1. IT-Security >
  2. Cyber Security Nachrichten


ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese

Nachrichten


Suchen

News RSS Quellen: 82x
News Kategorien unterhalb von Nachrichten: 0x
News RSS Feeds dieser Nachrichten Kategorie: RSS Feed IT Security Nachrichten
Benutze Feedly zum Abonieren.Folge uns auf feedly
Download RSS Feed App für Windows 10 Store (Leider gibt es nicht mehr viele Extensions mit welchen Sie RSS-Feeds in einer Software abonieren können. Der Browser Support für RSS-Feeds wurde eingestellt (Firefox,Chrome).

Eigene IT Security Webseite / Blog / Quelle hinzufügen

Seitennavigation

Seite 8 von 3.995 Seiten (Bei Beitrag 245 - 280)
139.810x Beiträge in dieser Kategorie

Auf Seite 7 zurück | Nächste 9 Seite | Letzte Seite

[ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [8] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ]

Marvel Ultimate Alliance 3: Neuer Trailer rückt die X-Men in den Fokus

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: winfuture.de Direktlink direkt öffnen

Nintendo, Nintendo Switch, Marvel, action-rollenspiel, Superhelden, Marvel Ultimate Alliance 3, Marvel Ultimate Alliance, Marvel Ultimate Alliance 3: The Black Order, The Black Order Nintendo hat einen neuen Trailer zu Marvel Ultimate Alliance 3: The Black Order veröffentlicht, welches im Sommer exklusiv für die Nintendo Switch erscheint. Im Mittelpunkt des Videos stehen dabei die X-Men, die in dem Action-Rollenspiel selbstverständlich nicht fehlen dürfen. In Marvel Ultimate Alliance 3: The Black Order müssen Spieler ihr ultimatives Superhelden-Team zusammenstellen, um Thanos und den Schwarzen Orden aufzuhalten. Dabei können sie auf eine große Auswahl bekannter Marvel-Charaktere ... (Weiter lesen)
News Bewertung

Weiterlesen Weiterlesen

Erster Campustag - Hochschule informiert über Studienangebot

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: google.com Direktlink direkt öffnen

Doch wie sieht es aus mit Studiengängen wie IT Security, Smart Building Engineering Management oder Biomedical Scienes? Die Hochschule ...
News Bewertung

Weiterlesen Weiterlesen

Moritz Leuenberger: "Die Politik hinkt der Technologie hinterher"

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: google.com Direktlink direkt öffnen

Mai an der IT-Security Inside gesagt. Der Alt-Bundesrat hielt an der Veranstaltung von Avantec die letzte Rede des Tages. Er beobachtet die ...
News Bewertung

Weiterlesen Weiterlesen

Microsoft Beefs Up Wi-Fi Protection

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: threatpost.com Direktlink direkt öffnen

The Windows 10 update that's rolling out addresses insecure Wi-Fi hotspots with new user notifications.
News Bewertung

Weiterlesen Weiterlesen

Post-9/11 Veterans Have Mixed Feelings About Trump’s War Crimes Pardons

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: justsecurity.org Direktlink direkt öffnen

In order to better understand how to think about this controversial decision, Iraq and Afghanistan Veterans of America (IAVA) conducted a flash poll this week, with over 1,600 member veterans and military service members responding.

The post Post-9/11 Veterans Have Mixed Feelings About Trump’s War Crimes Pardons appeared first on Just Security.


News Bewertung

Weiterlesen Weiterlesen

Google shuts down newly created accounts of Baltimore ransomware victims

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: cybersecurity-insiders.com Direktlink direkt öffnen

It’s been a fortnight since Baltimore city servers have experienced a ransomware attack and as a result of which all IT services including internal email systems and online payment systems have been suspended by the city officials. In order to stay in touch with each other, the officials created new Gmail accounts for correspondence on […]

The post Google shuts down newly created accounts of Baltimore ransomware victims appeared first on Cybersecurity Insiders.


News Bewertung

Weiterlesen Weiterlesen

compromised site?

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

Hi all,

I have a wordpress site that was attacked a lot today from an ip in Netherlands (reported by Wordfence) and now I found my cPanel set with German or a similar language.

Can an attacker get the cPanel account by hacking a wordpress site?

I have changed the cPanel password, wordpress and database. What other mandatory steps should I make?

Thank you.

submitted by /u/srjjj
[link] [comments]
News Bewertung

Weiterlesen Weiterlesen

Facial Recognition Has Already Reached Its Breaking Point

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

Facial Recognition Has Already Reached Its Breaking Point submitted by /u/RHarris2295
[link] [comments]

News Bewertung

Weiterlesen Weiterlesen

Huawei: Windows Update-Versorgung soll trotz US-Embargo sicher sein

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: winfuture.de Direktlink direkt öffnen

Huawei, MateBook, Huawei MateBook Microsoft hat sich noch immer nicht mit einem einzigen Wort zum Thema Huawei und Windows geäußert, so dass die Lage rund um Windows 10 und die von dem chinesischen Hersteller vertriebenen Notebooks und Tablets mit dem Betriebssystem weiterhin ungeklärt scheint. Aus Richtung Huawei kommt jetzt aber wohl Entwarnung: die Versorgung mit Windows-Updates läuft weiter. (Weiter lesen)
News Bewertung

Weiterlesen Weiterlesen

"Marking PDF"

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

Hi !

Being the only tech savvy person in my department, my boss gave me an assignement to complete that is PDF related. However, after some research, I am at a loss on how to do it...
Basically, my boss wants to be able to send PDFs to multiple persons by e-mail, and, once that person opens them, their name will appear on the document. This is meant to trace leaks (I work for a National Secretary). From my understanding, such a thing can be done through an adobescript, but I was wondering if any other solutions existed ? My boss won't understand it that way...

Thanks for your help !

submitted by /u/Hebiwarrior
[link] [comments]
News Bewertung

Weiterlesen Weiterlesen

Anti-Loot Box Bill Could Radically Change How Video Games Are Sold

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: games.slashdot.org Direktlink direkt öffnen

Democratic and Republican senators can hardly agree on what to order for lunch, but as of Thursday they seem to agree that the video game industry requires additional government oversight. From a report: Proposed legislation could ban loot boxes and other kinds of microtransactions, and its co-sponsors include members from both major parties. The devil is in the details, of course, and the bill itself could have far reaching implications for the game industry. The full text of the proposed bill is available online. Its intention is to "regulate certain pay-to-win microtransactions and sales of loot boxes." In order to do so, it first has to define what those things are. The bill says, "an add-on transaction to a interactive digital entertainment product that [...] eases a user's progression through content otherwise available within the game without the purchase of such transaction; assists a user in accomplishing an achievement within the game that can otherwise be accomplished without the purchase of such transaction; assists a user in receiving an award associated with the game that is otherwise available in association with the game without the purchase of such transaction; or permits a user to continue to access content of the game that had previously been accessible to the user but has been made inaccessible after the expiration of a timer or a number of gameplay attempts; or with respect to an interactive digital entertainment product that, from the perspective of a reasonable user of the product, is a game featuring competition with other users, provides a user with a competitive advantage with respect to the game's competitive aspects over users who do not make such a transaction." The only exclusions listed in the bill are additional difficulty modes, cosmetic items, and downloadable expansions. So, if a company wanted to charge for a new game plus mode, they could do that. Also, the sale of skins in Fortnite and new content expansions for The Elder Scrolls Online would be perfectly acceptable. But, these guidelines as written leave a lot open to interpretation. Would it call into question selling experience point boosters in games like Anthem, Destiny 2, and World of Tanks? What about the practice of selling access to characters in Mortal Kombat 11 and Apex Legends, and even new Champions in League of Legends? Do we get to the point where, somewhere in the future, senators are arguing whether or not a particular weapon or perk is overpowered and should not be for sale?

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

Hacker veröffentlicht vier Windows-0-Day-Lücken innerhalb weniger Tage

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: heise.de Direktlink direkt öffnen

Als "SandboxEscaper" und "Polar Bear" hat ein Hacker insgesamt vier bislang ungepatchte Windows-Lücken veröffentlicht. Grund zur Panik besteht aber nicht.
News Bewertung

Weiterlesen Weiterlesen

Swiss IT Security Group kauft in Deutschland zu

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: google.com Direktlink direkt öffnen

Die Swiss IT Security Group (SITS) schlägt erneut zu und übernimmt 100 Prozent der Anteile des deutschen Security-Dienstleisters GCL-IT. Dies ist ...
News Bewertung

Weiterlesen Weiterlesen

Someone who claimed they were me called and canceled my appointment

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

Situation: I called [a healthcare facility] to cancel an appointment. I gave your standard, " Good morning this is [my name] and I have an appointment today which I need to reschedule." Reception asks me, "Did we get disconnected?"

Confused, I explained no- this is my first time calling.

Reception, also confused, explained how they can't find or cancel my appointment because they literally just got off of the phone with someone who provided my name- the exact same spelling- and my birthdate to cancel "their" appointment.

Reception said, "the person had the same name, same address, same birthdate, knew you had an appointment this morning" (0_0) but they did not mention anything about validating or giving an SSN or contact info. Also around that point, she realized that most definitely she was talking to two different people and not a confused patient, contacted her manager, and started a HIPPA investigation.

I'm pretty concerned because that's a lot of PII that someone else seemed to know.

Furthermore: The little that I was able to get out of the receptionist provided me with the impression that a bad actor could have retrieved enough info to begin a dialog with reception if they had access to my Gmail calendar.

  • Originally I had the appointment at 11 am in my calendar, which the alleged-me called to cancel; however, when the office called to confirm my appointment the other day, they let me know that they have me down for 10 am.
    • (and I didn't update the calendar item until last night and also moved it to a shared calendar.)
  • I'm detailed with my calendar items so attached to the "location" field for my appointment is a contact with the name of the office, address, and receptions main number.
  • The alleged-me asked reception to address them by their nickname, which happens to be part of my email address.
  • My email is old AF and I signed up with a dot in the address, which Google says the dots in emails don't matter but others disagree.

Wrapup: So should I wait to see what the HIPPA investigation yields? I don't want to overreact to this if it's something stupid like the reception confused me with someone else (My first name is common and my last name is so confusing I can see someone getting frustrated or assuming it's misspelled. Confused patients call their providers every day- the alleged me could have been confused just saying "yeaH" the whole time. At the same time I can't help but think that with the level of detail that reception says the alleged-me knew, and how all those details could be obtained from my gmail calenarar...is it someone screwing with me? Even still- not sure who would have that level of detail.

TL;DR: My doctor says they can't move my appointment because someone claiming to be me already called to reschedule it. I suspect my Gmail calendar has somehow been leaked or compromised

Questions:

Would a bad actor make calls to appointments they knew about to validate that they have PII, or to see if they can get more info? Am I overthinking it or have I answered my own questions?

Am I completely overlooking the fact that if the receptionist felt confident enough that they needed to open an Investigation, it goes without saying that the alleged me was able to provide the last four of my SSN?

What would you, reader, recommend I do next?

submitted by /u/8thRuleofFightClub
[link] [comments]
News Bewertung

Weiterlesen Weiterlesen

Cloud Security Alliance identifiziert Sicherheitsprobleme in nativen, hybriden und Multi-Cloud ...

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: google.com Direktlink direkt öffnen

Ziel der Befragung von 700 IT- und Sicherheitsexperten war es, den Stand der Akzeptanz und der Sicherheit in den gängigen hybriden Cloud- und ...
News Bewertung

Weiterlesen Weiterlesen

Wi-Fi Network Not Secure in Windows 10

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: hackersonlineclub.com Direktlink direkt öffnen

Wi-Fi Network InsecureNow, Windows 10 will show you a warning message, if they are connect to WEP (Wired Equivalent Privacy) or TKIP (Temporal Key Integrity Protocol)...

The post Wi-Fi Network Not Secure in Windows 10 appeared first on HackersOnlineClub.


News Bewertung

Weiterlesen Weiterlesen

World's First AI-Generated Whiskey Coming Later This Year

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: slashdot.org Direktlink direkt öffnen

Microsoft, best known for developing Windows, has a thirst for something new: whiskey. The tech giant is co-developing the world's first computer-generated blend using artificial intelligence. From a report: For centuries whiskey has been cultivated by craftsmen drawing on knowledge and experience passed through generations. Single-malts have long been considered superior to blends, which are made by combining a number of single malts. One of the world's most expensive single-malts, a Macallan 1946, sold at an auction for a $460,000, while a Chivas Regal Royal Salute blend, which was created in 2002 to celebrate the golden jubilee of Britain's Queen Elizabeth, has sold for $10,000 a bottle. But now Microsoft has teamed up with Swedish distillery Mackmyra and Finnish consultancy Fourkind to use what's being dubbed as the world's first "bionic blender" to create the perfect tipple. Machine learning analyzes existing recipes, sales data and customer preferences to generate a dataset of more than 70 million recipes that a robot predicts will be popular. While Microsoft's leap from software to spirits might raise eyebrows in the Highlands of Scotland, the American software giant says its digital distiller will not replace the expertise and knowledge of human experts.

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

Snapchat employees spied on users with internal tool, report says

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: cnet.com Direktlink direkt öffnen

Multiple employees abused privileged access to user data, reports Motherboard.
News Bewertung

Weiterlesen Weiterlesen

One Year on, EU's GDPR Sets Global Standard for Data Protection

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: feedproxy.google.com Direktlink direkt öffnen

The EU's strict data laws have set the global benchmark for protecting personal information online since coming into force a year ago, but some worry that many users have barely noticed the change.

read more


News Bewertung

Weiterlesen Weiterlesen

Aldi Angebote: Günstige Notebooks, Tablets und Drucker ab 6. Juni

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: winfuture.de Direktlink direkt öffnen

Medion, Aldi, Notebooks, Aldi Süd, ALDI Nord, Laptops, Akoya P17601, Akoya S17402 Obwohl der Prospekt noch fehlt, kündigt der Discounter Aldi Süd online bereits seine neuen Technik-Produkte an. Unter anderem sind Notebooks von Medion und Lenovo, ein HP Drucker und ein Android-Tablet im Preis reduziert. Die Angebote gelten ab Donnerstag, den 6. Juni. (Weiter lesen)
News Bewertung

Weiterlesen Weiterlesen

New York Department of Financial Services Launches Cybersecurity Unit

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: feedproxy.google.com Direktlink direkt öffnen

The New York State Department of Financial Services (DFS) this week announced that it has launched a new cybersecurity division whose role is to protect consumers and financial services organizations from cyber threats.

read more


News Bewertung

Weiterlesen Weiterlesen

Google Stored Unhashed Passwords Of G Suite Business Customers For 14 Years

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: latesthackingnews.com Direktlink direkt öffnen

It hasn’t been since we heard of stories such as:  Facebook storing users’ passwords in plain text. It seems a

Google Stored Unhashed Passwords Of G Suite Business Customers For 14 Years on Latest Hacking News.


News Bewertung

Weiterlesen Weiterlesen

RIPE78: IP addresses must provide a contact address where abuse can be reported. How violent their absence is to be punished is controversial.

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

RIPE78: IP addresses must provide a contact address where abuse can be reported. How violent their absence is to be punished is controversial. submitted by /u/revyuh
[link] [comments]

News Bewertung

Weiterlesen Weiterlesen

Microsoft Brings Hardware-Based Isolation to Chrome, Firefox

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: feedproxy.google.com Direktlink direkt öffnen

Microsoft this week made the Windows Defender Application Guard extensions generally available, which now provides hardware-based isolation to all Chrome and Firefox users on Windows 10.

read more


News Bewertung

Weiterlesen Weiterlesen

Latest Hacking News Podcast #290

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: latesthackingnews.com Direktlink direkt öffnen

Facebook Disables Billions Of Accounts, Tor Browser For Android, Mozilla Version 67 Fixes Today’s Agenda is as follows Facebook Disables

Latest Hacking News Podcast #290 on Latest Hacking News.


News Bewertung

Weiterlesen Weiterlesen

News Wrap: Which Companies Are Doing Privacy Right and Which Aren’t?

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: threatpost.com Direktlink direkt öffnen

The Threatpost team breaks down the top privacy-related data incidents of the week - including data leaks from HCL and a golfing app - and highlights some surprisingly good privacy news.
News Bewertung

Weiterlesen Weiterlesen

Windows 10 May 2019 Update Not Installing on Some AMD Systems

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: bleepingcomputer.com Direktlink direkt öffnen

The Windows 10 May 2019 Update does not install on systems powered by AMD Ryzen or AMD Ryzen Threadripper processors with AMD RAID drivers prior to 9.2.0.105 and configured in SATA or NVMe RAID mode. [...]
News Bewertung

Weiterlesen Weiterlesen

Videos mit dem Smartphone? - Endlich guter Ton dank Shure MV88+

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: winfuture.de Direktlink direkt öffnen

Smartphone, Video, Timm Mohn, Mikrofon, Shure, MV88+ Smartphone-Hersteller werben seit einiger Zeit immer wieder auch gern damit, dass sich mit ihren Geräten ganz hervorragende Videos aufnehmen lassen. Hinsichtlich der Bildqualität mag das stimmen. Ein Problem bekommt man aber spätestens dann, wenn auch der richtige Ton dabei sein soll und man nicht nur einige Urlaubseindrücke mit Musik hinterlegen mag. Spätestens dann wird ein ordentliches Mikrofon benötigt. (Weiter lesen)
News Bewertung

Weiterlesen Weiterlesen

Most popular types of cyber attacks against individual users, part I

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

Most popular types of cyber attacks against individual users, part I submitted by /u/BusinessBreakfast0
[link] [comments]

News Bewertung

Weiterlesen Weiterlesen

Most popular types of cyber attacks against individual users, part I

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

Most popular types of cyber attacks against individual users, part I submitted by /u/BusinessBreakfast0
[link] [comments]

News Bewertung

Weiterlesen Weiterlesen

Samsung Galaxy A40 Review

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: news.softpedia.com Direktlink direkt öffnen

While the Galaxy S10 is the Samsung smartphone that everyone seems to be talking about these days, the South Koreans can’t rely just on flagships to maintain its leading position in the phone business. In fact, investing aggressively in low-budget and mid-range models is something that phone manufacturers typically do in order to boost sales and increase their market share, and living proof isn’t only Samsung, but also Huawei. When it comes to Samsung alone, the company has a super-rich portfolio of products tackling these two market categories, and more recently, it added a brand-new model to help it expand here. The Galaxy A40 is by definition a model that’s supposed to tackle the lower part of the mid-range market, but Samsung just wants to do the whole thing in its own way. So the A40 isn’t only a lower-end mid-ranger, but also a model aiming for the premium with certain features. First and foremost, let’s start with the basics. At $250, the Galaxy A40 is wit...
News Bewertung

Weiterlesen Weiterlesen

Samsung Galaxy A40 Review

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: news.softpedia.com Direktlink direkt öffnen

While the Galaxy S10 is the Samsung smartphone that everyone seems to be talking about these days, the South Koreans can’t rely just on flagships to maintain its leading position in the phone business. In fact, investing aggressively in low-budget and mid-range models is something that phone manufacturers typically do in order to boost sales and increase their market share, and living proof isn’t only Samsung, but also Huawei. When it comes to Samsung alone, the company has a super-rich portfolio of products tackling these two market categories, and more recently, it added a brand-new model to help it expand here. The Galaxy A40 is by definition a model that’s supposed to tackle the lower part of the mid-range market, but Samsung just wants to do the whole thing in its own way. So the A40 isn’t only a lower-end mid-ranger, but also a model aiming for the premium with certain features. First and foremost, let’s start with the basics. At $250, the Galaxy A40 is wit...
News Bewertung

Weiterlesen Weiterlesen

SD-Karten, Wi-Fi, USB: Huawei darf nicht mehr an Standards mitarbeiten

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: winfuture.de Direktlink direkt öffnen

Samsung, MicroSD, Speicherkarte, UHS-1 Huawei hat heute einen weitere Rückschläge in Folge des US-Embargos gegen den chinesischen Hersteller hinnehmen müssen. Huawei hat keinen Zugang mehr zur Wi-Fi Alliance, die über die Zukunft der WLAN-Technologien entscheidet. Gleiches gilt für die SD-Association, die für Speicherkarten verantwortlich zeichnet. Auch an der für die USB-Standards zuständigen JEDEC nimmt Huawei nicht mehr Teil. (Weiter lesen)
News Bewertung

Weiterlesen Weiterlesen

SD-Karten, Wi-Fi, USB: Huawei darf nicht mehr an Standards mitarbeiten

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: winfuture.de Direktlink direkt öffnen

Samsung, MicroSD, Speicherkarte, UHS-1 Huawei hat heute einen weitere Rückschläge in Folge des US-Embargos gegen den chinesischen Hersteller hinnehmen müssen. Huawei hat keinen Zugang mehr zur Wi-Fi Alliance, die über die Zukunft der WLAN-Technologien entscheidet. Gleiches gilt für die SD-Association, die für Speicherkarten verantwortlich zeichnet. Auch an der für die USB-Standards zuständigen JEDEC nimmt Huawei nicht mehr Teil. (Weiter lesen)
News Bewertung

Weiterlesen Weiterlesen

l+f: Die "Hitlermühle" steht zur Auktion

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: heise.de Direktlink direkt öffnen

Der Startpreis für das Schlüsselgerät 41 der Wanderwerke beträgt 75.000 Euro.
News Bewertung

Weiterlesen Weiterlesen

Seitennavigation

Seite 8 von 3.995 Seiten (Bei Beitrag 245 - 280)
139.810x Beiträge in dieser Kategorie

Auf Seite 7 zurück | Nächste 9 Seite | Letzte Seite

[ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [8] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ]