1. IT-Security >
  2. Cyber Security Nachrichten


ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese
Anzeige

Nachrichten


Suchen

Gesichtsscanner mit Kopf aus 3D-Drucker ausgetrickst

IT Security Nachrichten vom 17.12.2018 um 08:52 Uhr | Quelle google.com
Allerdings ist nicht zu erwarten, dass Personen, die sich wirklich um die Sicherheit ihrer Daten sorgen, auf Gesichtserkennung setzen. Sie dient primär ...
Newsbewertung

Weiterlesen

Suche nach Handyauflade-Möglichkeit endet mit Polizeieinsatz

IT Security Nachrichten vom 17.12.2018 um 08:50 Uhr | Quelle winfuture.de
Polizei, Aufschrift, Ordnungshüter Die Not war offenbar sehr groß: Drei junge Männer, die in der Nähe von Mainz nachts ihr Handy aufladen wollten, müssen sich nun dem Richter gegenüber verantworten. Ihnen wird Hausfriedensbruch und Entziehung elektrischer Energie vorgeworfen. Das geht aus einer Mitteilung der örtlichen Polizei hervor. (Weiter lesen)
Newsbewertung

Weiterlesen

Apple in Trouble for Playing It Dirty Over the iPhone XS Notch

IT Security Nachrichten vom 17.12.2018 um 08:48 Uhr | Quelle news.softpedia.com
As if Apple’s problems with the iPhone weren’t enough, two customers are now suing the company for allegedly hiding the notch in the official photos of the iPhone XS and iPhone XS Max. In lawsuit papers, they explain that Cupertino is thus hiding the fact that the 2018 iPhones have fewer pixels that it seems, basically because the notch reduces the available screen estate. “Defendant’s website is designed to encourage comparisons between the Products and Defendant’s other phones. These comparisons are misleading because the Products have false screen pixel counts that dramatically overrepresent the number of subpixels in the phones,” the lawsuit reads. While the lawsuit is still pending class-action status, Apple’s alleged sneaky tactics to hide the notch basically comes down to using a black wallpaper that makes the upper part of the screen barely noticeable. The notch is one controversial design choice that many criticized after being introduced on the iPhone X...
Newsbewertung

Weiterlesen

Insider awarded $10,000 bounty for reporting enterprise software piracy

IT Security Nachrichten vom 17.12.2018 um 08:38 Uhr | Quelle zdnet.com
It is no longer just the average consumer that might wind up in court for using pirated software.
Newsbewertung

Weiterlesen

Office 365: Gut gemachte Phishing-Kampagne sammel Passwörter ein

IT Security Nachrichten vom 17.12.2018 um 08:24 Uhr | Quelle winfuture.de
Microsoft, Office 365, Office Suite, Office 365 Personal Nutzer der Office 365-Dienste sollten dieser Tage bei der Bearbeitung ihrer E-Mails besonders aufmerksam sein. Denn Betrüger versuchen mit ziemlich real aussehenden Fälschungen von Fehlermeldungen die Login-Daten von Nutzern abzugreifen. Selbst erfahrenere Nutzer könnten aufgrund der guten Umsetzung durchaus auf das Phishing hereinfallen. (Weiter lesen)
Newsbewertung

Weiterlesen

Microsoft Still Can’t Fix Broken Surface Update, More Units Being Replaced

IT Security Nachrichten vom 17.12.2018 um 08:08 Uhr | Quelle news.softpedia.com
Microsoft is reportedly replacing more Surface Pro 4 units suffering from a display issue caused by a mid-2018 firmware update. The company has remained completely tight-lipped on everything related to this issue and only said it was investigating, but according to a new report, it is now replacing more faulty units. The issue was first reported in July 2018 when the Surface Pro 4 received a firmware update supposed to bring a series of improvements. What this update did, however, was cause display issues like unresponsive touch, with lots of users confirming in a discussion thread on the Microsoft Community forums that no workaround repaired it. We reported back in m...
Newsbewertung

Weiterlesen

Irish Data Authority Probes Facebook Photo Breach

IT Security Nachrichten vom 17.12.2018 um 07:51 Uhr | Quelle feedproxy.google.com

The Irish data watchdog on Friday launched an investigation into Facebook, after the social media titan admitted a "bug" may have exposed unposted photos from up to 6.8 million users.

read more


Newsbewertung

Weiterlesen

Code Execution Flaw in SQLite Affects Chrome, Other Software

IT Security Nachrichten vom 17.12.2018 um 07:34 Uhr | Quelle feedproxy.google.com

Many applications using the popular SQLite database management system could be exposed to attacks due to a potentially serious vulnerability that can lead to remote code execution, information disclosure, and denial-of-service (DoS) attacks.

read more


Newsbewertung

Weiterlesen

Top 40+ Best Hollywood Websites To Download Movies Free

IT Security Nachrichten vom 17.12.2018 um 07:33 Uhr | Quelle itechhacks.com

Best Movies Sites: We all LOVE HOLLYWOOD MOVIES, Why? Because everyone knows the reason that’s why you guys are landed here. Nothing more amazing, when we get access to download and stream latest Hollywood movies sites and that too for free. Whenever you searched for “Best Hollywood Movies Websites” you end up landing on some […]

The post Top 40+ Best Hollywood Websites To Download Movies Free appeared first on iTech Hacks.


Newsbewertung

Weiterlesen

Top 40+ Best Hollywood Websites To Download Movies Free

IT Security Nachrichten vom 17.12.2018 um 07:33 Uhr | Quelle itechhacks.com

Best Movies Sites: We all LOVE HOLLYWOOD MOVIES, Why? Because everyone knows the reason that’s why you guys are landed here. Nothing more amazing, when we get access to download and stream latest Hollywood movies sites and that too for free. Whenever you searched for “Best Hollywood Movies Websites” you end up landing on some […]

The post Top 40+ Best Hollywood Websites To Download Movies Free appeared first on iTech Hacks.


Newsbewertung

Weiterlesen

So wollen Security-Experten Firmen die Scheu vor der Cloud nehmen

IT Security Nachrichten vom 17.12.2018 um 07:22 Uhr | Quelle google.com
„Absolute Sicherheit gibt es nicht, denn jedes Unternehmen hat eine Schatten-IT – schon aus dem Grund, weil jedes Unternehmen E-Mails nutzt.
Newsbewertung

Weiterlesen

PewDiePie printer hacker strikes again: subscribe and sort out your security

IT Security Nachrichten vom 17.12.2018 um 07:18 Uhr | Quelle zdnet.com
The attacker told users to sort out their printer security -- and subscribe to the vlogger "overlord," too.
Newsbewertung

Weiterlesen

Der große Health-Check: Wie fit ist Ihr Data Warehouse?

IT Security Nachrichten vom 17.12.2018 um 07:01 Uhr | Quelle it-daily.net

In vielen Unternehmen ist das Data Warehouse in die Jahre gekommen. Gleichzeitig wachsen die Anforderungen der Fachabteilungen. Mit IoT und der Digitalisierung kommen zudem neue Herausforderungen hinzu. Ist Ihr Data Warehouse all dem noch gewachsen? Machen Sie den Health-Check!


Newsbewertung

Weiterlesen

Facebook bug exposes 7 million FB User photos to hackers

IT Security Nachrichten vom 17.12.2018 um 06:42 Uhr | Quelle cybersecurity-insiders.com

Facebook, the world’s number one social media platform has disclosed in this weekend that a bug in one of its photo databases has exposed 7 million photos of FB users to the outside world-possible to hackers. Thus, with the latest data exposure, Facebook seems to have controversially broken down again for the 3rd time this […]

The post Facebook bug exposes 7 million FB User photos to hackers appeared first on Cybersecurity Insiders.


Newsbewertung

Weiterlesen

Trending Cybersecurity News Headlines

IT Security Nachrichten vom 17.12.2018 um 06:36 Uhr | Quelle cybersecurity-insiders.com

Trend Micro, a Japan-based Cybersecurity firm has come up with a prediction that cyber attacks on cloud platforms will increase in 2019 as hackers will use sophistication to break into new cloud technologies such as –software as a service to spread malware. Providing more details in its Cybersecurity Reports, the company said that in 2019 […]

The post Trending Cybersecurity News Headlines appeared first on Cybersecurity Insiders.


Newsbewertung

Weiterlesen

Security by design: Die 13 besten Tools für Anwendungssicherheit

IT Security Nachrichten vom 17.12.2018 um 06:31 Uhr | Quelle computerwoche.de
Diese Tools helfen Entwicklungsabteilungen in Unternehmen, Sicherheitslücken in Ihren Anwendungen zu entdecken und zu schließen.
Newsbewertung

Weiterlesen

'No Evidence' of Huawei Spying, Says German IT Watchdog

IT Security Nachrichten vom 17.12.2018 um 06:05 Uhr | Quelle feedproxy.google.com

Germany's IT watchdog has expressed scepticism about calls for a boycott of Chinese telecoms giant Huawei, saying it has seen no evidence the firm could use its equipment to spy for Beijing, news weekly Spiegel reported Friday.

read more


Newsbewertung

Weiterlesen

A Bright Green 'Christmas Comet' Will Fly the Closest To Earth In Centuries

IT Security Nachrichten vom 17.12.2018 um 06:05 Uhr | Quelle science.slashdot.org
On Sunday night, a comet that orbits between Jupiter and the sun will make its closest approach to Earth in centuries. According to Tony Farnham, a research scientist in the astronomy department at the University of Maryland, the comet will appear as a bright, fuzzy ball with a greenish-gray tint. "You've got a one-kilometer solid nuclear in the middle, and gas is going out hundreds of thousands of miles," says Tony. The comet glows green because the gases emit light in green wavelengths. The New York Times reports: The ball of gas and dust, sometimes referred to as the "Christmas comet," was named 46P/Wirtanen, after the astronomer Carl Wirtanen, who discovered it in 1948. It orbits the sun once every 5.4 years, passing by Earth approximately every 11 years, but its distance varies and it is rarely this close. As the comet passes by, it will be 30 times farther from Earth than the moon, NASA said. The proximity of 46P/Wirtanen provides an opportunity to research the tail of the comet and see farther into the nucleus. The comet is visible now but it will shine even brighter on Sunday as it reaches its closest approach, 7.1 million miles from Earth. That may sound really far, but it is among the 10 closest approaches by a comet in 70 years, NASA said. Only a few of those could be seen with the naked eye. Don't worry if you miss the comet on Sunday. It should be just as visible for a week or two because its appearance will change gradually. After it moves on, it won't be this close to Earth again for hundreds, if not thousands, of years. Online charts can help pinpoint its location.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Emotet bringt resiliente IT-Netzwerke nicht aus dem Tritt

IT Security Nachrichten vom 17.12.2018 um 06:03 Uhr | Quelle google.com
Ob nachgeladene Emotet-Tools in der eigenen IT-Infrastruktur aktiv sind, ... eines Schwachstellen-Management-Tools, wie dem Greenbone Security ...
Newsbewertung

Weiterlesen

Emotet bringt resiliente IT-Netzwerke nicht aus dem Tritt

IT Security Nachrichten vom 17.12.2018 um 06:01 Uhr | Quelle it-daily.net

Die Schadsoftware Emotet bedroht derzeit deutschlandweit Unternehmensnetzwerke und verursacht Schäden in Millionenhöhe. Dirk Schrader, CMO beim Sicherheitsexperten Greenbone, erklärt, wie sich Unternehmen mit nur wenigen koordinierten Maßnahmen nicht nur gegen Emotet, sondern gegen jede Art von Cyber-Angriffen härten können.


Newsbewertung

Weiterlesen

Die 13 besten Tools für Anwendungssicherheit

IT Security Nachrichten vom 17.12.2018 um 05:30 Uhr | Quelle google.com
Der 2018 Data Breach Investigations Report (PDF) des US-Telekommunikationsanbieters Verizon besagt, die häufigste Angriffsmethode hinter ...
Newsbewertung

Weiterlesen

Iphone Pop-up Question

IT Security Nachrichten vom 17.12.2018 um 05:14 Uhr | Quelle reddit.com

Hi My wife and I keep getting the same spammy popup (See imgur image below) on our phones and we don't know why. Does anyone know how to prevent it? The popup comes up on both of our phones. If we hit cancel it still redirects to the site. It comes up on both Chrome and Safari. It came up for her on a cooking site and me for ESPN... I tried resetting our routers, the phone, and clearing our history, but it still pops up... Any info is much appreciated!

https://imgur.com/a/nEy7ezW

submitted by /u/West_Coast_Bias_206
[link] [comments]
Newsbewertung

Weiterlesen

5 Key Components Every Company Should Have in Their Privacy Policy

IT Security Nachrichten vom 17.12.2018 um 05:01 Uhr | Quelle tripwire.com

As a business owner, you’re no stranger to the myriad moving parts that keep the day-to-day business going. In all the bustle, it can be easy to overlook important tasks such as creating a privacy policy because you’re unsure where to start or which elements to include. Earlier this year, the EU’s GDPR—the General Data […]… Read More

The post 5 Key Components Every Company Should Have in Their Privacy Policy appeared first on The State of Security.


Newsbewertung

Weiterlesen

What Is Smart Metering? Uses, Benefits and Dangers

IT Security Nachrichten vom 17.12.2018 um 05:00 Uhr | Quelle tripwire.com

Utilities can be a pricey monthly expense for many households and businesses, with the average cost for households in America coming in at over $420 every month. Getting on top of utility usage, especially electricity — which typically constitutes the largest part of that monthly expense — can help save money, but it can also […]… Read More

The post What Is Smart Metering? Uses, Benefits and Dangers appeared first on The State of Security.


Newsbewertung

Weiterlesen

Cydia's App Store For Jailbroken iPhones Shuts Down Purchases

IT Security Nachrichten vom 17.12.2018 um 04:33 Uhr | Quelle apple.slashdot.org
Cydia, the App Store for jailbroken devices, is shutting down purchases as its creator moves to shut down the store entirely in the near future. "Cydia's creator Saurik made the announcement on Reddit after a bug was discovered in the platform that may have put user data at risk," iPhonehacks reports. "This bug prompted Saurik to clarify the issue and reveal that he has been planning on shutting down Cydia for quite a while now." From the report: The founder clarifies that the bug only puts a limited number of users at risk who are logged into Cydia and browse a repository with untrusted content -- a scenario which Saurik has strongly advised against right from day one. Plus, he also says that this is not a data leak and he has not lost access to PayPal authorization tokens. Coming to the harsh reality, Saurik says that he has been looking to shut down Cydia Store before the end of this year. The reports of a data leak have acted as a catalyst to bring the timetable further up. There are multiple reasons as to why he is looking to shut down the service including the fact that he has to pay for the hefty hosting bills from his own pocket. Saurik has already gone ahead and shut down the ability to buy jailbreak tweaks in Cydia. This means that one can no longer use the Cydia Store to buy jailbreak tweaks on a jailbroken iPhone. On the bright side, Saurik does intend to allow users to download jailbreak tweaks that they have already paid for. Saurik will also make a more formal announcement about the shutting down of Cydia sometime soon. Do note that this change relates only to Cydia Store and not Cydia the installer which is used to install tweaks on a jailbroken device. The latter will continue to work as usual.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Samsung Kills Headphone Jack After Mocking Apple

IT Security Nachrichten vom 17.12.2018 um 02:31 Uhr | Quelle hardware.slashdot.org
Last week, Samsung introduced its latest smartphone, the Galaxy A8s. Not only is it the first phone of theirs with a laser-drilled hole in the display for the front-facing camera sensor, but it is also their first phone to ditch the headphone jack. Slashdot reader TheFakeTimCook shares a report from Mac Rumors that takes a closer look at the move and the hypocrisy behind it: [The A8s] is also Samsung's first smartphone without a headphone jack, much to the amusement of iPhone users, as Samsung has mocked Apple for over two years over its decision to remove the headphone jack from the iPhone 7 in 2016, a trend that has continued through to the iPhone XS, iPhone XS Max, and iPhone XR. While on stage unveiling the new Galaxy Note 7 in 2016, for example, Samsung executive Justin Denison made sure to point out that the device came with a headphone jack. "Want to know what else it comes with?" he asked. "An audio jack. I'm just saying," he answered, smirking as the audience laughed. And earlier this year, Samsung mocked the iPhone X's lack of a headphone jack in one of its "Ingenius" ads promoting the Galaxy S9. Samsung isn't the first tech giant to mock Apple's decision to remove the headphone jack, only to follow suit. Google poked fun at the iPhone 7's lack of headphone jack while unveiling its original Pixel smartphone in 2016, and then the Pixel 2 launched without one just a year later.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

US ballistic missile systems have very poor cyber-security

IT Security Nachrichten vom 17.12.2018 um 02:21 Uhr | Quelle zdnet.com
DOD report finds no antivirus, no data encryption, no multifactor authentication.
Newsbewertung

Weiterlesen

Mit Deception Tools Cyberangriffen wirksam begegnen

IT Security Nachrichten vom 17.12.2018 um 01:45 Uhr | Quelle searchsecurity.de

Newsbewertung

Weiterlesen

PewDiePie fan hacker compromise 100,000 printers

IT Security Nachrichten vom 17.12.2018 um 01:07 Uhr | Quelle hackread.com

By Waqas

A couple of weeks ago, a hacker going by the online handle of TheHackerGiraffe hacked over 50,000 printers for the sake of promoting PewDiePie’s YouTube channel and urging users to subscribe to his channel. Now, the same hacker has struck again and claims to have hacked over 100,000 printers globally. This time with the help of another […]

This is a post from HackRead.com Read the original post: PewDiePie fan hacker compromise 100,000 printers


Newsbewertung

Weiterlesen

50 Years On, We're Living the Reality First Shown At the 'Mother of All Demos'

IT Security Nachrichten vom 17.12.2018 um 00:23 Uhr | Quelle hardware.slashdot.org
Thelasko quotes a report from Ars Technica: A half century ago, computer history took a giant leap when Douglas Engelbart -- then a mid-career 43-year-old engineer at Stanford Research Institute in the heart of Silicon Valley -- gave what has come to be known as the "mother of all demos." On December 9, 1968 at a computer conference in San Francisco, Engelbart showed off the first inklings of numerous technologies that we all now take for granted: video conferencing, a modern desktop-style user interface, word processing, hypertext, the mouse, collaborative editing, among many others. Even before his famous demonstration, Engelbart outlined his vision of the future more than a half-century ago in his historic 1962 paper, "Augmenting Human Intellect: A Conceptual Framework." To open the 90-minute-long presentation, Engelbart posited a question that almost seems trivial to us in the early 21st century: "If in your office, you as an intellectual worker were supplied with a computer display, backed up by a computer that was alive for you all day, and was instantly responsible -- responsive -- to every action you had, how much value would you derive from that?" By 1968, Engelbart had created what he called the "oN-Line System," or NLS, a proto-Intranet. The ARPANET, the predecessor to the Internet itself, would not be established until late the following year.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Bleiben Sie die Gewinner der Revolution!

IT Security Nachrichten vom 17.12.2018 um 00:18 Uhr | Quelle google.com
Firmen steht seine hochsichere IT-Infrastruktur auch auf Mietbasis zur Verfügung. ... in den Bereichen Kommunikation, Vernetzung und IT-Security.
Newsbewertung

Weiterlesen

How to Decrypt HiddenTear Ransomware with HT Brute Forcer

IT Security Nachrichten vom 17.12.2018 um 00:05 Uhr | Quelle bleepingcomputer.com
If you have been infected with a HiddenTear Ransomware variant, then you are in luck as a decryptor called HT Brute Forcer has been created by Michael Gillespie that allows you decrypt your files without having to pay the ransom. [...]
Newsbewertung

Weiterlesen

How to Decrypt HiddenTear Ransomware Variants

IT Security Nachrichten vom 17.12.2018 um 00:05 Uhr | Quelle bleepingcomputer.com
If you have been infected with a HiddenTear Ransomware variant, then you are in luck as a decryptor called HT Brute Forcer has been created by Michael Gillespie that allows you decrypt your files without having to pay the ransom. [...]
Newsbewertung

Weiterlesen

Managed Services als Erfolgsfaktor für die Schweizer Unternehmens-IT

IT Security Nachrichten vom 17.12.2018 um 00:03 Uhr | Quelle google.com
Managed Services ermöglichen es Unternehmen, die IT im eigenen Haus zu ... Managed Services, speziell für IT-Security, sind omnipräsent.
Newsbewertung

Weiterlesen

Security101 fail.

IT Security Nachrichten vom 16.12.2018 um 23:06 Uhr | Quelle reddit.com
Security101 fail. submitted by /u/AbyssalCramps
[link] [comments]

Newsbewertung

Weiterlesen

Seitennavigation

Seite 8 von 3.117 Seiten (Bei Beitrag 245 - 280)
109.065x Beiträge in dieser Kategorie

Auf Seite 7 zurück | Nächste 9 Seite | Letzte Seite
[ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [8] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ]