the already compliant Exchange Online backend services [...]
Newsbewertung

Weiterlesen

Microsoft Says Outlook Mobile Now Ready For Pentagon Use

IT Security Nachrichten vom 15.01.2019 um 21:16 Uhr | Quelle bleepingcomputer.com
Outlook for iOS and Android can now be used by Department of Defense and Office 365 US Government Community Cloud High customers after their architecture was updated to use native Microsoft sync technology with direct connections to the already compliant Exchange Online backend services [...]
Newsbewertung

Weiterlesen

Microsoft is Preparing For Foldable Windows Devices, Report Says

IT Security Nachrichten vom 15.01.2019 um 21:01 Uhr | Quelle hardware.slashdot.org
Microsoft is working on adapting Windows to work on foldable devices, The Verge reported Tuesday, citing sources familiar with the matter. The report further added that the company is making foldable devices and dual-screen hardware a big investment area for both Windows and Surface. From the report: This investment includes adapting Windows itself and its many built-in apps to work across foldable displays and devices with dual screens. While Microsoft has been experimenting with its own hardware with dual-screens, codenamed Andromeda, the company has also been working with Intel and other OEMs to be ready for the next few years of experimentation. PC makers famously developed a range of 2-in-1 devices for Windows 8 more than five years ago, and we're expecting to see a similar effort for dual-screen and foldable devices for Windows in the coming years. Most of this work is related to Microsoft's Composable Shell (C-Shell) and Windows Core OS, a more modular version of the existing Windows Shell that powers many parts of Windows 10 today.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Microsoft is Preparing For Foldable Windows Devices, Report Says

IT Security Nachrichten vom 15.01.2019 um 21:01 Uhr | Quelle hardware.slashdot.org
Microsoft is working on adapting Windows to work on foldable devices, The Verge reported Tuesday, citing sources familiar with the matter. The report further added that the company is making foldable devices and dual-screen hardware a big investment area for both Windows and Surface. From the report: This investment includes adapting Windows itself and its many built-in apps to work across foldable displays and devices with dual screens. While Microsoft has been experimenting with its own hardware with dual-screens, codenamed Andromeda, the company has also been working with Intel and other OEMs to be ready for the next few years of experimentation. PC makers famously developed a range of 2-in-1 devices for Windows 8 more than five years ago, and we're expecting to see a similar effort for dual-screen and foldable devices for Windows in the coming years. Most of this work is related to Microsoft's Composable Shell (C-Shell) and Windows Core OS, a more modular version of the existing Windows Shell that powers many parts of Windows 10 today.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

How to completely secure an unsecure computer?

IT Security Nachrichten vom 15.01.2019 um 20:53 Uhr | Quelle reddit.com

I have a computer that I believe may be hacked. How do I secure it and my wireless connections? It is a 10 year old macbook pro that has been recently upgraded with more memory. It runs high sierra.

Any ideas?

submitted by /u/CSS_Programmer
[link] [comments]
Newsbewertung

Weiterlesen

How to completely secure an unsecure computer?

IT Security Nachrichten vom 15.01.2019 um 20:53 Uhr | Quelle reddit.com

I have a computer that I believe may be hacked. How do I secure it and my wireless connections? It is a 10 year old macbook pro that has been recently upgraded with more memory. It runs high sierra.

Any ideas?

submitted by /u/CSS_Programmer
[link] [comments]
Newsbewertung

Weiterlesen

Neue kumulative Updates für Windows 10, außer für das Oktober Update

IT Security Nachrichten vom 15.01.2019 um 20:52 Uhr | Quelle winfuture.de
Microsoft, Windows 10, Startmenü, Windows 10 Lean Microsoft hat nach dem Januar-Patch-Day in der vergangenen Woche neue Aktualisierungen für Windows 10 herausgegeben. Die kumulativen Updates stehen für Windows 10 1803, 1709 und 1703 bereit. Derzeit ist noch keine Aktualisierung für das Windows 10 Oktober Update aka Version 1809 in Sicht. (Weiter lesen)
Newsbewertung

Weiterlesen

Neue kumulative Updates für Windows 10, außer für das Oktober Update

IT Security Nachrichten vom 15.01.2019 um 20:52 Uhr | Quelle winfuture.de
Microsoft, Windows 10, Startmenü, Windows 10 Lean Microsoft hat nach dem Januar-Patch-Day in der vergangenen Woche neue Aktualisierungen für Windows 10 herausgegeben. Die kumulativen Updates stehen für Windows 10 1803, 1709 und 1703 bereit. Derzeit ist noch keine Aktualisierung für das Windows 10 Oktober Update aka Version 1809 in Sicht. (Weiter lesen)
Newsbewertung

Weiterlesen

Researchers Link Chilean Interbank Attack to North Korea

IT Security Nachrichten vom 15.01.2019 um 20:46 Uhr | Quelle feedproxy.google.com

A recently disclosed attack on Chilean interbank network Redbanc appears linked to notorious North Korean hacking group Lazarus, Flashpoint reports. 

read more


Newsbewertung

Weiterlesen

Researchers Link Chilean Interbank Attack to North Korea

IT Security Nachrichten vom 15.01.2019 um 20:46 Uhr | Quelle feedproxy.google.com

A recently disclosed attack on Chilean interbank network Redbanc appears linked to notorious North Korean hacking group Lazarus, Flashpoint reports. 

read more


Newsbewertung

Weiterlesen

Two Hackers Charged with Hacking SEC System in Stock-Trading Scheme

IT Security Nachrichten vom 15.01.2019 um 20:34 Uhr | Quelle feedproxy.google.com
The U.S. authorities have charged two Ukrainian hackers for hacking into the Securities and Exchange Commission's EDGAR filing system and stealing sensitive market-moving reports of companies before their public release. EDGAR, or Electronic Data Gathering, Analysis, and Retrieval, is an online filing system wherein companies submit their financial filings. The system processes around 1.7

Newsbewertung

Weiterlesen

Seitennavigation

Seite 1 von 3.246 Seiten (Bei Beitrag 1 - 35)
113.600x Beiträge in dieser Kategorie

Nächste 2 Seite | Letzte Seite
[ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ]