1. IT-Security >
  2. Cyber Security Nachrichten


ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese

Nachrichten


Suchen

News RSS Quellen: 82x
News Kategorien unterhalb von Nachrichten: 0x
News RSS Feeds dieser Nachrichten Kategorie: RSS Feed IT Security Nachrichten
Benutze Feedly zum Abonieren.Folge uns auf feedly
Download RSS Feed App für Windows 10 Store (Leider gibt es nicht mehr viele Extensions mit welchen Sie RSS-Feeds in einer Software abonieren können. Der Browser Support für RSS-Feeds wurde eingestellt (Firefox,Chrome).

Eigene IT Security Webseite / Blog / Quelle hinzufügen

Seitennavigation

Seite 2 von 3.995 Seiten (Bei Beitrag 35 - 70)
139.800x Beiträge in dieser Kategorie

Auf Seite 1 zurück | Nächste 3 Seite | Letzte Seite

[ 1 ] [2] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ]

CrossFit Storms Off Facebook and Instagram

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: tech.slashdot.org Direktlink direkt öffnen

"CrossFit, the branded workout regimen, deleted its Facebook and Instagram pages earlier this week and explained the reasoning through an impassioned press release," reports the Verge. TechSpot has more details: In a press release, CrossFit revealed the breaking point: the deletion of the Banting7DayMealPlan user group, without warning or explanation. Banting is an alternative high-fat low-carb diet with no set meal times or processed foods, and its Facebook group had 1.65 million users, including 1 million from South Africa. The group mostly posts testimonials and discusses the merits of the diet or how it might be implemented. While the group has been reinstated (still without explanation), CrossFit is right to call into question why Facebook removed it in the first place. While Banting is probably inadvisable, groups advocating for it have a right to exist. Still, that's far from the only reason CrossFit abandoned the platforms... CrossFit sees itself as a community of 15,000 affiliates and millions of individuals against "an unholy alliance of academia, government, and multinational food, beverage, and pharmaceutical companies," according to their press release -- so they may be feeling vulnerable. CrossFit, Inc. defends relentlessly the right of its affiliates, trainers, and athletes to practice CrossFit, build voluntary CrossFit associations and businesses, and speak openly and freely about the ideas and principles that animate our views of exercise, nutrition, and health... Facebook and its properties host and oversee a significant share of the marketplace of public thought... Facebook thus serves as a de facto authority over the public square, arbitrating a worldwide exchange of information as well as overseeing the security of the individuals and communities who entrust their ideas, work, and private data to this platform. This mandates a certain responsibility and assurance of good faith, transparency, and due process. CrossFit, Inc., as a voluntary user of and contributor to this marketplace, can and must remove itself from this particular manifestation of the public square when it becomes clear that such responsibilities are betrayed or reneged upon to the detriment of our community. CrossFit says they're "suspending" all activity on the platforms while they investigate "the circumstances pertaining to Facebook's deletion of the Banting7DayMealPlan and other well-known public complaints about the social-media company," adding that CrossFit "will no longer support or use Facebook's services until further notice."

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

Is Go Google's Programming Language, Not Ours?

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: developers.slashdot.org Direktlink direkt öffnen

Chris Siebenmann is a Unix sys-admin for the CS department at the University of Toronto. He recently saw a tweet asking about the possibility of community-implemented generics for the Go programming language, and posted a widely-read response on his blog. "There are many answers for why this won't happen, but one that does not usually get said out loud is that Go is Google's language, not the community's." Yes, there's a community that contributes things to Go, some of them important and valued things; you only have to look at the diversity of people in CONTRIBUTORS or see the variety of people appearing in the commits. But Google is the gatekeeper for these community contributions; it alone decides what is and isn't accepted into Go. To the extent that there even is a community process for deciding what is accepted, there is an 800-pound gorilla in the room. Nothing is going to go into Go that Google objects to, and if Google decides that something needs to be in Go, it will happen. (The most clear and obvious illustration of this is what happened with Go modules, where one member of Google's Go core team discarded the entire system the outside Go community had been working on in favour of a relatively radically different model. See eg for one version of this history.) Or in short, Go has community contributions but it is not a community project. It is Google's project. This is an unarguable thing, whether you consider it to be good or bad, and it has effects that we need to accept. For example, if you want some significant thing to be accepted into Go, working to build consensus in the community is far less important than persuading the Go core team. (As a corollary, sinking a lot of time and effort into a community effort that doesn't have enthusiastic buy-in from the Go core team is probably a waste of time....) On the good and bad scale, there is a common feeling that Go has done well by having a small core team with good taste and a consistent vision for the language, a team that is not swayed by outside voices and is slow moving and biased to not making changes. The essay also concedes that "I like Go and have for a fair while now, and I'm basically okay with how the language has been evolving and how the Go core team has managed it. I certainly think it's a good idea to take things like generics slowly. "But at the same time, how things developed around Go modules has left a bad taste in my mouth and I now can't imagine becoming a Go contributor myself, even for small trivial changes."

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

A Closer Look at the New Windows 10 Light Theme

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: bleepingcomputer.com Direktlink direkt öffnen

The headline feature of Windows 10 May 2019 Update is probably the Windows Sandbox, but another useful addition is the new light theme for your Windows desktop. [...]
News Bewertung

Weiterlesen Weiterlesen

Fast and Secure Blockchain Platform. Full Source Code on GitHub

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

The Credits blockchain platform meets the wishes of all crypto communities and presented on the 16th of May the full source code of the most decentralized blockchain platforms in the world.

Credits publishes the entire source code that is aligned with the latest state of Credits software. All updates, optimizations and hotfixes will occur on GitHub. At present time the following list of components is available on GitHub:

  • Network
  • Storage
  • Consensus Protocol
  • API
  • Smart Contracts
  • Monitor
  • Web Wallet and etc.

Credits team trusts that this move will increase the transparency of development process, will attract new audience and will speed up the growth of Credits blockchain ecosystem.

Right now Credits programmers are refreshing the documentation that is required for developers of blockchain-based products and services to wrap up in technology and its features. A Bug Bounty Program will be launched shortly after that.

Credits company is focused to invite all developers to participate in the process of platform development. Any developer is able to track the whole history of Credits code updates on official GitHub. Go ahead! Be on the same wavelength with the most innovative technology!

submitted by /u/Mindreactions
[link] [comments]
News Bewertung

Weiterlesen Weiterlesen

Strict 'Do Not Track' Law Proposed By US Senator

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: yro.slashdot.org Direktlink direkt öffnen

This week a Republican senator "unveiled a 'Do Not Track' bill with tough penalties for companies who break its protections," reports The Hill. Trailrunner7 shares more information from the security news site Decipher: Senator Hawley's bill makes the Federal Trade Commission the enforcement authority for the system and any person who violates the measure would be liable for penalties of $50 per user affected by a violation for every day that the violation is ongoing. "Big tech companies collect incredible amounts of deeply personal, private data from people without giving them the option to meaningfully consent. They have gotten incredibly rich by employing creepy surveillance tactics on their users, but too often the extent of this data extraction is only known after a tech company irresponsibly handles the data and leaks it all over the internet," Hawley said. "The American people didn't sign up for this, so I'm introducing this legislation to finally give them control over their personal information online.... [The bill] just says that a consumer can make a one time choice to not be tracked. I think we should make it compulsory and give it the force of law and give consumers real choice and force the companies to comply." DuckDuckGo's founder had proposed similar legislation, and the Hill reports that he's since been approached by "a few other" U.S. lawmakers. They also remind readers that a 2010 push for Do Not Track legislation "never panned out amid enormous pressure from industry representatives, who could not come to an agreement over what 'tracking' means in the first place... "Consumer advocates and tech industry critics say Hawley's bill could find better traction amid a larger backlash against tech behemoths including Google, Facebook and Amazon."

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

Requesting advice regarding a Twitter link texted to me

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

Long story, will try to keep it short. Last week, I was being harassed by coworkers. HR got involved, several parties are now on suspension. Shortly after the parties involved left the building, I received a strange text with a "t.co" hyperlink and some accompanying wording which leads me to believe that it is related to the situation going on at my work. I have NOT clicked the link, but Google says that it's a Twitter link. I have tried to type the sequence of letters and numbers into a browser, but that does not seem to work. Is there any way to know where this link leads without exposing my phone to a virus or some other damage? I have notified HR of this development, but they initially seemed skeptical that the text was related to this harassment situation. I am 99% sure this is retaliation and seeing what the link leads to may prove it. (Also, if there's a more appropriate sub to post this in, please let me know. I tried r/twitter, but there doesn't seem to be much going on over there.) Thank You

submitted by /u/Cleveland_Protocol
[link] [comments]
News Bewertung

Weiterlesen Weiterlesen

Requesting advice regarding a Twitter link texted to me

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

Long story, will try to keep it short. Last week, I was being harassed by coworkers. HR got involved, several parties are now on suspension. Shortly after the parties involved left the building, I received a strange text with a "t.co" hyperlink and some accompanying wording which leads me to believe that it is related to the situation going on at my work. I have NOT clicked the link, but Google says that it's a Twitter link. I have tried to type the sequence of letters and numbers into a browser, but that does not seem to work. Is there any way to know where this link leads without exposing my phone to a virus or some other damage? I have notified HR of this development, but they initially seemed skeptical that the text was related to this harassment situation. I am 99% sure this is retaliation and seeing what the link leads to may prove it. (Also, if there's a more appropriate sub to post this in, please let me know. I tried r/twitter, but there doesn't seem to be much going on over there.) Thank You

submitted by /u/Cleveland_Protocol
[link] [comments]
News Bewertung

Weiterlesen Weiterlesen

So macht UBS das digitale Banking sicher

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: google.com Direktlink direkt öffnen

Sicherheit steht bei der UBS seit jeher an oberster Stelle; die Bank beschäftigt sich seit dem Beginn von Digital Banking sehr intensiv mit IT-Security.
News Bewertung

Weiterlesen Weiterlesen

SSHD-Poison - A Tool To Get Creds Of Pam Based SSHD Authentication

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: feedproxy.google.com Direktlink direkt öffnen

sshd-poison is a tool to get creds of pam based sshd authentication, this is not the easiest way to do that (you can create a pam module, or just add auth optional pam_exec.so quiet expose_authtok /bin/bash -c {read,-r,x};{echo,-e,"`env`\n$x"}>>somefile in a service configuration), not even the stealthiest (the tool don't have any mechanism to try hide yourself, and needs control the main sshd pid all the time), but code this gave me a lot of fun.

How it works
The tool starts attaching the main sshd pid and wait for some events, when a new process is created, it means that a new connection was started, after that the tool will wait for an execve event, then checks if the program executed is the same as the main pid, to ensure a re-exec (this is why we need take control of the main pid, every re-exec will erase any memory modification), then a breakpoint are set in the entry point of the new process, for wait the program load the shared librarys. When it's done and the breakpoint has hit, it are unset, the program will write the shellcode to a code cave, and the GOT entry for pam_set_item, used by libpam, will be changed, to hook internal libpam call to pam_set_item function.
The log format are password\0rhost\0user\0.
This will only works with x86_64 PIE binaries, and kernel 3.4 or early (PTRACE_SEIZE), I tested this with OpenSSH_8.0p1, OpenSSL 1.1.1b 26 Feb 2019 with kernel 5.0.13-arch1-1-ARCH and OpenSSH_7.9p1 Debian-10, OpenSSL 1.1.1b 26 Feb 2019 with kernel 4.19.0-kali3-amd64

Compiling
git clone --recurse-submodules https://github.com/hc0d3r/sshd-poison
cd sshd-poison
make

Demo




News Bewertung

Weiterlesen Weiterlesen

SSHD-Poison - A Tool To Get Creds Of Pam Based SSHD Authentication

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: feedproxy.google.com Direktlink direkt öffnen

sshd-poison is a tool to get creds of pam based sshd authentication, this is not the easiest way to do that (you can create a pam module, or just add auth optional pam_exec.so quiet expose_authtok /bin/bash -c {read,-r,x};{echo,-e,"`env`\n$x"}>>somefile in a service configuration), not even the stealthiest (the tool don't have any mechanism to try hide yourself, and needs control the main sshd pid all the time), but code this gave me a lot of fun.

How it works
The tool starts attaching the main sshd pid and wait for some events, when a new process is created, it means that a new connection was started, after that the tool will wait for an execve event, then checks if the program executed is the same as the main pid, to ensure a re-exec (this is why we need take control of the main pid, every re-exec will erase any memory modification), then a breakpoint are set in the entry point of the new process, for wait the program load the shared librarys. When it's done and the breakpoint has hit, it are unset, the program will write the shellcode to a code cave, and the GOT entry for pam_set_item, used by libpam, will be changed, to hook internal libpam call to pam_set_item function.
The log format are password\0rhost\0user\0.
This will only works with x86_64 PIE binaries, and kernel 3.4 or early (PTRACE_SEIZE), I tested this with OpenSSH_8.0p1, OpenSSL 1.1.1b 26 Feb 2019 with kernel 5.0.13-arch1-1-ARCH and OpenSSH_7.9p1 Debian-10, OpenSSL 1.1.1b 26 Feb 2019 with kernel 4.19.0-kali3-amd64

Compiling
git clone --recurse-submodules https://github.com/hc0d3r/sshd-poison
cd sshd-poison
make

Demo




News Bewertung

Weiterlesen Weiterlesen

Consumer Reports: Tesla's New Automatic Lane-Changing Is Much Worse Than a Human Driver

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: tech.slashdot.org Direktlink direkt öffnen

"Tesla's updated Navigate on Autopilot software now lets some drivers choose whether the car can automatically change lanes without his or her input," writes Consumer Reports -- before complaining that the feature "doesn't work very well and could create safety risks for drivers." An anonymous reader quotes their report: In practice, we found that the new Navigate on Autopilot lane-changing feature lagged far behind a human driver's skills. The feature cut off cars without leaving enough space, and even passed other cars in ways that violate state laws, according to several law enforcement representatives CR interviewed for this report. As a result, the driver often had to prevent the system from making poor decisions. "The system's role should be to help the driver, but the way this technology is deployed, it's the other way around," says Jake Fisher, Consumer Reports' senior director of auto testing. "It's incredibly nearsighted. It doesn't appear to react to brake lights or turn signals, it can't anticipate what other drivers will do, and as a result, you constantly have to be one step ahead of it...." Multiple testers reported that the Tesla often changed lanes in ways that a safe human driver wouldn't -- cutting too closely in front of other cars, and passing on the right. An area of particular concern is Tesla's claim that the vehicle's three rearward-facing cameras can detect fast-approaching objects from the rear better than the average driver can. Our testers found the opposite to be true in practice. "The system has trouble responding to vehicles that approach quickly from behind," Fisher says. "Because of this, the system will often cut off a vehicle that is going at a much faster speed, since it doesn't seem to sense the oncoming car until it's relatively close." Fisher says merging into traffic is another problem. "It is reluctant to merge in heavy traffic, but when it does, it often immediately applies the brakes to create space behind the follow car," he says, "and this can be a rude surprise to the vehicle you cut off... This isn't a convenience at all. Monitoring the system is much harder than just changing lanes yourself." In the article David Friedman, vice president of advocacy at Consumer Reports, complains that Tesla "is showing what not to do on the path toward self-driving cars: release increasingly automated driving systems that aren't vetted properly."

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

Consumer Reports: Tesla's New Automatic Lane-Changing Is Much Worse Than a Human Driver

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: tech.slashdot.org Direktlink direkt öffnen

"Tesla's updated Navigate on Autopilot software now lets some drivers choose whether the car can automatically change lanes without his or her input," writes Consumer Reports -- before complaining that the feature "doesn't work very well and could create safety risks for drivers." An anonymous reader quotes their report: In practice, we found that the new Navigate on Autopilot lane-changing feature lagged far behind a human driver's skills. The feature cut off cars without leaving enough space, and even passed other cars in ways that violate state laws, according to several law enforcement representatives CR interviewed for this report. As a result, the driver often had to prevent the system from making poor decisions. "The system's role should be to help the driver, but the way this technology is deployed, it's the other way around," says Jake Fisher, Consumer Reports' senior director of auto testing. "It's incredibly nearsighted. It doesn't appear to react to brake lights or turn signals, it can't anticipate what other drivers will do, and as a result, you constantly have to be one step ahead of it...." Multiple testers reported that the Tesla often changed lanes in ways that a safe human driver wouldn't -- cutting too closely in front of other cars, and passing on the right. An area of particular concern is Tesla's claim that the vehicle's three rearward-facing cameras can detect fast-approaching objects from the rear better than the average driver can. Our testers found the opposite to be true in practice. "The system has trouble responding to vehicles that approach quickly from behind," Fisher says. "Because of this, the system will often cut off a vehicle that is going at a much faster speed, since it doesn't seem to sense the oncoming car until it's relatively close." Fisher says merging into traffic is another problem. "It is reluctant to merge in heavy traffic, but when it does, it often immediately applies the brakes to create space behind the follow car," he says, "and this can be a rude surprise to the vehicle you cut off... This isn't a convenience at all. Monitoring the system is much harder than just changing lanes yourself." In the article David Friedman, vice president of advocacy at Consumer Reports, complains that Tesla "is showing what not to do on the path toward self-driving cars: release increasingly automated driving systems that aren't vetted properly."

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

Privacy issues roll on because tech giants have no competition, experts tell Congress

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

Privacy issues roll on because tech giants have no competition, experts tell Congress submitted by /u/mynameisalex1
[link] [comments]

News Bewertung

Weiterlesen Weiterlesen

If I make a purchase on public Wi-Fi with a website on https, am I safe?

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

If I am on public Wi-Fi (no VPN) and make a purchase on a website that uses https, can my credit card be sniffed?

submitted by /u/nootdude
[link] [comments]
News Bewertung

Weiterlesen Weiterlesen

The Biggest Mobile Security Threats - Smart Mobile Technology

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

The Biggest Mobile Security Threats - Smart Mobile Technology submitted by /u/Malkavius2
[link] [comments]

News Bewertung

Weiterlesen Weiterlesen

Why the US Air Force Is Investigating a Cyber Attack From the US Navy

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: tech.slashdot.org Direktlink direkt öffnen

"The Air Force is investigating the Navy for a cyber intrusion into its network, according to a memo obtained by Military Times." Zorro (Slashdot reader #15,797) shares their report: The bizarre turn of events stems from a decision by a Navy prosecutor to embed hidden tracking software into emails sent to defense attorneys, including one Air Force lawyer, involved in a high-profile war-crimes case of a Navy SEAL in San Diego. The tracking device was an attempt to find out who was leaking information to the editor of Navy Times, a sister publication. A similar tracking device was also sent to Carl Prine, the Navy Times editor, who has written numerous stories about the case. Navy Capt. David Wilson, chief of staff for the Navy's Defense Service Offices, wrote in the May 19 memo that an Air Force attorney was among the defense lawyers who had received emails with the hidden tracking software, which he described as "malware"... "In fact, I've learned that the Air Force is treating this malware as a cyber-intrusion on their network and have seized the Air Force Individual Military Counsel's computer and phone for review," he wrote.

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

How Internet Works?

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

Hi Folks , I know you may think what a shitty question is this but think little deeper and you will see that it's a very good question because as an ethical hacker you can't say to people that yes once you click a browser installed in your desktop a web page opens up and you type a keyword than the Google gives you some interesting response or answers and Boom..! This is how internet works.

The geek peoples around you might be expecting little more technical about like what happens when you click a browser and what registry are executed behind the processing unit etc..etc..

So is there anyone out who can help me out to find a perfect explanation. 🙄🙄

The research paper which I got over internet regarding the topic https://web.stanford.edu/class/msande91si/www-spr04/readings/week1/InternetWhitepaper.htm

submitted by /u/2TwoFace
[link] [comments]
News Bewertung

Weiterlesen Weiterlesen

Stolen NSA hacking tool now victimizing US cities, report says

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: cnet.com Direktlink direkt öffnen

The EternalBlue hacking exploit, already used in the infamous WannaCry and NotPetya attacks, has now surfaced in the NSA's own backyard, says The New York Times.
News Bewertung

Weiterlesen Weiterlesen

Did I just get hacked?

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

So I go to open Spotify today and I’m greeted with the login screen rather than just being taken straight in. Naturally I’m like “Uhh, ok? Guess I’ll just put the password in.” I put the pass but it says wrong password. I retype it 3 times and I start to get worried. I check my email and sure enough it says my password has been reset. Now I’m really worried. I follow the link the recover the account and I change the password myself this time. Above the Spotify email I get another email from twitch saying I had a successful login on May 25 from a windows 10 PC with the location at Paris, France. I live in the US. Now I start the panic and reset my twitch, google, Microsoft, and Apple ID and enable 2-step verification on everything. Am I safe now? I’m still a little paranoid. I tried to look up the IP address but everything is scrambled. Help?

submitted by /u/Doc_The_God
[link] [comments]
News Bewertung

Weiterlesen Weiterlesen

nokia investigated for illegally sending user data to china. and then after still lied about everything. are there any android companies that dont illegally sends data to china?

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

  1. does anyone know what are the main causes of this problem

  2. do all smartphone companies have this problem

  3. does any smartphone companies have a good reputation that is close to or near to that of iphones

  4. im not sure how large of a problem this problem is. do you know?

submitted by /u/bestminipc
[link] [comments]
News Bewertung

Weiterlesen Weiterlesen

Neal Stephenson Says Social Media Is Close To A 'Doomsday Machine'

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: news.slashdot.org Direktlink direkt öffnen

PC Magazine interviewed Neal Stephenson about his new upcoming book Fall; Or, Dodge in Hell, as well as "the digital afterlife, and why social media is a doomsday machine." [Possible spoilers ahead]: The hybrid sci-fi/fantasy novel begins in the present day with Richard "Dodge" Forthrast, an eccentric multibillionaire who made his fortune in the video game industry. When a freak accident during a routine medical procedure leaves him brain-dead, his family is left to contend with his request to have his brain preserved until the technology exists to bring him back to life. The near-future world of Fall is full of familiar buzzwords and concepts. Augmented reality headsets, next-gen wireless networks, self-driving vehicles, facial recognition, quantum computing, blockchain and distributed cryptography all feature prominently. Stephenson also spends a lot of time examining how the internet and social media, which Dodge and other characters often refer to in Fall as the Miasma, is irrevocably changing society and altering the fabric of reality... Q: How would you describe the current state of the internet? Just in a general sense of its role in our daily lives, and where that concept of the Miasma came from for you. Neal Stephenson: I ended up having a pretty dark view of it, as you can kind of tell from the book. I saw someone recently describe social media in its current state as a doomsday machine, and I think that's not far off. We've turned over our perception of what's real to algorithmically driven systems that are designed not to have humans in the loop, because if humans are in the loop they're not scalable and if they're not scalable they can't make tons and tons of money. The result is the situation we see today where no one agrees on what factual reality is and everyone is driven in the direction of content that is "more engaging," which almost always means that it's more emotional, it's less factually based, it's less rational, and kind of destructive from a basic civics standpoint... I sort of was patting myself on the back for really being on top of things and predicting the future. And then I discovered that the future was way ahead of me. I've heard remarks in a similar vein from other science-fiction novelists: do we even have a role anymore? Stephenson answered questions from Slashdot's reader in 2004, and since then has "spent years as an advisor for Amazon CEO Jeff Bezos' private space company Blue Origin," the article points out. He's also currently the "chief futurist" for Magic Leap -- though he tells his interviewer that some ideas go back much further. Part of his new book builds on "a really old idea" from security researcher Matt Blaze, who in the mid-1990s talked about "Encyclopedia Disinformatica", which Stephenson describes as "a sort of fake Wikipedia containing plausible-sounding but deliberately false information as a way of sending the message to people that they shouldn't just believe everything that they see on the internet."

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

In Baltimore and Beyond, a Stolen N.S.A. Tool Wreaks Havoc

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

In Baltimore and Beyond, a Stolen N.S.A. Tool Wreaks Havoc submitted by /u/dabeastfromunder
[link] [comments]

News Bewertung

Weiterlesen Weiterlesen

Systemd Now Has More Than 1.2 Million Lines of Code

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: linux.slashdot.org Direktlink direkt öffnen

This week Phoronix marked a very special anniversary: Five years ago today was the story on Phoronix how the systemd source tree was approaching 550k lines so curiosity got the best of me to see how large is the systemd Git repository today. Well, now it's over 1.2 million lines. After surpassing one million lines in 2017, when running GitStats on the systemd Git repository today it's coming in at 1,207,302 lines. Those 1.2 million lines are spread across 3,260 files and made over 40,057 commits from nearly 1,400 different authors... So far this year there have been 2,145 commits while last year saw 6,245 commits while 2016 and 2017 each saw less than four thousand commits total. Lennart Poettering continues being the most prolific contributor to systemd with more than 32% of the commits so far this year.

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

Recap of Recent Pieces on Just Security (May 20-25)

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: justsecurity.org Direktlink direkt öffnen

Pardons and military justice, Impeachment issues, Russia probe, U.S.-Iran Conflict, Assange indictment, European Union Parliamentary elections, Humanitarian assistance, Huawei, Congressional oversight and more...

The post Recap of Recent Pieces on Just Security (May 20-25) appeared first on Just Security.


News Bewertung

Weiterlesen Weiterlesen

Serious Security: Don’t let your SQL server attack you with ransomware

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: nakedsecurity.sophos.com Direktlink direkt öffnen

Tales from the honeypot: this time a MySQL-based attack. Old tricks still work, because we're still making old mistakes - here's what to do.
News Bewertung

Weiterlesen Weiterlesen

Sectigo Responds to Chronicle's Report About Malware Signed by Their Certs

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: bleepingcomputer.com Direktlink direkt öffnen

Following Chronicle's study on signed malware registered on VirusTotal scanning service over a one-year period, Sectigo carried their own investigation to identify abused certificates and revoke them. [...]
News Bewertung

Weiterlesen Weiterlesen

Sectigo Responds to Chronicle's Report About Malware Signed by Their Certs

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: bleepingcomputer.com Direktlink direkt öffnen

Following Chronicle's study on signed malware registered on VirusTotal scanning service over a one-year period, Sectigo carried their own investigation to identify abused certificates and revoke them. [...]
News Bewertung

Weiterlesen Weiterlesen

The Future of Web Filtering in the Era of 5G Networks

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: hackercombat.com Direktlink direkt öffnen

Security professionals and network administrators today are concerned with securing fifth-generation (5G) networks from digital dangers. Of the different technologies that they use very effectively for safeguarding 5G networks, DNS...

The post The Future of Web Filtering in the Era of 5G Networks appeared first on .


News Bewertung

Weiterlesen Weiterlesen

Why Are Some Wealthy Kids Getting Extra Time To Finish Their SAT Tests?

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: news.slashdot.org Direktlink direkt öffnen

Students from wealthy high schools are more than twice as likely to qualify for extra time to finish their SAT or ACT college entrance tests than students from poor schools -- and in some cases, they're getting 50% more time. An anonymous reader quotes CBS News: About 4.2 percent of students at wealthy high schools qualified for a 504 designation, a plan that enables the students to qualify for accommodations such as extra test-taking time, according to an analysis of federal data for 9,000 by public schools by The Wall Street Journal. By comparison, only 1.6 percent of students in poor high schools qualified for the same designation.... These plans, named after a federal statute prohibiting discrimination against students with disabilities, can cover a wide range of issues, ranging from anxiety to deafness and other impairments. But critics of 504 plans say some families may be abusing the system in order to secure much-needed extra time for their children on the high-stakes exams... About one-sixth of ACT test-takers don't complete the exam within its normal time limit, the Journal noted. And a redesign of the SAT in 2014 signaled how many students struggle with finishing on time, as fewer than half of students completed the math section in a prototype of the new test. Naturally, gaining an extra 50 percent of the allotted time can alleviate some of the stress of time management. And the SATs and ACTs don't alert colleges about whether a student received extra time to complete the tests, eliminating a disincentive for students to request the accommodation. It's apparently been going on for years, according to CBS. In 2000 a California state report found that students getting extra time for their tests "were predominately white, wealthy, and from private schools." And now in Boston's "well-heeled" Newton suburb, about one-third of students qualified for extra time.

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

it-symposium.ruhr: Vertrauen und Sicherheit Schlüsselfaktoren der Digitalisierung

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: google.com Direktlink direkt öffnen

[datensicherheit.de, 25.05.2019] Laut einer aktuellen Mitteilung von G DATA standen die Themen IT-Security und Privacy beim „it-symposium.ruhr“ ...
News Bewertung

Weiterlesen Weiterlesen

'How I Cheated On My Microsoft Job Interview'

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: it.slashdot.org Direktlink direkt öffnen

Robert Sweeney spent 10 years working as a software engineer at Microsoft and Netflix, before becoming founder and CEO of the software development agency Facet. This week he blogged about how he cheated on his 2004 interview for a job at Microsoft. It was his first job interview ever, when he was still a college senior majoring in computer science, and a Microsoft recruiter had invited him to an interview at an on-campus career fair: I immediately called my good friend Eli who had just started a new job at Microsoft. I asked him what the on campus interviews were like and how I should prepare for them. He explained that they would ask a random programming question that I would need to solve on a sheet of paper. If you did well, then they would fly you out for a full day of interviews at the Microsoft headquarters in Redmond, Washington. He had been asked to write a function that, when given an array of length n + 1 containing integers 1 through n, find the duplicate integer in an array. I wasn't sure how to prepare for answering a "random programming question", so I decided to just use the question Eli had been asked as practice and hope for the best... Most of the interview is a blur, but I remember the interviewer being nice and I remember the programming question he asked me... I couldn't believe it. He asked me the exact same question as Eli. Should I tell him? I hesitated for a moment, pretending to be thinking about how to solve the problem. In reality I was having an intense internal debate on the ethics of interviewing. He didn't ask me if I had heard the question before, he just asked me to solve it. So I decided to just answer the question... I slowly wrote out the solution I had come up with over days of thinking about the problem, being sure to pause periodically as if I was figuring it out for the first time... A few days later I received an invite to fly out to the Microsoft main offices. I interviewed with two teams over a period of 6+ hours. I didn't get asked any questions I had heard before this time, but I did my best... Sure enough, that next week I had a job offer from Microsoft from both teams... Within a couple of years of graduating from college, I had shipped software that was being used by nearly a billion people... I've struggled with this a lot over the years, but I finally decided to share my story. I don't think I would have made it past the first round of interviews at Microsoft if I hadn't gotten so lucky. So pretty much, my entire career is built on one amazing stroke of luck. I also think my experience is a great example of one of the many reasons why the coding problems we use in developer interviews are so problematic: on the spot coding is just not a good way to judge technical ability. Stack Overflow's CEO founder Joel Spolsky actually wrote some of Microsoft's internal programmer-testing guidelines when he worked there in the mid-1990s, and he later publicized them in a 2006 blog post which he says was later adopted by other tech companies, including Google. He has since said that recruiting for IT is broken, adding "I think that I'm responsible." Microsoft has since changed its interviewing practices.

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

'How I Cheated On My Microsoft Job Interview'

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: it.slashdot.org Direktlink direkt öffnen

Robert Sweeney spent 10 years working as a software engineer at Microsoft and Netflix, before becoming founder and CEO of the software development agency Facet. This week he blogged about how he cheated on his 2004 interview for a job at Microsoft. It was his first job interview ever, when he was still a college senior majoring in computer science, and a Microsoft recruiter had invited him to an interview at an on-campus career fair: I immediately called my good friend Eli who had just started a new job at Microsoft. I asked him what the on campus interviews were like and how I should prepare for them. He explained that they would ask a random programming question that I would need to solve on a sheet of paper. If you did well, then they would fly you out for a full day of interviews at the Microsoft headquarters in Redmond, Washington. He had been asked to write a function that, when given an array of length n + 1 containing integers 1 through n, find the duplicate integer in an array. I wasn't sure how to prepare for answering a "random programming question", so I decided to just use the question Eli had been asked as practice and hope for the best... Most of the interview is a blur, but I remember the interviewer being nice and I remember the programming question he asked me... I couldn't believe it. He asked me the exact same question as Eli. Should I tell him? I hesitated for a moment, pretending to be thinking about how to solve the problem. In reality I was having an intense internal debate on the ethics of interviewing. He didn't ask me if I had heard the question before, he just asked me to solve it. So I decided to just answer the question... I slowly wrote out the solution I had come up with over days of thinking about the problem, being sure to pause periodically as if I was figuring it out for the first time... A few days later I received an invite to fly out to the Microsoft main offices. I interviewed with two teams over a period of 6+ hours. I didn't get asked any questions I had heard before this time, but I did my best... Sure enough, that next week I had a job offer from Microsoft from both teams... Within a couple of years of graduating from college, I had shipped software that was being used by nearly a billion people... I've struggled with this a lot over the years, but I finally decided to share my story. I don't think I would have made it past the first round of interviews at Microsoft if I hadn't gotten so lucky. So pretty much, my entire career is built on one amazing stroke of luck. I also think my experience is a great example of one of the many reasons why the coding problems we use in developer interviews are so problematic: on the spot coding is just not a good way to judge technical ability. Stack Overflow's CEO founder Joel Spolsky actually wrote some of Microsoft's internal programmer-testing guidelines when he worked there in the mid-1990s, and he later publicized them in a 2006 blog post which he says was later adopted by other tech companies, including Google. He has since said that recruiting for IT is broken, adding "I think that I'm responsible." Microsoft has since changed its interviewing practices.

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

Need help on a laptop modified laptop i bought on ebay. Paranoid about keylogging

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

I bought a thinkpad X230 that been modified from the display, soldered components, it was a hackintosh /win10 dual boot. And keyboard been modded. It came from Hong Kong China 51nb.

So I cant edit the bios because I fear of bricking it. Since there are so many whitelisted components. I changed the SSD it came with and put my own SSD and installed Win10. I downloaded Malwarebytes 14day premium

Any tips on what I should do. I dont know if I can trust theres keyloggers or any spyware on it

submitted by /u/DocVader1138
[link] [comments]
News Bewertung

Weiterlesen Weiterlesen

Windows 10 1903 Being Blocked If Using Older BattlEye Software

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: bleepingcomputer.com Direktlink direkt öffnen

Microsoft has stated that they will not allow devices to upgrade to Windows 10 version 1903, otherwise known as the May 2019 Update, if they are running older versions of the anti-cheat software called BattlEye. This is because older versions of the software could cause Windows 10 to crash in version 1903. [...]
News Bewertung

Weiterlesen Weiterlesen

Windows 10 1903 Being Blocked If Using Older BattlEye Software

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: bleepingcomputer.com Direktlink direkt öffnen

Microsoft has stated that they will not allow devices to upgrade to Windows 10 version 1903, otherwise known as the May 2019 Update, if they are running older versions of the anti-cheat software called BattlEye. This is because older versions of the software could cause Windows 10 to crash in version 1903. [...]
News Bewertung

Weiterlesen Weiterlesen

Seitennavigation

Seite 2 von 3.995 Seiten (Bei Beitrag 35 - 70)
139.800x Beiträge in dieser Kategorie

Auf Seite 1 zurück | Nächste 3 Seite | Letzte Seite

[ 1 ] [2] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ]