1. IT-Security >
  2. Cyber Security Nachrichten


ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese

Nachrichten


Suchen

News RSS Quellen: 82x
News Kategorien unterhalb von Nachrichten: 0x
News RSS Feeds dieser Nachrichten Kategorie: RSS Feed IT Security Nachrichten
Benutze Feedly zum Abonieren.Folge uns auf feedly
Download RSS Feed App für Windows 10 Store (Leider gibt es nicht mehr viele Extensions mit welchen Sie RSS-Feeds in einer Software abonieren können. Der Browser Support für RSS-Feeds wurde eingestellt (Firefox,Chrome).

Eigene IT Security Webseite / Blog / Quelle hinzufügen

Seitennavigation

Seite 3 von 3.995 Seiten (Bei Beitrag 70 - 105)
139.813x Beiträge in dieser Kategorie

Auf Seite 2 zurück | Nächste 4 Seite | Letzte Seite

[ 1 ] [ 2 ] [3] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ]

Systemd Now Has More Than 1.2 Million Lines of Code

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: linux.slashdot.org Direktlink direkt öffnen

This week Phoronix marked a very special anniversary: Five years ago today was the story on Phoronix how the systemd source tree was approaching 550k lines so curiosity got the best of me to see how large is the systemd Git repository today. Well, now it's over 1.2 million lines. After surpassing one million lines in 2017, when running GitStats on the systemd Git repository today it's coming in at 1,207,302 lines. Those 1.2 million lines are spread across 3,260 files and made over 40,057 commits from nearly 1,400 different authors... So far this year there have been 2,145 commits while last year saw 6,245 commits while 2016 and 2017 each saw less than four thousand commits total. Lennart Poettering continues being the most prolific contributor to systemd with more than 32% of the commits so far this year.

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

Recap of Recent Pieces on Just Security (May 20-25)

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: justsecurity.org Direktlink direkt öffnen

Pardons and military justice, Impeachment issues, Russia probe, U.S.-Iran Conflict, Assange indictment, European Union Parliamentary elections, Humanitarian assistance, Huawei, Congressional oversight and more...

The post Recap of Recent Pieces on Just Security (May 20-25) appeared first on Just Security.


News Bewertung

Weiterlesen Weiterlesen

Serious Security: Don’t let your SQL server attack you with ransomware

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: nakedsecurity.sophos.com Direktlink direkt öffnen

Tales from the honeypot: this time a MySQL-based attack. Old tricks still work, because we're still making old mistakes - here's what to do.
News Bewertung

Weiterlesen Weiterlesen

Sectigo Responds to Chronicle's Report About Malware Signed by Their Certs

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: bleepingcomputer.com Direktlink direkt öffnen

Following Chronicle's study on signed malware registered on VirusTotal scanning service over a one-year period, Sectigo carried their own investigation to identify abused certificates and revoke them. [...]
News Bewertung

Weiterlesen Weiterlesen

Sectigo Responds to Chronicle's Report About Malware Signed by Their Certs

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: bleepingcomputer.com Direktlink direkt öffnen

Following Chronicle's study on signed malware registered on VirusTotal scanning service over a one-year period, Sectigo carried their own investigation to identify abused certificates and revoke them. [...]
News Bewertung

Weiterlesen Weiterlesen

The Future of Web Filtering in the Era of 5G Networks

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: hackercombat.com Direktlink direkt öffnen

Security professionals and network administrators today are concerned with securing fifth-generation (5G) networks from digital dangers. Of the different technologies that they use very effectively for safeguarding 5G networks, DNS...

The post The Future of Web Filtering in the Era of 5G Networks appeared first on .


News Bewertung

Weiterlesen Weiterlesen

Why Are Some Wealthy Kids Getting Extra Time To Finish Their SAT Tests?

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: news.slashdot.org Direktlink direkt öffnen

Students from wealthy high schools are more than twice as likely to qualify for extra time to finish their SAT or ACT college entrance tests than students from poor schools -- and in some cases, they're getting 50% more time. An anonymous reader quotes CBS News: About 4.2 percent of students at wealthy high schools qualified for a 504 designation, a plan that enables the students to qualify for accommodations such as extra test-taking time, according to an analysis of federal data for 9,000 by public schools by The Wall Street Journal. By comparison, only 1.6 percent of students in poor high schools qualified for the same designation.... These plans, named after a federal statute prohibiting discrimination against students with disabilities, can cover a wide range of issues, ranging from anxiety to deafness and other impairments. But critics of 504 plans say some families may be abusing the system in order to secure much-needed extra time for their children on the high-stakes exams... About one-sixth of ACT test-takers don't complete the exam within its normal time limit, the Journal noted. And a redesign of the SAT in 2014 signaled how many students struggle with finishing on time, as fewer than half of students completed the math section in a prototype of the new test. Naturally, gaining an extra 50 percent of the allotted time can alleviate some of the stress of time management. And the SATs and ACTs don't alert colleges about whether a student received extra time to complete the tests, eliminating a disincentive for students to request the accommodation. It's apparently been going on for years, according to CBS. In 2000 a California state report found that students getting extra time for their tests "were predominately white, wealthy, and from private schools." And now in Boston's "well-heeled" Newton suburb, about one-third of students qualified for extra time.

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

it-symposium.ruhr: Vertrauen und Sicherheit Schlüsselfaktoren der Digitalisierung

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: google.com Direktlink direkt öffnen

[datensicherheit.de, 25.05.2019] Laut einer aktuellen Mitteilung von G DATA standen die Themen IT-Security und Privacy beim „it-symposium.ruhr“ ...
News Bewertung

Weiterlesen Weiterlesen

'How I Cheated On My Microsoft Job Interview'

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: it.slashdot.org Direktlink direkt öffnen

Robert Sweeney spent 10 years working as a software engineer at Microsoft and Netflix, before becoming founder and CEO of the software development agency Facet. This week he blogged about how he cheated on his 2004 interview for a job at Microsoft. It was his first job interview ever, when he was still a college senior majoring in computer science, and a Microsoft recruiter had invited him to an interview at an on-campus career fair: I immediately called my good friend Eli who had just started a new job at Microsoft. I asked him what the on campus interviews were like and how I should prepare for them. He explained that they would ask a random programming question that I would need to solve on a sheet of paper. If you did well, then they would fly you out for a full day of interviews at the Microsoft headquarters in Redmond, Washington. He had been asked to write a function that, when given an array of length n + 1 containing integers 1 through n, find the duplicate integer in an array. I wasn't sure how to prepare for answering a "random programming question", so I decided to just use the question Eli had been asked as practice and hope for the best... Most of the interview is a blur, but I remember the interviewer being nice and I remember the programming question he asked me... I couldn't believe it. He asked me the exact same question as Eli. Should I tell him? I hesitated for a moment, pretending to be thinking about how to solve the problem. In reality I was having an intense internal debate on the ethics of interviewing. He didn't ask me if I had heard the question before, he just asked me to solve it. So I decided to just answer the question... I slowly wrote out the solution I had come up with over days of thinking about the problem, being sure to pause periodically as if I was figuring it out for the first time... A few days later I received an invite to fly out to the Microsoft main offices. I interviewed with two teams over a period of 6+ hours. I didn't get asked any questions I had heard before this time, but I did my best... Sure enough, that next week I had a job offer from Microsoft from both teams... Within a couple of years of graduating from college, I had shipped software that was being used by nearly a billion people... I've struggled with this a lot over the years, but I finally decided to share my story. I don't think I would have made it past the first round of interviews at Microsoft if I hadn't gotten so lucky. So pretty much, my entire career is built on one amazing stroke of luck. I also think my experience is a great example of one of the many reasons why the coding problems we use in developer interviews are so problematic: on the spot coding is just not a good way to judge technical ability. Stack Overflow's CEO founder Joel Spolsky actually wrote some of Microsoft's internal programmer-testing guidelines when he worked there in the mid-1990s, and he later publicized them in a 2006 blog post which he says was later adopted by other tech companies, including Google. He has since said that recruiting for IT is broken, adding "I think that I'm responsible." Microsoft has since changed its interviewing practices.

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

'How I Cheated On My Microsoft Job Interview'

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: it.slashdot.org Direktlink direkt öffnen

Robert Sweeney spent 10 years working as a software engineer at Microsoft and Netflix, before becoming founder and CEO of the software development agency Facet. This week he blogged about how he cheated on his 2004 interview for a job at Microsoft. It was his first job interview ever, when he was still a college senior majoring in computer science, and a Microsoft recruiter had invited him to an interview at an on-campus career fair: I immediately called my good friend Eli who had just started a new job at Microsoft. I asked him what the on campus interviews were like and how I should prepare for them. He explained that they would ask a random programming question that I would need to solve on a sheet of paper. If you did well, then they would fly you out for a full day of interviews at the Microsoft headquarters in Redmond, Washington. He had been asked to write a function that, when given an array of length n + 1 containing integers 1 through n, find the duplicate integer in an array. I wasn't sure how to prepare for answering a "random programming question", so I decided to just use the question Eli had been asked as practice and hope for the best... Most of the interview is a blur, but I remember the interviewer being nice and I remember the programming question he asked me... I couldn't believe it. He asked me the exact same question as Eli. Should I tell him? I hesitated for a moment, pretending to be thinking about how to solve the problem. In reality I was having an intense internal debate on the ethics of interviewing. He didn't ask me if I had heard the question before, he just asked me to solve it. So I decided to just answer the question... I slowly wrote out the solution I had come up with over days of thinking about the problem, being sure to pause periodically as if I was figuring it out for the first time... A few days later I received an invite to fly out to the Microsoft main offices. I interviewed with two teams over a period of 6+ hours. I didn't get asked any questions I had heard before this time, but I did my best... Sure enough, that next week I had a job offer from Microsoft from both teams... Within a couple of years of graduating from college, I had shipped software that was being used by nearly a billion people... I've struggled with this a lot over the years, but I finally decided to share my story. I don't think I would have made it past the first round of interviews at Microsoft if I hadn't gotten so lucky. So pretty much, my entire career is built on one amazing stroke of luck. I also think my experience is a great example of one of the many reasons why the coding problems we use in developer interviews are so problematic: on the spot coding is just not a good way to judge technical ability. Stack Overflow's CEO founder Joel Spolsky actually wrote some of Microsoft's internal programmer-testing guidelines when he worked there in the mid-1990s, and he later publicized them in a 2006 blog post which he says was later adopted by other tech companies, including Google. He has since said that recruiting for IT is broken, adding "I think that I'm responsible." Microsoft has since changed its interviewing practices.

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

Need help on a laptop modified laptop i bought on ebay. Paranoid about keylogging

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

I bought a thinkpad X230 that been modified from the display, soldered components, it was a hackintosh /win10 dual boot. And keyboard been modded. It came from Hong Kong China 51nb.

So I cant edit the bios because I fear of bricking it. Since there are so many whitelisted components. I changed the SSD it came with and put my own SSD and installed Win10. I downloaded Malwarebytes 14day premium

Any tips on what I should do. I dont know if I can trust theres keyloggers or any spyware on it

submitted by /u/DocVader1138
[link] [comments]
News Bewertung

Weiterlesen Weiterlesen

Windows 10 1903 Being Blocked If Using Older BattlEye Software

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: bleepingcomputer.com Direktlink direkt öffnen

Microsoft has stated that they will not allow devices to upgrade to Windows 10 version 1903, otherwise known as the May 2019 Update, if they are running older versions of the anti-cheat software called BattlEye. This is because older versions of the software could cause Windows 10 to crash in version 1903. [...]
News Bewertung

Weiterlesen Weiterlesen

Windows 10 1903 Being Blocked If Using Older BattlEye Software

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: bleepingcomputer.com Direktlink direkt öffnen

Microsoft has stated that they will not allow devices to upgrade to Windows 10 version 1903, otherwise known as the May 2019 Update, if they are running older versions of the anti-cheat software called BattlEye. This is because older versions of the software could cause Windows 10 to crash in version 1903. [...]
News Bewertung

Weiterlesen Weiterlesen

Replacing JavaScript: How eBay Made a Web App 50x Faster With WebAssembly

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: developers.slashdot.org Direktlink direkt öffnen

"Online marketplace eBay has revealed how it boosted performance of a demanding web app by 50x using WebAssembly," reports TechRepublic: The "astonishing" speed-up after switching from a JavaScript-based to a largely WebAssembly-based web app was detailed by the eBay engineering team, who say the performance boost helped make it possible to build a highly-accurate barcode scanner as a web app... a feature it offers in its Android and iOS apps to allow sellers to scan items they are auctioning. "WebAssembly was different. It has tremendous potential, we just did not have the right use case. Well, that changed recently," write the eBay software engineering team. One of the advantages of WebAssembly (Wasm) is that it offers code portability for a variety of languages, allowing developers to take code they've written for other platforms and compile to WebAssembly so it can run in major web browsers. Consequently eBay was able to take the existing version of its barcode scanner written in C++ and compile that to Wasm using Emscripten, adopting the Docker and Node.js-based approach outlined here. After a few minor teething problems, the eBay team were able to run the barcode scanner in the browser, using a Worker thread and JavaScript glue code. The Wasm-based scanner was able to process images of the barcode at 50 Frames per Second (FPS), compared to about 1FPS in an earlier JavaScript-based scanner eBay had tested, a speed-up the team described as "astonishing". Unfortunately, the Wasm code only successfully completed scans 60% of the time, because it wasn't using the inbuilt APIs available for the C++ code to either autofocus or provide user tap focus for the center of the scanned object. eBay's team ultimately ended up implementing three separate worker threads running the Wasm code, the open-source barcode reader ZBar, and their original JavaScript-based scanner code. "The winning response (i.e. the first one to send a valid barcode) is sent to the main thread, and all workers are terminated... With three threads racing against each other, the success rate was indeed close to 100%."

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

Russian Nation-State Hacking Unit's Tools Get More Fancy

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

Russian Nation-State Hacking Unit's Tools Get More Fancy submitted by /u/hoangton
[link] [comments]

News Bewertung

Weiterlesen Weiterlesen

why google asks what kind of phone do i have, when i try to set up 2fa?

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

why google asks what kind of phone do i have, when i try to set up 2fa? submitted by /u/HotTackle
[link] [comments]

News Bewertung

Weiterlesen Weiterlesen

NASA Announces First Commercial Partner For A Space Station Orbiting The Moon

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: science.slashdot.org Direktlink direkt öffnen

"NASA has chosen its first commercial partner for a proposed space station, known as the Lunar Gateway, to be built near the Moon," reports Ars Technica: On Thursday, NASA Administrator Jim Bridenstine said Maxar Technologies would build the first component of the Gateway -- the power and propulsion element. Like the name suggests, it will provide electricity to the Gateway and help move it around. "This time when we go to the Moon, we're actually going to stay," Bridenstine said in making the announcement... Under NASA's current plans to land humans on the Moon by 2024, this is where astronauts will launch to from Earth before climbing aboard pre-positioned landers to take them down to the lunar surface.... The contract announced Thursday is worth a maximum of $375 million. Intriguingly, Maxar said Blue Origin and Draper will join the team in designing, building, and operating the spacecraft. Such a partnership raises the possibility that the power and propulsion element, which will weigh about 5 tons fully fueled, could be launched on Blue Origin's New Glenn rocket. During a teleconference with media, Maxar's Mike Gold said the company would choose a commercial rocket for the power and propulsion element launch in the next 12 to 18 months... The station will use solar electric propulsion to maintain its orbit and have the ability to maneuver into other orbits around the Moon. Before humans visit the Gateway in 2024, the space agency plans to add a small "habitat" module.

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

The Week in Ransomware - May 24th 2019 - Smacking 'Em Down With Decryptors

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: bleepingcomputer.com Direktlink direkt öffnen

We had lots of new variants of existing ransomware and new ransomware found being distributed via malvertising campaigns and RIG exploit kit. The good news is that some of them were smacked down with decryptors! [...]
News Bewertung

Weiterlesen Weiterlesen

Playdate: Kuriose Konsole mit Kurbel, Schwarz-Weiß-Display & Spielabo

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: winfuture.de Direktlink direkt öffnen

Konsole, Handheld, Playdate Das Entwicklerstudio Panic, bisher bekannt für Software- und Spiele­entwicklung, will mit Playdate eine Handheld-Konsole auf den Markt bringen, die in jeder Hinsicht gegen den Strom schwimmt. Sie hat ein Schwarz-Weiß-Display, eine Kurbel als Eingabemethode und soll ohne Aufpreis jede Woche mit einem neuen Spiel versorgt werden. (Weiter lesen)
News Bewertung

Weiterlesen Weiterlesen

Can a Pardon Be a War Crime?: When Pardons Themselves Violate the Laws of War

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: justsecurity.org Direktlink direkt öffnen

President Donald Trump’s inclination to grant pardons to several military and contractor personnel accused or convicted of war crimes may itself be a violation of the laws of war, if not a war crime. In an extraordinary public statement issued Friday, the International Committee of the Red Cross (ICRC) – an international organization that usually acts through confidential communications with parties to armed conflict – explains the distinction between pardons and amnesties.…   continue » “Can a Pardon Be a War Crime?: When Pardons Themselves Violate the Laws of War”

The post Can a Pardon Be a War Crime?: When Pardons Themselves Violate the Laws of War appeared first on Just Security.


News Bewertung

Weiterlesen Weiterlesen

XXL-Brocken mit kleinem Mond: Asteroid-Vorbeiflug sorgt für Aufregung

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: winfuture.de Direktlink direkt öffnen

Nasa, Asteroid, Beobachtung, KW1999 Das wichtigste zuerst: Für die Erde besteht keine Gefahr. Trotzdem sorgt der Vorbeiflug eines Doppel-Asteroiden an diesem Wochenende bei Wissenschaftlern für große Aufregung. Die nächsten 8 Jahre wird kein solch großes Objekt die Erde so nah passieren - und dann hat der Haupt-Asteroid auch noch einen kleine Mond im Schlepptau. (Weiter lesen)
News Bewertung

Weiterlesen Weiterlesen

HiddenWall - Linux Kernel Module Generator For Custom Rules With Netfilter (Block Ports, Hidden Mode, Rootkit Functions, Etc)

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: feedproxy.google.com Direktlink direkt öffnen


HiddenWall is a Linux kernel module generator for custom rules with netfilter. (block ports, Hidden mode, rootkit functions etc). The motivation: on bad situation, attacker can put your iptables/ufw to fall... but if you have HiddenWall, the attacker will not find the hidden kernel module that block external access, because have a hook to netfilter on kernel land(think like a second layer for firewall).
My beginning purpose at this project is protect my personal server, now is protect the machines of my friends. When i talk "friends", i say peoples that don't know how to write low level code. Using the HiddenWall you can generate your custom kernel module for your firewall configuration.
The low level programmer can write new templates for modules etc...

First step, understand before run
Verify if the kernel version is 3.x, 4.x or 5.x:
uname -r
Clone the repository
git clone https://github.com/CoolerVoid/HiddenWall
Enter the folder
cd HiddenWall/module_generator
Edit your firewall rules in directory rules/server.yaml, the python scripts use that file to generate a new firewall module.
$ cat rules/server.yaml
module_name: SandWall
public_ports: 80,443,53
unhide_key: AbraKadabra
hide_key: Shazam
fake_device_name: usb14
liberate_in_2_out: True
whitelist:
- machine:
ip: 192.168.100.181
open_ports: 22,21
- machine:
ip: 192.168.100.22
open_ports: 22
If you want study the static code to generate, look the content at directory "templates".

Second step, generate your module
If you want generate a kernel module following your YAML file of rules, follow that command:
$ python3 WallGen.py --template template/hiddenwall.c -r rules/server.yaml
This generate a generic module with rules of server.yaml, if you want to use another template you can use "wall.c", so template module "hiddenwall" have option to run on hidden mode(is not visible to "# lsmod" for example).

Third step, install your module
To test module:
# cd output; make clean; make
# insmod SandWall.ko
The rule of YAML to generate module is simple, drop all out to in packets, accept ports 80,443 and 53. The machine 192*.181 can connect at ports 22 and 21...
if you use nmap at localhost/127.0.0.1 you can view the ports open... because rule liberate_in_2_out is true.
Password to turn Firewall visible is "AbraKadabra".
Password to turn Firewall invisible is "Shazam".
You need to send password for your fake device "usb14".
To exit module, you need turn visible at "lsmod" command ...
# echo "AbraKadabra" > /dev/usb14
# lsmod | grep SandWall
# rmmod SandWall

Random notes
Tested on ubuntu 16 and fedora 29 at kernels "3.x","4.x" and "5.x".

TODO
Suport to IPV6. Macro to select the interface(to use multiple modes for each interface). Option to remove last logs when turn hide mode. Option to search and remove others toolkits... Code generator to BFP...

References
Wikipedia Netfilter https://en.wikipedia.org/wiki/Netfilter
Linux Device Drivers http://lwn.net/Kernel/LDD3/
M0nad's Diamorphine https://github.com/m0nad/Diamorphine/



News Bewertung

Weiterlesen Weiterlesen

Essential Cybersecurity Tools for Business Organizations

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: hackercombat.com Direktlink direkt öffnen

Businesses today have become the prime target of cyberattacks of all kinds. This is because cybercriminals understand that targeting a business could get them huge amounts of data, both corporate...

The post Essential Cybersecurity Tools for Business Organizations appeared first on .


News Bewertung

Weiterlesen Weiterlesen

An RV Camp Sprang Up Outside Google's HQ. Now Mountain View Wants To Ban It

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: news.slashdot.org Direktlink direkt öffnen

schwit1 shares an excerpt from a report via Bloomberg: In a quiet neighborhood near Google's headquarters last month, rusty, oleaginous sewage was seeping from a parked RV onto the otherwise pristine street. Sergeant Wahed Magee, of the Mountain View Police Department, was furious. Mountain View is a wealthy town that's home to Alphabet, the world's fourth-most valuable public corporation and Google's owner. Magee spends a lot of his time knocking on the doors of RVs parked on the city's streets, logging license plates and marking rigs that haven't moved for several days. This is the epicenter of a Silicon Valley tech boom that is minting millionaires but also fueling a homelessness crisis that the United Nations recently deemed a human rights violation. Thousands of people live in RVs across San Francisco and the broader Bay Area because they can't afford to rent or buy homes. In December, Mountain View police logged almost 300 RVs that appeared to be used as primary residences. Palo Alto, Berkeley and other Bay Area towns have similar numbers. Some Silicon Valley towns have cracked down in recent months, creating an even more uncertain future for RV residents. At a March city council meeting, Mountain View voted to ban RVs from parking overnight on public streets. The ban hasn't taken effect yet, but soon, the town's van dwellers will need to go elsewhere. The city council also declared a shelter crisis and passed a new ordinance to ticket vehicles that "discharge domestic sewage on the public right of way." At the meeting, some people opposing the ban blamed Google for the housing crisis. When asked whether the RV situation will ultimately be resolved, Magee looked tired as he thought about the answer. After a 12-hour day, he had a long drive ahead to get home -- he can't afford to live in Mountain View. "The way things are going, I don't see how it's all gonna disappear," he said. "Where are we gonna put everyone?" The Bay Area wants to enjoy wealth concentration like Manhattan, but also the population spread of the suburbs. Something's gotta give.

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

Huawei: Größter Smartphone-Fertigungspartner stoppt teils Produktion

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: winfuture.de Direktlink direkt öffnen

Smartphone, Huawei, Produktion, Teardown, Fertigung, Fixez, Assembly Die Auswirkungen des US-Embargos gegen den chinesischen Smartphone-Hersteller Huawei betreffen offenbar auch die Produktion der Geräte in China direkt. Der größte Fertigungspartner von Huawei hat laut Medienberichten aus Asien die Produktion teilweise eingestellt, um sich gegen mögliche Repressionen durch die US-Regierung abzusichern. (Weiter lesen)
News Bewertung

Weiterlesen Weiterlesen

Huawei: Größter Smartphone-Fertigungspartner stoppt teils Produktion

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: winfuture.de Direktlink direkt öffnen

Smartphone, Huawei, Produktion, Teardown, Fertigung, Fixez, Assembly Die Auswirkungen des US-Embargos gegen den chinesischen Smartphone-Hersteller Huawei betreffen offenbar auch die Produktion der Geräte in China direkt. Der größte Fertigungspartner von Huawei hat laut Medienberichten aus Asien die Produktion teilweise eingestellt, um sich gegen mögliche Repressionen durch die US-Regierung abzusichern. (Weiter lesen)
News Bewertung

Weiterlesen Weiterlesen

Auf die Spitze getrieben

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: google.com Direktlink direkt öffnen

Der Deutsche Alpenverein (DAV) implementierte ein Security Information and Event Management (SIEM), um die personenbezogenen Daten aller ...
News Bewertung

Weiterlesen Weiterlesen

Kampf um 5G für alle: Allianz wettert gegen lasche Anbieter-Vorgaben

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: winfuture.de Direktlink direkt öffnen

Mobilfunk, Lte, 5G, Sender, Frequenzauktion Es gibt keine Ruhe rund um das Telekommunikationsgesetz, das den Aufbau von 5G regelt. Wirtschafts- und Kommunalverbänden haben sich zu einer Allianz vereint, die gemeinsam druck auf die Regierung ausübt. Die Forderung wurde so schon öfter formuliert: Anbieter sollen dazu verpflichtet werden, Kunden von anderen Anbietern in ihr Netz zu lassen, falls diese keinen Empfang haben. Ohne dieses lokale Roaming wäre die Versorgung der Fläche nicht zu leisten. (Weiter lesen)
News Bewertung

Weiterlesen Weiterlesen

Kampf um 5G für alle: Allianz wettert gegen lasche Anbieter-Vorgaben

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: winfuture.de Direktlink direkt öffnen

Mobilfunk, Lte, 5G, Sender, Frequenzauktion Es gibt keine Ruhe rund um das Telekommunikationsgesetz, das den Aufbau von 5G regelt. Wirtschafts- und Kommunalverbänden haben sich zu einer Allianz vereint, die gemeinsam druck auf die Regierung ausübt. Die Forderung wurde so schon öfter formuliert: Anbieter sollen dazu verpflichtet werden, Kunden von anderen Anbietern in ihr Netz zu lassen, falls diese keinen Empfang haben. Ohne dieses lokale Roaming wäre die Versorgung der Fläche nicht zu leisten. (Weiter lesen)
News Bewertung

Weiterlesen Weiterlesen

Hui oder pfui? Amazon patentiert sich Alexa ohne Aktivierungswort

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: winfuture.de Direktlink direkt öffnen

Amazon, Sprachassistent, Alexa, Amazon Echo, Echo, Amazon Echo 2 Das ist sicherlich nicht etwas, was sich viele Amazon-Kunden wünschen: Der Konzern hat sich eine neue Technologie patentieren lassen, mit der die Sprachassistentin Alexa auch ohne ein so genanntes Aktivierungswort ("Alexa...") auskommt. (Weiter lesen)
News Bewertung

Weiterlesen Weiterlesen

Hui oder pfui? Amazon patentiert sich Alexa ohne Aktivierungswort

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: winfuture.de Direktlink direkt öffnen

Amazon, Sprachassistent, Alexa, Amazon Echo, Echo, Amazon Echo 2 Das ist sicherlich nicht etwas, was sich viele Amazon-Kunden wünschen: Der Konzern hat sich eine neue Technologie patentieren lassen, mit der die Sprachassistentin Alexa auch ohne ein so genanntes Aktivierungswort ("Alexa...") auskommt. (Weiter lesen)
News Bewertung

Weiterlesen Weiterlesen

New BlackArch Linux ISO For Penetration Testing Released With Kernel 5.1.4

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: hackersonlineclub.com Direktlink direkt öffnen

Black Arch Linux BootBlackArch Linux OS New Release Added 150 more tools. New BlackArch Linux ISOs and OVA (2019.06.01) released with 2200 tools included. New version of...

The post New BlackArch Linux ISO For Penetration Testing Released With Kernel 5.1.4 appeared first on HackersOnlineClub.


News Bewertung

Weiterlesen Weiterlesen

New BlackArch Linux ISO For Penetration Testing Released With Kernel 5.1.4

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: hackersonlineclub.com Direktlink direkt öffnen

Black Arch Linux BootBlackArch Linux OS New Release Added 150 more tools. New BlackArch Linux ISOs and OVA (2019.06.01) released with 2200 tools included. New version of...

The post New BlackArch Linux ISO For Penetration Testing Released With Kernel 5.1.4 appeared first on HackersOnlineClub.


News Bewertung

Weiterlesen Weiterlesen

Daten-Leak: US-Immobiliendienstleister stellt 885 Millionen Unterlagen online

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: heise.de Direktlink direkt öffnen

Vertrauliche Vertragsunterlagen zu Immobilienkäufen in den USA waren frei zugänglich. Dafür genügte ein simples Ändern der Vertragsnummer in der URL.
News Bewertung

Weiterlesen Weiterlesen

Daten-Leak: US-Immobiliendienstleister stellt 885 Millionen Unterlagen online

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: heise.de Direktlink direkt öffnen

Vertrauliche Vertragsunterlagen zu Immobilienkäufen in den USA waren frei zugänglich. Dafür genügte ein simples Ändern der Vertragsnummer in der URL.
News Bewertung

Weiterlesen Weiterlesen

Seitennavigation

Seite 3 von 3.995 Seiten (Bei Beitrag 70 - 105)
139.813x Beiträge in dieser Kategorie

Auf Seite 2 zurück | Nächste 4 Seite | Letzte Seite

[ 1 ] [ 2 ] [3] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ]