1. IT-Security >
  2. Cyber Security Nachrichten


ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese
Anzeige

Nachrichten


Suchen

Google announces crackdown on Play Store ratings and reviews

IT Security Nachrichten vom 18.12.2018 um 04:10 Uhr | Quelle zdnet.com
Company said it removes millions of Play Store reviews and ratings on a weekly basis.
Newsbewertung

Weiterlesen

Policies around disabling 2 factor auth

IT Security Nachrichten vom 18.12.2018 um 03:53 Uhr | Quelle reddit.com

I’m wondering what the general consensus is on 2 factor auth policies if someone loses their key.

I’ve seen some companies who instantly disable it if you ask nicely (making it pointless in the first place), I’ve seen some who confirm identity with scans of identification, and some that if you lose it you lose your account.

I don’t like the emailing photos of identification method so that’s a no go, I also don’t like the idea of someone just losing access their account completely.

Just wondering what other people are doing, or if anyone has seen any other companies doing anything different.

submitted by /u/callumb314
[link] [comments]
Newsbewertung

Weiterlesen

Tumblr Porn Vanishes Today

IT Security Nachrichten vom 18.12.2018 um 03:50 Uhr | Quelle tech.slashdot.org
Earlier this month, Tumblr announced that it would be permanently banning adult content from its platform on December 17th. Well, that day has arrived and the social media site is now hiding all posts that are currently flagged as explicit, as well as posts that users are in the process of appealing. This includes media showing sex acts, exposed genitals, and "female-presenting" nipples. The Verge reports: In addition to what's already gone, more adult content is going to be flagged in coming weeks, Tumblr says, and it hopes that the automated tools will be more accurate at picking out what counts as explicit. In a blog post that went up today, Tumblr apologized to users: "We are sorry that this has not been an easy transition and we know we can do a better job of explaining what we're doing." It said the change would be a slow process that involves "flagging tens of billions of GIFs, videos, and photos." Many users also criticized Tumblr's decision to consider "female-presenting nipples" as explicit, while male-presenting nipples were still okay. Some pointed out that in the case of non-binary, genderfluid, or trans individuals, it would be confusing where the line would be drawn on whose nipples would be considered explicit. In its blog post today, Tumblr has added the caveat, "yeah, we know you hate this term," but maintained the language and distinction. "We understand and agree that there have been too many wrongfully flagged posts since we announced the policy change," says Tumblr. But if users don't appeal their posts, then they're out of luck. That could also be a problem for popular older accounts, which may not have anyone monitoring them to appeal the overly aggressive moderation. Flagged content will be hidden, but not deleted, Tumblr emphasized. That will allow posts to be appealed even after they're removed from public view. On a more positive note, Tumblr says that "all appeals will be sent to a real, live human who can make the appropriate call."

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Senate Report Shows Russia Used Social Media To Support Trump In 2016

IT Security Nachrichten vom 18.12.2018 um 03:10 Uhr | Quelle news.slashdot.org
AmiMoJo shares a report from the BBC: Russia used every major social media platform to influence the 2016 US election, the report claims. New research says YouTube, Tumblr, Instagram and PayPal -- as well as Facebook and Twitter -- were leveraged to spread propaganda. Its authors criticize the "belated and uncoordinated response" by tech firms. It is the first analysis of millions of social media posts provided by Twitter, Google and Facebook to the Senate Intelligence Committee. Russia adapted techniques from digital marketing to target audiences across multiple channels, with a particular focus on targeting conservatives with posts on immigration, race, and gun rights. There were also efforts to undermine the voting power of left-leaning African-American citizens, by spreading misinformation about the electoral process. "What is clear is that all of the messaging clearly sought to benefit the Republican Party -- and specifically Donald Trump," the report says. "Trump is mentioned most in campaigns targeting conservatives and right-wing voters, where the messaging encouraged these groups to support his campaign. The main groups that could challenge Trump were then provided messaging that sought to confuse, distract and ultimately discourage members from voting."

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Inside Chronicle, Alphabet’s cybersecurity moonshot

IT Security Nachrichten vom 18.12.2018 um 03:07 Uhr | Quelle reddit.com
Inside Chronicle, Alphabet’s cybersecurity moonshot submitted by /u/QuirkySpiceBush
[link] [comments]

Newsbewertung

Weiterlesen

WSJ website defaced by PewDiePie fan in ongoing YouTube subscribers battle

IT Security Nachrichten vom 18.12.2018 um 02:52 Uhr | Quelle zdnet.com
Hacker posts apology on WSJ site and then urges users to follow the YouTube star.
Newsbewertung

Weiterlesen

Twitter discloses suspected state-sponsored attack

IT Security Nachrichten vom 18.12.2018 um 02:38 Uhr | Quelle zdnet.com
Twitter says data leak occurred after an attack targeting a vulnerability in its support form system.
Newsbewertung

Weiterlesen

Junk Food Cravings Linked To a Lack of Sleep, Study Suggests

IT Security Nachrichten vom 18.12.2018 um 02:30 Uhr | Quelle science.slashdot.org
An anonymous reader quotes a report from The Guardian: Writing in the Journal of Neuroscience, Peters and colleagues describe how they recruited 32 healthy men aged between 19 and 33 and gave all of them the same dinner of pasta and veal, an apple and a strawberry yoghurt. Participants were then either sent home to bed wearing a sleep-tracking device, or kept awake in the laboratory all night with activities including parlor games. All returned the next morning to have their hunger and appetite rated, while 29 of the men had their levels of blood sugar measured, as well as levels of certain hormones linked to stress and appetite. Participants also took part in a game in which they were presented with pictures of 24 snack food items, such as chocolate bars, and 24 inedible items, including hats or mugs, and were first asked to rate how much they would be willing to pay for them on a scale. During a functional magnetic resonance imaging (fMRI) scan, they were asked to choose whether or not they would actually buy the object when its price was fixed -- an experiment that allowed researchers to look at participants' brain activity upon seeing pictures of food and other items. A week later, the experiment was repeated, with the participants who had previously stayed up allowed to sleep, and vice versa. The results showed that whether sleep-deprived or not, participants were similarly hungry in the morning, and had similar levels of most hormones and blood sugar. However, when participants were sleep-deprived, they were willing to pay more for a food snack than when rested, and had higher levels in their blood of a substance called des-acyl ghrelin -- which is related to the "hunger hormone" ghrelin, though its function is not clear. The fMRI results showed that when sleep-deprived, participants had greater activity in the brain's amygdala (where food rewards are processed) when food images were shown, and a stronger link between the price participants would pay for food and activity in the hypothalamus (which is involved in regulating consumption). Interactions between these two regions increased compared with when participants had slept.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Memes, messengers, and missiles: From Twitter to chat apps and weapons, security is ho-ho-hosed this Xmas

IT Security Nachrichten vom 18.12.2018 um 02:20 Uhr | Quelle go.theregister.com

Just slightly better than coal in your stocking

Roundup  We are now firmly into the holiday season, the Christmas parties are kicking off, and folks are swapping their Excel files for eggnog, or something cliched like that.…


Newsbewertung

Weiterlesen

Canadian Hacker Talks To Arizona Man Directly Through His IoT Security Camera

IT Security Nachrichten vom 18.12.2018 um 02:16 Uhr | Quelle packetstormsecurity.com

Newsbewertung

Weiterlesen

WSJ hacked: "WallStreet Journal Public Apology to PewDiePie"

IT Security Nachrichten vom 18.12.2018 um 02:00 Uhr | Quelle reddit.com
WSJ hacked: "WallStreet Journal Public Apology to PewDiePie" submitted by /u/article10ECHR
[link] [comments]

Newsbewertung

Weiterlesen

Swedish ISP Bahnhof Fights Sci-Hub Blocking Order

IT Security Nachrichten vom 18.12.2018 um 01:50 Uhr | Quelle yro.slashdot.org
thomst writes: "After being ordered to block a number of piracy-related domains following a complaint from academic publisher Elsevier, Swedish ISP Bahnhof retaliated by semi-blocking Elsevier's own website and barring the court from visiting Bahnhof.se," reports TorrentFreak. "Those actions have now prompted Sweden's telecoms watchdog to initiate an inquiry to determine whether the ISP breached net neutrality rules." Bahnhof is under investigation for diverting its users who attempt to click on links to Elsevier -- the complainant in the case -- to a page that explains the giant journal publisher forced the ISP to block access to a number of Sci-Hub domains, via a court order it doesn't have the resources to fight. That page includes a link to Elsevier that Bahnhof doesn't intercept. So, is it reasonable for Bahnhof to divert its users to a "fuck you" page, rather than allowing them to freely access Elsevier?

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Die wichtigsten Neuerungen von TLS 1.3 im Überblick

IT Security Nachrichten vom 18.12.2018 um 01:45 Uhr | Quelle searchsecurity.de

Newsbewertung

Weiterlesen

You better watch out, you better not cry. Better not pout, I'm telling you why: SQLite vuln fixes are coming to town

IT Security Nachrichten vom 18.12.2018 um 01:16 Uhr | Quelle go.theregister.com

May your days be merry and bright, and may you all go patch your SQLite

Google and other software developers have patched the SQLite component of their code after it was discovered it could be potentially exploited to inject malware into vulnerable systems.…


Newsbewertung

Weiterlesen

Germany Refuses To Ban Huawei, Citing Lack of Real Evidence

IT Security Nachrichten vom 18.12.2018 um 01:10 Uhr | Quelle yro.slashdot.org
hackingbear writes: Germany's IT watchdog has expressed skepticism about calls for a boycott of Chinese telecoms giant Huawei, saying it has seen no evidence the firm could use its equipment to spy for Beijing, news weekly Spiegel reported. "For such serious decisions like a ban, you need proof," the head of Germany's Federal Office for Information Security (BSI), Arne Schoenbohm, told Spiegel, adding that his agency had no such evidence. The U.S. has been pressuring German authorities for months to drop Huawei, according to people familiar with the matter, but the Germans have asked for more specific evidence to demonstrate the security threat. German authorities and telecom executives have yet to turn up any evidence of security problems with Chinese equipment vendors, according to a person familiar with the matter. Separately, at a (secret lobster-themed) meeting in Canada in July 2018, espionage chiefs from Australia, Canada, New Zealand, the U.K. and the U.S. -- all signatories to a treaty on signals intelligence, and often referred to as the "Five Eyes" -- agreed to do their best to contain the global growth of Chinese telecom (vendor) Huawei, the Australian Financial Review reported (paywalled). On the other hand, documents leaked by WikiLeaks and Snowden claimed that the NSA, the leader of the Five Eyes, tapped German Chancellery for decades and bugged routers made by Cisco, the leading American networking equipment vendor.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Creating super wordlists using DyMerge tool on Kali Linux

IT Security Nachrichten vom 18.12.2018 um 00:36 Uhr | Quelle reddit.com
Creating super wordlists using DyMerge tool on Kali Linux submitted by /u/Cyb3rw0rM1
[link] [comments]

Newsbewertung

Weiterlesen

FCC Forces California To Drop Plan For Government Fees On Text Messages

IT Security Nachrichten vom 18.12.2018 um 00:30 Uhr | Quelle tech.slashdot.org
An anonymous reader quotes a report from Ars Technica: California telecom regulators have abandoned a plan to impose government fees on text-messaging services, saying that a recent Federal Communications Commission vote has limited its authority over text messaging. The FCC last week voted to classify text-messaging as an information service, rather than a telecommunications service. "Information service" is the same classification the FCC gave to broadband when it repealed net neutrality rules and claimed that states aren't allowed to impose their own net neutrality laws. California's legislature passed a net neutrality law anyway and is defending it in court. But the state's utility regulator chose not to challenge the FCC on regulation of text messaging. The California Public Utilities Commission (CPUC) was scheduled to consider the text-message fee proposal at a meeting next month but pulled the item off the agenda after the FCC action. "Under California law, telecommunications services are subject to the collection of surcharges to support a number of CPUC public programs that subsidize the cost of service for rural Californians and for low-income, disadvantaged communities, and provides special services for the deaf, the hard of hearing, and the disabled," the commission said in a statement Friday.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Red Hat Enterprise Linux Comes To Windows 10 in the Form of WLinux Enterprise

IT Security Nachrichten vom 17.12.2018 um 23:51 Uhr | Quelle tech.slashdot.org
Mark Wilson writes: Earlier in the year open-source software startup Whitewater Foundry brought WLinux to the Windows Subsystem for Linux (WSL). Not content with creating the first native Linux distribution for WSL, the company has now gone a step further, targeting enterprise users with WLinux Enterprise. Whitewater Foundry says that WLinux Enterprise is the first product to support the industry-standard Red Hat Enterprise Linux on Windows Subsystem for Linux.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Red Hat Enterprise Linux Comes To Windows 10 in the Form of WLinux Enterprise

IT Security Nachrichten vom 17.12.2018 um 23:51 Uhr | Quelle tech.slashdot.org
Mark Wilson writes: Earlier in the year open-source software startup Whitewater Foundry brought WLinux to the Windows Subsystem for Linux (WSL). Not content with creating the first native Linux distribution for WSL, the company has now gone a step further, targeting enterprise users with WLinux Enterprise. Whitewater Foundry says that WLinux Enterprise is the first product to support the industry-standard Red Hat Enterprise Linux on Windows Subsystem for Linux.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

U.S. Ballistic Missile Defense System Rife with Security Holes

IT Security Nachrichten vom 17.12.2018 um 23:50 Uhr | Quelle threatpost.com
Widespread, unpatched vulnerabilities are just one set of problems uncovered by a Department of Defense audit.
Newsbewertung

Weiterlesen

U.S. Ballistic Missile Defense System Rife with Security Holes

IT Security Nachrichten vom 17.12.2018 um 23:50 Uhr | Quelle threatpost.com
Widespread, unpatched vulnerabilities are just one set of problems uncovered by a Department of Defense audit.
Newsbewertung

Weiterlesen

pwnedkeys -- all the keys that should never be used again

IT Security Nachrichten vom 17.12.2018 um 23:35 Uhr | Quelle reddit.com
submitted by /u/speckz
[link] [comments]
Newsbewertung

Weiterlesen

pwnedkeys -- all the keys that should never be used again

IT Security Nachrichten vom 17.12.2018 um 23:35 Uhr | Quelle reddit.com
submitted by /u/speckz
[link] [comments]
Newsbewertung

Weiterlesen

2019 Will Be The Year Of Cyber Attack-As-A-Service

IT Security Nachrichten vom 17.12.2018 um 23:24 Uhr | Quelle hackercombat.com

2017 was the year of the Ransomware, the current year 2018 is setting itself up as the year of the cryptojacking malware while ‘cyber attacks for hire’ is said to...

The post 2019 Will Be The Year Of Cyber Attack-As-A-Service appeared first on .


Newsbewertung

Weiterlesen

2019 Will Be The Year Of Cyber Attack-As-A-Service

IT Security Nachrichten vom 17.12.2018 um 23:24 Uhr | Quelle hackercombat.com

2017 was the year of the Ransomware, the current year 2018 is setting itself up as the year of the cryptojacking malware while ‘cyber attacks for hire’ is said to...

The post 2019 Will Be The Year Of Cyber Attack-As-A-Service appeared first on .


Newsbewertung

Weiterlesen

Lawmakers Push To Create a Three-Digit Suicide Hotline Number

IT Security Nachrichten vom 17.12.2018 um 23:11 Uhr | Quelle news.slashdot.org
In a letter addressed to the FCC, Senator Ron Wyden urged commissioners to create a three-digit, 911-style suicide hotline number. The Oregon senator cites the CDC's report that more than 40,000 Americans died by suicide in 2017. From a report: "I write on behalf of those struggling with mental health issues, our veterans struggling with PTSD and for those impacted by the tragedy of suicide," Wyden writes. "I urge you to designate a 3-digit code as a Behavioral Health and Suicide Crisis Lifeline. Thank you for your consideration." While The National Suicide Prevention Lifeline launched an 800 line in 2004, many believe the number is too long and cumbersome for those reaching out in their time of need. The letter floats the idea of using 611. The call echoes a similar push last week by Senator Orrin Hatch and Representative Chris Stewart to designate the number, which is currently used to report phone service problems by some U.S. and Canadian carriers.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Hackers Steal $1 Million From Save The Children Foundation

IT Security Nachrichten vom 17.12.2018 um 22:23 Uhr | Quelle informationsecuritybuzz.com

Save the Children Foundation has revealed that the charity was targeted by fraudsters last year, leading to the loss of $1 million. Speaking to the Boston Globe, the US arm of the non-profit, which supports children worldwide, said that con artists managed to compromise an employee’s email account in order to masquerade as the staff member in question. Javvad …

The ISBuzz Post: This Post Hackers Steal $1 Million From Save The Children Foundation appeared first on Information Security Buzz.


Newsbewertung

Weiterlesen

Former Edge Browser Intern Alleges Google Sabotaged Microsoft's Browser

IT Security Nachrichten vom 17.12.2018 um 22:21 Uhr | Quelle tech.slashdot.org
Joshua Bakita, a former software engineering intern on the Edge team at Microsoft, says one of the reasons why Microsoft had to ditch EdgeHTML rendering engine in Edge browser and switch to Chromium was to keep up with the changes (some of which were notorious) that Google pushed to its sites. These changes were designed to ensure that Edge and other browsers could not properly run Google's sites, he alleged. Responding to a comment, he wrote: "For example, they may start integrating technologies for which they have exclusive, or at least 'special' access. Can you imagine if all of a sudden Google apps start performing better than anyone else's?" This is already happening. I very recently worked on the Edge team, and one of the reasons we decided to end EdgeHTML was because Google kept making changes to its sites that broke other browsers, and we couldn't keep up. For example, they recently added a hidden empty div over YouTube videos that causes our hardware acceleration fast-path to bail (should now be fixed in Win10 Oct update). Prior to that, our fairly state-of-the-art video acceleration put us well ahead of Chrome on video playback time on battery, but almost the instant they broke things on YouTube, they started advertising Chrome's dominance over Edge on video-watching battery life. What makes it so sad, is that their claimed dominance was not due to ingenious optimization work by Chrome, but due to a failure of YouTube. On the whole, they only made the web slower. Now while I'm not sure I'm convinced that YouTube was changed intentionally to slow Edge, many of my co-workers are quite convinced -- and they're the ones who looked into it personally. To add to this all, when we asked, YouTube turned down our request to remove the hidden empty div and did not elaborate further. And this is only one case.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Twitter Draws Data Privacy Concerns with Two New Bugs

IT Security Nachrichten vom 17.12.2018 um 22:17 Uhr | Quelle threatpost.com
The two flaws shed light on heightened concern around user data privacy when it comes to data.
Newsbewertung

Weiterlesen

How to Decrypt the InsaneCrypt or Everbe 1 Family of Ransomware

IT Security Nachrichten vom 17.12.2018 um 22:02 Uhr | Quelle bleepingcomputer.com
If you are infected with the InsaneCrypt or Everbe 1.0 family of ransomware infections, a decryptor has been created that recover your files for free. [...]
Newsbewertung

Weiterlesen

Twitter Warns of Suspicious Traffic Coming From China and Russia

IT Security Nachrichten vom 17.12.2018 um 21:50 Uhr | Quelle tech.slashdot.org
Suspicious traffic to a Twitter user forum appears to be part of a government-backed activity coming from China and Russia, a Twitter spokesman told Reuters Monday. The company said it is yet to determine the reason for the activity, but is choosing to notify users out of an abundance of caution. Additionally: Twitter bug leaks phone number country codes.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Deep Explorer - Tool Which Purpose Is The Search Of Hidden Services In Tor Network, Using Ahmia Browser And Crawling The Links Obtained

IT Security Nachrichten vom 17.12.2018 um 21:45 Uhr | Quelle feedproxy.google.com

Dependencies
 pip3 install -r requirements.txt
also you should have Tor installed

Usage
python3 deepexplorer.py STRING_TO_SEARCH NUMBER_OF_RESULTS TYPE_OF_CRAWL
Examples:
python3 deepexplorer.py "legal thing" 40 default legal (will crawl if results obtained in browser do not reach 40, also the script will show links which have "legal" string in html [like intext dork in google])
python3 deepexplorer.py "ilegal thing" 30 all dni(will crawl every link obtained in browser [ultil reachs 30], also the script will show links which have "dni" string in html [like intext dork in google])
python3 deepexplorer.py "legal thing" 30 none (do not crawl, only obtain links from browser)

About
Deep Explorer is a tool designed to search (any) thing in a few seconds
Any idea, failure etc please report to telegram: blueudp
results.txt contains results obtaioned in previus search
Tested in ParrotOS and Kali Linux 2.0

Type of Errors
  • Error importing... -> You should try manual pip install package
  • Error connecting to server -> Cant connect to ahmia browser If deep explorer can not execute service ..., do it manually, deep explorer checks the tor instance at the beginning so it will skip that part

Contact
Name: Eduardo Pérez-Malumbres
Telegram: @blueudp
Twitter: https://twitter.com/blueudp



Newsbewertung

Weiterlesen

Fitbit OS 3.0 Is a Huge Update and Brings Much Better Third-Party App Support

IT Security Nachrichten vom 17.12.2018 um 21:35 Uhr | Quelle news.softpedia.com
Fitbit just revealed that the new Fitbit OS 3.0 has been released, providing users with more relevant fitness information and paving the way for many other developers and companies to come to the platform. The success for any smartwatch lies in the post-launch support, and it looks that Fitbit is planning to support its latest line of smartwatches for a long time. It’s not just about pushing fixes, although that’s important as well, it’s also about bringing new content and functionalities. In fact, the fact that Fitbit can still add functionalities to its latest smartwatches is proof that their platform is much more flexible. It’s also true that third-party developers haven’t flocked to the new platform, but this is where the latest 3.0 update promises to make some changes. More than just a simple update The previous Fitbit 2.2 update was interesting, but it wasn’t something t...
Newsbewertung

Weiterlesen

HTC Desire 12s: Einsteiger-Smartphone und Design-Unfall in Einem

IT Security Nachrichten vom 17.12.2018 um 21:27 Uhr | Quelle winfuture.de
Smartphone, HTC Desire 12s, HTC Desire 12 S Der taiwanische Hersteller HTC hat mit dem HTC Desire 12s ein für viele Beobachter wohl reichlich kurios auassehendes Einsteiger-Smartphone vorgestellt. Von vorn mag das Gerät noch ganz ansehnlich scheinen, doch auf der Rückseite wirkt es so, als wäre den HTC-Designern da etwas mächtig verrutscht. (Weiter lesen)
Newsbewertung

Weiterlesen

2018 Worst Password Offenders Announced; Trump, Google And United Nations High On The List

IT Security Nachrichten vom 17.12.2018 um 21:15 Uhr | Quelle informationsecuritybuzz.com

US President Trump, the United Nations, and Google have all earned themselves a position as some of the worst password offenders over 2018. Weak passcodes, the use of terrible passwords — such as “123456” or “QWERTY” –and a failure to change your account credentials on a regular basis have all, for years, been cautioned against for the …

The ISBuzz Post: This Post 2018 Worst Password Offenders Announced; Trump, Google And United Nations High On The List appeared first on Information Security Buzz.


Newsbewertung

Weiterlesen

Seitennavigation

Seite 3 von 3.117 Seiten (Bei Beitrag 70 - 105)
109.065x Beiträge in dieser Kategorie

Auf Seite 2 zurück | Nächste 4 Seite | Letzte Seite
[ 1 ] [ 2 ] [3] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ]