1. IT-Security >
  2. Cyber Security Nachrichten


ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese

Nachrichten


Suchen

News RSS Quellen: 82x
News Kategorien unterhalb von Nachrichten: 0x
News RSS Feeds dieser Nachrichten Kategorie: RSS Feed IT Security Nachrichten
Benutze Feedly zum Abonieren.Folge uns auf feedly
Download RSS Feed App für Windows 10 Store (Leider gibt es nicht mehr viele Extensions mit welchen Sie RSS-Feeds in einer Software abonieren können. Der Browser Support für RSS-Feeds wurde eingestellt (Firefox,Chrome).

Eigene IT Security Webseite / Blog / Quelle hinzufügen

Seitennavigation

Seite 2 von 3.995 Seiten (Bei Beitrag 35 - 70)
139.813x Beiträge in dieser Kategorie

Auf Seite 1 zurück | Nächste 3 Seite | Letzte Seite

[ 1 ] [2] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ]

Stiftung Warentest Multifunktions-Drucker: App statt Scanner, geht das?

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: winfuture.de Direktlink direkt öffnen

Test, Stiftung Warentest, Heft, Symbolbild, test.de Die Stiftung Warentest hat nach dem großen Drucker-Test vor einigen Wochen noch einmal nachgelegt. Dieses Mal geht man der Frage nach, was neue Multifunktionsdrucker, die auf Apps statt Scanner setzen, taugen. Zudem hat Test.de seine Datenbank mit neuen Druckern gefüttert. (Weiter lesen)
News Bewertung

Weiterlesen Weiterlesen

Snapchat-Mitarbeiter sollen eigene User massiv ausspioniert haben

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: google.com Direktlink direkt öffnen

Snapchat ist einer der populärsten Social-Media-Dienste und bietet Usern die Möglichkeit, Bilder und Videos zu verschicken, die nach dem Öffnen ...
News Bewertung

Weiterlesen Weiterlesen

Apple Could Take Samsung by Surprise with Full-Screen Touch ID on 2020 iPhone

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: news.softpedia.com Direktlink direkt öffnen

Apple abandoned the fingerprint reader, officially known as Touch ID, with the debut of the iPhone X, with the company instead betting all-in on facial recognition, or Face ID, as the exclusive authentication system. Meanwhile, Samsung, which continues to be Apple’s number one rival, continued to invest aggressively in fingerprint sensors, so this year’s Galaxy S10 introduced a new system that has the reader embedded into the glass. Apple, however, could take both its users and its competitors by surprise with the 2020 iPhone when the company could bring back Touch ID with a completely innovative approach. This device, according to Barclays analyst Blayne Curtis (via MR), could come with a full-screen fingerprint sensor, which means that you can touch the display anywhere you want to unlock the device. On the Galaxy S10, users must put the finger in a certain place...
News Bewertung

Weiterlesen Weiterlesen

Buggy Drivers Block Windows 10 May 2019 Update on AMD Devices

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: news.softpedia.com Direktlink direkt öffnen

If your computer is equipped with an AMD processor and the installation of Windows 10 May 2019 Update fails, you’re not alone. Microsoft has recently confirmed that installing Windows 10 May 2019 Update could fail on devices with certain versions of AMD RAID drivers with the following error: “AMD Ryzen™ or AMD Ryzen™ Threadripper™ configured in SATA or NVMe RAID mode. A driver is installed that causes stability problems on Windows. This driver will be disabled. Check with your software/driver provider for an updated version that runs on this version of Windows.” Specifically, AMD RAID drivers that are older than 9.2.0.105 are causing this issues, so you need to update to at least this version of a newer release to be able to install the May 2019 Update. No upgrade block in place just yet While the update might be of...
News Bewertung

Weiterlesen Weiterlesen

Microsoft Announces New Upgrade Block for Windows 10 May 2019 Update

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: news.softpedia.com Direktlink direkt öffnen

Microsoft has just confirmed another upgrade block for Windows 10 May 2019 Update, which is the latest Windows 10 feature update whose rollout started earlier this week. Windows 10 May 2019 Update won’t be offered to devices running an older version of BattlEye software, the company says, as it detected compatibility issues that could cause various issues. Microsoft discovered problems with anti-cheat software during the Windows Insider program, and the company worked together with game developers to resolve them. In an advisory detailing this upgrade block, Microsoft says a new version of BattlEye software is already available for download, but devices not running this latest update won’t be allowed to download and install Windows 10 version 1903. “To keep your gaming experience safe, Microsoft has placed a compatibility hold on dev...
News Bewertung

Weiterlesen Weiterlesen

Facebook suddenly turns on my laptop camera

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

So this morning without any warning or notification while browsing about Facebook Global Currency I found Facebook had turned on the camera and I have no idea why.

submitted by /u/RhadeFunashi
[link] [comments]
News Bewertung

Weiterlesen Weiterlesen

Microsoft Releases Windows 10 Version 1903 Cumulative Update KB4497935

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: news.softpedia.com Direktlink direkt öffnen

Microsoft has released a new cumulative update for Windows 10 May 2019 Update, or version 1903, but for the time being, this is available for download only for insiders. Cumulative update KB4497935 is thus pushed via Windows Update to users enrolled in the Slow and Release Preview rings of the Insider program. Beginning with the October 2018 Update (version 1809), Microsoft uses the Release Preview ring to test cumulative updates thoroughly before releasing them to production devices. The same approach continues to be used for the May 2019 Update, so there’s a chance KB4497935 would eventually make its way to all computers already updated to version 1903. As for what’s new in Windows 10 cumulative update KB4497935, you can check out the changelog in the box after the jump for full information. But worth highlighting is a fix for a bug causing Night light mode to be turned off during display mode changes. I previously experienced this issue during the Insider prog...
News Bewertung

Weiterlesen Weiterlesen

Fundamentals Of Making A Hacker Out Of You

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: hackercombat.com Direktlink direkt öffnen

There is no academic background necessary to become a hacker, given that even the most popular hackers in our history, like Kevin Mitnick, were actually self-trained. However, anyone who wishes...

The post Fundamentals Of Making A Hacker Out Of You appeared first on .


News Bewertung

Weiterlesen Weiterlesen

Access-Management sorgt für klare Verhältnisse

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: it-daily.net Direktlink direkt öffnen

Gesetzliche Vorgaben einhalten, IT-Sicherheit gewährleisten und den Datenschutz nicht vernachlässigen – nur ein kleiner Einblick in die Aufgaben und Herausforderungen, die Unternehmen bewältigen müssen. Doch wie lassen sich diese Anforderungen professionell erfüllen?


News Bewertung

Weiterlesen Weiterlesen

Interview with Raj from Nepal (Nepali working in Malaysia), 2016

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

Interview with Raj from Nepal (Nepali working in Malaysia), 2016 submitted by /u/gmyt2123
[link] [comments]

News Bewertung

Weiterlesen Weiterlesen

SpaceX's Train of Satellites Creates Temporary 'Mega-Constellation'

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: science.slashdot.org Direktlink direkt öffnen

"SpaceX's unorthodox card-dealing launch of 60 Starlink broadband satellites has led to an unusual viewing opportunity for skywatchers -- and an occasion to wonder about the impact of such mega-constellations on the natural night sky," reports GeekWire: A video captured by satellite-watcher Marco Langbroek in the Netherlands sums up the awe... It didn't take long for Langbroek and other skywatchers to work out the coordinates for the long train of satellites, and to plug those coordinates into online satellite-pass calculators such as CalSky. On Twitter, David Dickinson, author of "The Universe Today: Ultimate Guide to Viewing the Cosmos," started doling out location-specific sighting predictions based on the Orbitron satellite-tracking program. CalSky automatically picks up your coordinates for satellite sightings, but for those in the Seattle area, the best time to look for the Starlink train passing by tonight is likely to be in the range of 10:50 to 11:10 p.m. PT, going from southwest to northeast. That's a liberal stretch of time that accounts for a range of locations (say, Port Townsend vs. North Bend), plus uncertainties in the orbital estimates. There are other passes overnight at around 12:30, 3:50 and 5:20 a.m. PT. The brightness of the satellites is a question mark. Some say they can be seen with the naked eye, while others advise scanning with binoculars. A lot depends on how the satellites pick up the glint of the sun after dusk or before dawn. Tonight Langbroek reported that the satellite train wasn't as bright as it was the night before. Speaking of brightness, astronomers and SpaceX fans have already begun the debate over the prospect of having thousands of broadband-beaming satellites in low Earth orbit. The 60 satellites launched this week merely represent the beginning of a campaign aimed at launching as many as 11,000 such spacecraft. And that's just for SpaceX's Starlink system. Thousands more could go into orbit for the constellations being contemplated by OneWeb, Telesat, LeoSat Enterprises and Amazon's Project Kuiper. Today Elon Musk tweeted defensively that "sats will be in darkness when stars are visible" -- while GeekWire points out that the satellites are also scheduled to spread. "Within just a few days, the tightly spaced 'train' will turn into a dispersed chain that girdles the globe," their article concludes. "And once that happens, chances are that skywatchers and sky-worriers alike will turn their attention to the next batch of Starlink satellites."

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

Warum migrieren Unternehmen aus der Public Cloud zurück?

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: it-daily.net Direktlink direkt öffnen

Unternehmen nutzen vermehrt die Hybrid Cloud um Daten und Anwendungen in alle Umgebungen verschieben zu können. Dies macht das Zurückholen von Daten und Anwendungen ins eigene Rechenzentrum offiziell zu einem Trend.


News Bewertung

Weiterlesen Weiterlesen

Warum migrieren Unternehmen aus der Public Cloud zurück?

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: it-daily.net Direktlink direkt öffnen

Unternehmen nutzen vermehrt die Hybrid Cloud um Daten und Anwendungen in alle Umgebungen verschieben zu können. Dies macht das Zurückholen von Daten und Anwendungen ins eigene Rechenzentrum offiziell zu einem Trend.


News Bewertung

Weiterlesen Weiterlesen

CrossFit Storms Off Facebook and Instagram

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: tech.slashdot.org Direktlink direkt öffnen

"CrossFit, the branded workout regimen, deleted its Facebook and Instagram pages earlier this week and explained the reasoning through an impassioned press release," reports the Verge. TechSpot has more details: In a press release, CrossFit revealed the breaking point: the deletion of the Banting7DayMealPlan user group, without warning or explanation. Banting is an alternative high-fat low-carb diet with no set meal times or processed foods, and its Facebook group had 1.65 million users, including 1 million from South Africa. The group mostly posts testimonials and discusses the merits of the diet or how it might be implemented. While the group has been reinstated (still without explanation), CrossFit is right to call into question why Facebook removed it in the first place. While Banting is probably inadvisable, groups advocating for it have a right to exist. Still, that's far from the only reason CrossFit abandoned the platforms... CrossFit sees itself as a community of 15,000 affiliates and millions of individuals against "an unholy alliance of academia, government, and multinational food, beverage, and pharmaceutical companies," according to their press release -- so they may be feeling vulnerable. CrossFit, Inc. defends relentlessly the right of its affiliates, trainers, and athletes to practice CrossFit, build voluntary CrossFit associations and businesses, and speak openly and freely about the ideas and principles that animate our views of exercise, nutrition, and health... Facebook and its properties host and oversee a significant share of the marketplace of public thought... Facebook thus serves as a de facto authority over the public square, arbitrating a worldwide exchange of information as well as overseeing the security of the individuals and communities who entrust their ideas, work, and private data to this platform. This mandates a certain responsibility and assurance of good faith, transparency, and due process. CrossFit, Inc., as a voluntary user of and contributor to this marketplace, can and must remove itself from this particular manifestation of the public square when it becomes clear that such responsibilities are betrayed or reneged upon to the detriment of our community. CrossFit says they're "suspending" all activity on the platforms while they investigate "the circumstances pertaining to Facebook's deletion of the Banting7DayMealPlan and other well-known public complaints about the social-media company," adding that CrossFit "will no longer support or use Facebook's services until further notice."

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

Is Go Google's Programming Language, Not Ours?

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: developers.slashdot.org Direktlink direkt öffnen

Chris Siebenmann is a Unix sys-admin for the CS department at the University of Toronto. He recently saw a tweet asking about the possibility of community-implemented generics for the Go programming language, and posted a widely-read response on his blog. "There are many answers for why this won't happen, but one that does not usually get said out loud is that Go is Google's language, not the community's." Yes, there's a community that contributes things to Go, some of them important and valued things; you only have to look at the diversity of people in CONTRIBUTORS or see the variety of people appearing in the commits. But Google is the gatekeeper for these community contributions; it alone decides what is and isn't accepted into Go. To the extent that there even is a community process for deciding what is accepted, there is an 800-pound gorilla in the room. Nothing is going to go into Go that Google objects to, and if Google decides that something needs to be in Go, it will happen. (The most clear and obvious illustration of this is what happened with Go modules, where one member of Google's Go core team discarded the entire system the outside Go community had been working on in favour of a relatively radically different model. See eg for one version of this history.) Or in short, Go has community contributions but it is not a community project. It is Google's project. This is an unarguable thing, whether you consider it to be good or bad, and it has effects that we need to accept. For example, if you want some significant thing to be accepted into Go, working to build consensus in the community is far less important than persuading the Go core team. (As a corollary, sinking a lot of time and effort into a community effort that doesn't have enthusiastic buy-in from the Go core team is probably a waste of time....) On the good and bad scale, there is a common feeling that Go has done well by having a small core team with good taste and a consistent vision for the language, a team that is not swayed by outside voices and is slow moving and biased to not making changes. The essay also concedes that "I like Go and have for a fair while now, and I'm basically okay with how the language has been evolving and how the Go core team has managed it. I certainly think it's a good idea to take things like generics slowly. "But at the same time, how things developed around Go modules has left a bad taste in my mouth and I now can't imagine becoming a Go contributor myself, even for small trivial changes."

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

A Closer Look at the New Windows 10 Light Theme

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: bleepingcomputer.com Direktlink direkt öffnen

The headline feature of Windows 10 May 2019 Update is probably the Windows Sandbox, but another useful addition is the new light theme for your Windows desktop. [...]
News Bewertung

Weiterlesen Weiterlesen

Fast and Secure Blockchain Platform. Full Source Code on GitHub

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

The Credits blockchain platform meets the wishes of all crypto communities and presented on the 16th of May the full source code of the most decentralized blockchain platforms in the world.

Credits publishes the entire source code that is aligned with the latest state of Credits software. All updates, optimizations and hotfixes will occur on GitHub. At present time the following list of components is available on GitHub:

  • Network
  • Storage
  • Consensus Protocol
  • API
  • Smart Contracts
  • Monitor
  • Web Wallet and etc.

Credits team trusts that this move will increase the transparency of development process, will attract new audience and will speed up the growth of Credits blockchain ecosystem.

Right now Credits programmers are refreshing the documentation that is required for developers of blockchain-based products and services to wrap up in technology and its features. A Bug Bounty Program will be launched shortly after that.

Credits company is focused to invite all developers to participate in the process of platform development. Any developer is able to track the whole history of Credits code updates on official GitHub. Go ahead! Be on the same wavelength with the most innovative technology!

submitted by /u/Mindreactions
[link] [comments]
News Bewertung

Weiterlesen Weiterlesen

Strict 'Do Not Track' Law Proposed By US Senator

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: yro.slashdot.org Direktlink direkt öffnen

This week a Republican senator "unveiled a 'Do Not Track' bill with tough penalties for companies who break its protections," reports The Hill. Trailrunner7 shares more information from the security news site Decipher: Senator Hawley's bill makes the Federal Trade Commission the enforcement authority for the system and any person who violates the measure would be liable for penalties of $50 per user affected by a violation for every day that the violation is ongoing. "Big tech companies collect incredible amounts of deeply personal, private data from people without giving them the option to meaningfully consent. They have gotten incredibly rich by employing creepy surveillance tactics on their users, but too often the extent of this data extraction is only known after a tech company irresponsibly handles the data and leaks it all over the internet," Hawley said. "The American people didn't sign up for this, so I'm introducing this legislation to finally give them control over their personal information online.... [The bill] just says that a consumer can make a one time choice to not be tracked. I think we should make it compulsory and give it the force of law and give consumers real choice and force the companies to comply." DuckDuckGo's founder had proposed similar legislation, and the Hill reports that he's since been approached by "a few other" U.S. lawmakers. They also remind readers that a 2010 push for Do Not Track legislation "never panned out amid enormous pressure from industry representatives, who could not come to an agreement over what 'tracking' means in the first place... "Consumer advocates and tech industry critics say Hawley's bill could find better traction amid a larger backlash against tech behemoths including Google, Facebook and Amazon."

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

Requesting advice regarding a Twitter link texted to me

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

Long story, will try to keep it short. Last week, I was being harassed by coworkers. HR got involved, several parties are now on suspension. Shortly after the parties involved left the building, I received a strange text with a "t.co" hyperlink and some accompanying wording which leads me to believe that it is related to the situation going on at my work. I have NOT clicked the link, but Google says that it's a Twitter link. I have tried to type the sequence of letters and numbers into a browser, but that does not seem to work. Is there any way to know where this link leads without exposing my phone to a virus or some other damage? I have notified HR of this development, but they initially seemed skeptical that the text was related to this harassment situation. I am 99% sure this is retaliation and seeing what the link leads to may prove it. (Also, if there's a more appropriate sub to post this in, please let me know. I tried r/twitter, but there doesn't seem to be much going on over there.) Thank You

submitted by /u/Cleveland_Protocol
[link] [comments]
News Bewertung

Weiterlesen Weiterlesen

Requesting advice regarding a Twitter link texted to me

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

Long story, will try to keep it short. Last week, I was being harassed by coworkers. HR got involved, several parties are now on suspension. Shortly after the parties involved left the building, I received a strange text with a "t.co" hyperlink and some accompanying wording which leads me to believe that it is related to the situation going on at my work. I have NOT clicked the link, but Google says that it's a Twitter link. I have tried to type the sequence of letters and numbers into a browser, but that does not seem to work. Is there any way to know where this link leads without exposing my phone to a virus or some other damage? I have notified HR of this development, but they initially seemed skeptical that the text was related to this harassment situation. I am 99% sure this is retaliation and seeing what the link leads to may prove it. (Also, if there's a more appropriate sub to post this in, please let me know. I tried r/twitter, but there doesn't seem to be much going on over there.) Thank You

submitted by /u/Cleveland_Protocol
[link] [comments]
News Bewertung

Weiterlesen Weiterlesen

So macht UBS das digitale Banking sicher

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: google.com Direktlink direkt öffnen

Sicherheit steht bei der UBS seit jeher an oberster Stelle; die Bank beschäftigt sich seit dem Beginn von Digital Banking sehr intensiv mit IT-Security.
News Bewertung

Weiterlesen Weiterlesen

SSHD-Poison - A Tool To Get Creds Of Pam Based SSHD Authentication

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: feedproxy.google.com Direktlink direkt öffnen

sshd-poison is a tool to get creds of pam based sshd authentication, this is not the easiest way to do that (you can create a pam module, or just add auth optional pam_exec.so quiet expose_authtok /bin/bash -c {read,-r,x};{echo,-e,"`env`\n$x"}>>somefile in a service configuration), not even the stealthiest (the tool don't have any mechanism to try hide yourself, and needs control the main sshd pid all the time), but code this gave me a lot of fun.

How it works
The tool starts attaching the main sshd pid and wait for some events, when a new process is created, it means that a new connection was started, after that the tool will wait for an execve event, then checks if the program executed is the same as the main pid, to ensure a re-exec (this is why we need take control of the main pid, every re-exec will erase any memory modification), then a breakpoint are set in the entry point of the new process, for wait the program load the shared librarys. When it's done and the breakpoint has hit, it are unset, the program will write the shellcode to a code cave, and the GOT entry for pam_set_item, used by libpam, will be changed, to hook internal libpam call to pam_set_item function.
The log format are password\0rhost\0user\0.
This will only works with x86_64 PIE binaries, and kernel 3.4 or early (PTRACE_SEIZE), I tested this with OpenSSH_8.0p1, OpenSSL 1.1.1b 26 Feb 2019 with kernel 5.0.13-arch1-1-ARCH and OpenSSH_7.9p1 Debian-10, OpenSSL 1.1.1b 26 Feb 2019 with kernel 4.19.0-kali3-amd64

Compiling
git clone --recurse-submodules https://github.com/hc0d3r/sshd-poison
cd sshd-poison
make

Demo




News Bewertung

Weiterlesen Weiterlesen

SSHD-Poison - A Tool To Get Creds Of Pam Based SSHD Authentication

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: feedproxy.google.com Direktlink direkt öffnen

sshd-poison is a tool to get creds of pam based sshd authentication, this is not the easiest way to do that (you can create a pam module, or just add auth optional pam_exec.so quiet expose_authtok /bin/bash -c {read,-r,x};{echo,-e,"`env`\n$x"}>>somefile in a service configuration), not even the stealthiest (the tool don't have any mechanism to try hide yourself, and needs control the main sshd pid all the time), but code this gave me a lot of fun.

How it works
The tool starts attaching the main sshd pid and wait for some events, when a new process is created, it means that a new connection was started, after that the tool will wait for an execve event, then checks if the program executed is the same as the main pid, to ensure a re-exec (this is why we need take control of the main pid, every re-exec will erase any memory modification), then a breakpoint are set in the entry point of the new process, for wait the program load the shared librarys. When it's done and the breakpoint has hit, it are unset, the program will write the shellcode to a code cave, and the GOT entry for pam_set_item, used by libpam, will be changed, to hook internal libpam call to pam_set_item function.
The log format are password\0rhost\0user\0.
This will only works with x86_64 PIE binaries, and kernel 3.4 or early (PTRACE_SEIZE), I tested this with OpenSSH_8.0p1, OpenSSL 1.1.1b 26 Feb 2019 with kernel 5.0.13-arch1-1-ARCH and OpenSSH_7.9p1 Debian-10, OpenSSL 1.1.1b 26 Feb 2019 with kernel 4.19.0-kali3-amd64

Compiling
git clone --recurse-submodules https://github.com/hc0d3r/sshd-poison
cd sshd-poison
make

Demo




News Bewertung

Weiterlesen Weiterlesen

Consumer Reports: Tesla's New Automatic Lane-Changing Is Much Worse Than a Human Driver

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: tech.slashdot.org Direktlink direkt öffnen

"Tesla's updated Navigate on Autopilot software now lets some drivers choose whether the car can automatically change lanes without his or her input," writes Consumer Reports -- before complaining that the feature "doesn't work very well and could create safety risks for drivers." An anonymous reader quotes their report: In practice, we found that the new Navigate on Autopilot lane-changing feature lagged far behind a human driver's skills. The feature cut off cars without leaving enough space, and even passed other cars in ways that violate state laws, according to several law enforcement representatives CR interviewed for this report. As a result, the driver often had to prevent the system from making poor decisions. "The system's role should be to help the driver, but the way this technology is deployed, it's the other way around," says Jake Fisher, Consumer Reports' senior director of auto testing. "It's incredibly nearsighted. It doesn't appear to react to brake lights or turn signals, it can't anticipate what other drivers will do, and as a result, you constantly have to be one step ahead of it...." Multiple testers reported that the Tesla often changed lanes in ways that a safe human driver wouldn't -- cutting too closely in front of other cars, and passing on the right. An area of particular concern is Tesla's claim that the vehicle's three rearward-facing cameras can detect fast-approaching objects from the rear better than the average driver can. Our testers found the opposite to be true in practice. "The system has trouble responding to vehicles that approach quickly from behind," Fisher says. "Because of this, the system will often cut off a vehicle that is going at a much faster speed, since it doesn't seem to sense the oncoming car until it's relatively close." Fisher says merging into traffic is another problem. "It is reluctant to merge in heavy traffic, but when it does, it often immediately applies the brakes to create space behind the follow car," he says, "and this can be a rude surprise to the vehicle you cut off... This isn't a convenience at all. Monitoring the system is much harder than just changing lanes yourself." In the article David Friedman, vice president of advocacy at Consumer Reports, complains that Tesla "is showing what not to do on the path toward self-driving cars: release increasingly automated driving systems that aren't vetted properly."

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

Consumer Reports: Tesla's New Automatic Lane-Changing Is Much Worse Than a Human Driver

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: tech.slashdot.org Direktlink direkt öffnen

"Tesla's updated Navigate on Autopilot software now lets some drivers choose whether the car can automatically change lanes without his or her input," writes Consumer Reports -- before complaining that the feature "doesn't work very well and could create safety risks for drivers." An anonymous reader quotes their report: In practice, we found that the new Navigate on Autopilot lane-changing feature lagged far behind a human driver's skills. The feature cut off cars without leaving enough space, and even passed other cars in ways that violate state laws, according to several law enforcement representatives CR interviewed for this report. As a result, the driver often had to prevent the system from making poor decisions. "The system's role should be to help the driver, but the way this technology is deployed, it's the other way around," says Jake Fisher, Consumer Reports' senior director of auto testing. "It's incredibly nearsighted. It doesn't appear to react to brake lights or turn signals, it can't anticipate what other drivers will do, and as a result, you constantly have to be one step ahead of it...." Multiple testers reported that the Tesla often changed lanes in ways that a safe human driver wouldn't -- cutting too closely in front of other cars, and passing on the right. An area of particular concern is Tesla's claim that the vehicle's three rearward-facing cameras can detect fast-approaching objects from the rear better than the average driver can. Our testers found the opposite to be true in practice. "The system has trouble responding to vehicles that approach quickly from behind," Fisher says. "Because of this, the system will often cut off a vehicle that is going at a much faster speed, since it doesn't seem to sense the oncoming car until it's relatively close." Fisher says merging into traffic is another problem. "It is reluctant to merge in heavy traffic, but when it does, it often immediately applies the brakes to create space behind the follow car," he says, "and this can be a rude surprise to the vehicle you cut off... This isn't a convenience at all. Monitoring the system is much harder than just changing lanes yourself." In the article David Friedman, vice president of advocacy at Consumer Reports, complains that Tesla "is showing what not to do on the path toward self-driving cars: release increasingly automated driving systems that aren't vetted properly."

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

Privacy issues roll on because tech giants have no competition, experts tell Congress

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

Privacy issues roll on because tech giants have no competition, experts tell Congress submitted by /u/mynameisalex1
[link] [comments]

News Bewertung

Weiterlesen Weiterlesen

If I make a purchase on public Wi-Fi with a website on https, am I safe?

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

If I am on public Wi-Fi (no VPN) and make a purchase on a website that uses https, can my credit card be sniffed?

submitted by /u/nootdude
[link] [comments]
News Bewertung

Weiterlesen Weiterlesen

The Biggest Mobile Security Threats - Smart Mobile Technology

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

The Biggest Mobile Security Threats - Smart Mobile Technology submitted by /u/Malkavius2
[link] [comments]

News Bewertung

Weiterlesen Weiterlesen

Why the US Air Force Is Investigating a Cyber Attack From the US Navy

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: tech.slashdot.org Direktlink direkt öffnen

"The Air Force is investigating the Navy for a cyber intrusion into its network, according to a memo obtained by Military Times." Zorro (Slashdot reader #15,797) shares their report: The bizarre turn of events stems from a decision by a Navy prosecutor to embed hidden tracking software into emails sent to defense attorneys, including one Air Force lawyer, involved in a high-profile war-crimes case of a Navy SEAL in San Diego. The tracking device was an attempt to find out who was leaking information to the editor of Navy Times, a sister publication. A similar tracking device was also sent to Carl Prine, the Navy Times editor, who has written numerous stories about the case. Navy Capt. David Wilson, chief of staff for the Navy's Defense Service Offices, wrote in the May 19 memo that an Air Force attorney was among the defense lawyers who had received emails with the hidden tracking software, which he described as "malware"... "In fact, I've learned that the Air Force is treating this malware as a cyber-intrusion on their network and have seized the Air Force Individual Military Counsel's computer and phone for review," he wrote.

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

How Internet Works?

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

Hi Folks , I know you may think what a shitty question is this but think little deeper and you will see that it's a very good question because as an ethical hacker you can't say to people that yes once you click a browser installed in your desktop a web page opens up and you type a keyword than the Google gives you some interesting response or answers and Boom..! This is how internet works.

The geek peoples around you might be expecting little more technical about like what happens when you click a browser and what registry are executed behind the processing unit etc..etc..

So is there anyone out who can help me out to find a perfect explanation. 🙄🙄

The research paper which I got over internet regarding the topic https://web.stanford.edu/class/msande91si/www-spr04/readings/week1/InternetWhitepaper.htm

submitted by /u/2TwoFace
[link] [comments]
News Bewertung

Weiterlesen Weiterlesen

Stolen NSA hacking tool now victimizing US cities, report says

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: cnet.com Direktlink direkt öffnen

The EternalBlue hacking exploit, already used in the infamous WannaCry and NotPetya attacks, has now surfaced in the NSA's own backyard, says The New York Times.
News Bewertung

Weiterlesen Weiterlesen

Did I just get hacked?

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

So I go to open Spotify today and I’m greeted with the login screen rather than just being taken straight in. Naturally I’m like “Uhh, ok? Guess I’ll just put the password in.” I put the pass but it says wrong password. I retype it 3 times and I start to get worried. I check my email and sure enough it says my password has been reset. Now I’m really worried. I follow the link the recover the account and I change the password myself this time. Above the Spotify email I get another email from twitch saying I had a successful login on May 25 from a windows 10 PC with the location at Paris, France. I live in the US. Now I start the panic and reset my twitch, google, Microsoft, and Apple ID and enable 2-step verification on everything. Am I safe now? I’m still a little paranoid. I tried to look up the IP address but everything is scrambled. Help?

submitted by /u/Doc_The_God
[link] [comments]
News Bewertung

Weiterlesen Weiterlesen

nokia investigated for illegally sending user data to china. and then after still lied about everything. are there any android companies that dont illegally sends data to china?

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

  1. does anyone know what are the main causes of this problem

  2. do all smartphone companies have this problem

  3. does any smartphone companies have a good reputation that is close to or near to that of iphones

  4. im not sure how large of a problem this problem is. do you know?

submitted by /u/bestminipc
[link] [comments]
News Bewertung

Weiterlesen Weiterlesen

Neal Stephenson Says Social Media Is Close To A 'Doomsday Machine'

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: news.slashdot.org Direktlink direkt öffnen

PC Magazine interviewed Neal Stephenson about his new upcoming book Fall; Or, Dodge in Hell, as well as "the digital afterlife, and why social media is a doomsday machine." [Possible spoilers ahead]: The hybrid sci-fi/fantasy novel begins in the present day with Richard "Dodge" Forthrast, an eccentric multibillionaire who made his fortune in the video game industry. When a freak accident during a routine medical procedure leaves him brain-dead, his family is left to contend with his request to have his brain preserved until the technology exists to bring him back to life. The near-future world of Fall is full of familiar buzzwords and concepts. Augmented reality headsets, next-gen wireless networks, self-driving vehicles, facial recognition, quantum computing, blockchain and distributed cryptography all feature prominently. Stephenson also spends a lot of time examining how the internet and social media, which Dodge and other characters often refer to in Fall as the Miasma, is irrevocably changing society and altering the fabric of reality... Q: How would you describe the current state of the internet? Just in a general sense of its role in our daily lives, and where that concept of the Miasma came from for you. Neal Stephenson: I ended up having a pretty dark view of it, as you can kind of tell from the book. I saw someone recently describe social media in its current state as a doomsday machine, and I think that's not far off. We've turned over our perception of what's real to algorithmically driven systems that are designed not to have humans in the loop, because if humans are in the loop they're not scalable and if they're not scalable they can't make tons and tons of money. The result is the situation we see today where no one agrees on what factual reality is and everyone is driven in the direction of content that is "more engaging," which almost always means that it's more emotional, it's less factually based, it's less rational, and kind of destructive from a basic civics standpoint... I sort of was patting myself on the back for really being on top of things and predicting the future. And then I discovered that the future was way ahead of me. I've heard remarks in a similar vein from other science-fiction novelists: do we even have a role anymore? Stephenson answered questions from Slashdot's reader in 2004, and since then has "spent years as an advisor for Amazon CEO Jeff Bezos' private space company Blue Origin," the article points out. He's also currently the "chief futurist" for Magic Leap -- though he tells his interviewer that some ideas go back much further. Part of his new book builds on "a really old idea" from security researcher Matt Blaze, who in the mid-1990s talked about "Encyclopedia Disinformatica", which Stephenson describes as "a sort of fake Wikipedia containing plausible-sounding but deliberately false information as a way of sending the message to people that they shouldn't just believe everything that they see on the internet."

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

In Baltimore and Beyond, a Stolen N.S.A. Tool Wreaks Havoc

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

In Baltimore and Beyond, a Stolen N.S.A. Tool Wreaks Havoc submitted by /u/dabeastfromunder
[link] [comments]

News Bewertung

Weiterlesen Weiterlesen

Seitennavigation

Seite 2 von 3.995 Seiten (Bei Beitrag 35 - 70)
139.813x Beiträge in dieser Kategorie

Auf Seite 1 zurück | Nächste 3 Seite | Letzte Seite

[ 1 ] [2] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ]