1. IT-Security >
  2. Cyber Security Nachrichten


ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese

Nachrichten


Suchen

News RSS Quellen: 82x
News Kategorien unterhalb von Nachrichten: 0x
News RSS Feeds dieser Nachrichten Kategorie: RSS Feed IT Security Nachrichten
Benutze Feedly zum Abonieren.Folge uns auf feedly
Download RSS Feed App für Windows 10 Store (Leider gibt es nicht mehr viele Extensions mit welchen Sie RSS-Feeds in einer Software abonieren können. Der Browser Support für RSS-Feeds wurde eingestellt (Firefox,Chrome).

Eigene IT Security Webseite / Blog / Quelle hinzufügen

Seitennavigation

Seite 1 von 3.995 Seiten (Bei Beitrag 1 - 35)
139.810x Beiträge in dieser Kategorie

Nächste 2 Seite | Letzte Seite

[ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ]

Europawahlen: Schwere Verluste für Union und SPD, hohe Gewinne für Grüne

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: golem.de Direktlink direkt öffnen

Bei der Europawahl 2019 haben die Regierungsparteien Union und SPD historisch schlecht abgeschnitten. Besonders profitieren konnten die Grünen. Während die Piraten Stimmen verloren, legte eine andere Kleinstpartei besonders stark zu. (Europawahl 2019, Urheberrecht)
News Bewertung

Weiterlesen Weiterlesen

MIDI Association Explains 'Capability Inquiry' Features In MIDI 2.0

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: entertainment.slashdot.org Direktlink direkt öffnen

Friday the MIDI Association published an introduction to MIDI 2.0, describing updates to the already-evolving 36-year-old standard, including MIDI-CI, Profiles and Property Exchange: MIDI 2.0 updates MIDI with new auto-configuration, extended resolution, increased expressiveness, and tighter timing -- all while maintaining a high priority on backward compatibility. This major update of MIDI paves the way for a new generation of advanced interconnected MIDI devices, while still preserving interoperability with the millions of existing MIDI 1.0 devices. One of the core goals of MIDI 2.0 is to also enhance the MIDI 1.0 feature set whenever possible. The additional capabilities that MIDI 2.0 brings to devices are enabled by MIDI-Capability Inquiry (MIDI-CI). The basic idea is that if devices have a bidirectional connection, they can exchange their capabilities with each other. Devices can share their configuration and what MIDI functions are supported. Devices use a bidirectional link to configure MIDI features when both devices agree to support that feature. MIDI-CI discovers and configures device features using three categories of inquiry: Profile Configuration, Property Exchange, and Protocol Negotiation. If a device does not support any new features, it uses the MIDI 1.0 as usual. Devices connected to that device will continue to use MIDI 1.0 in communication with that device... MIDI 2.0 has a new Universal MIDI Packet format for carrying MIDI 1.0 Protocol messages and MIDI 2.0 Protocol messages... The foundational specification, MIDI-CI has been published and is available for download. Other key MIDI 2.0 specifications are nearing completion in the MIDI Manufacturers Association. But it will take several years to write numerous Profile and Property Exchange specifications to follow.... [W]e do not expect any MIDI 2.0 products to be released in 2019. For MIDI to be fully useable, the industry needs devices, applications, operating systems, and DAWs to support these new specifications. It will take time for a whole system of devices to be available. The post emphasizes that the original MIDI 1.0 "is not being replaced. Rather it is being extended and is expected to continue, well integrated with the new MIDI 2.0 environment. It is part of the Universal MIDI Packet, the fundamental MIDI data format... "MIDI 2.0 is just part of the evolution of MIDI that has gone on for 36 years. The step by step evolution continues."

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

What If We Could Reuse The Packaging on Consumer Products?

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: news.slashdot.org Direktlink direkt öffnen

"The shampoo bottle, the deodorant stick, razors and even your toothbrush -- they all get thrown away when they're empty or worn out. But if they were reusable -- or refillable -- just imagine how much waste could be avoided." That's how Bloomberg describes the new "Loop" initiative being tested for one year by the New Jersey recycling company TerraCycle: This week, Loop began its U.S. trial, allowing consumers to use steel, glass and durable plastic reusable packaging for everyday items. Kroger Co. and Walgreens, along with such consumer brands as Procter & Gamble, Nestle, The Clorox Co. and Unilever, are taking part... For the trial, Loop is available online to customers in New York, New Jersey and Pennsylvania. You can order products made by the participating companies that will be delivered to you in special reusable packaging. Under the program, manufacturers have redesigned product containers for some of their most well-known products. Loop will collect a refundable deposit, sometimes $5 to $10, that customers will get back when they return their containers. UPS will pick up your empties for no additional charge... Procter & Gamble has unveiled its Crest mouthwash in a sleek glass bottle -- with a rubber base to prevent breakage. It also has non-electric Oral B toothbrushes that have a head that pops off so users can keep the base and replace the brush. But it was the stainless steel ice cream container for Nestle's Haagen-Dazs (which isn't too cold to the touch but keeps ice cream cool longer) that was the crowd favorite at a Manhattan rollout this week.... During Loop's trial, returned containers will go to New Jersey and then Pennsylvania for washing, then back to the companies' factories for refilling... [W]hile reusable packaging may require more energy and materials when first made, Tom Szaky, chief executive of TerraCycle, said the carbon cost becomes equal to that of disposable packaging after just two or three uses. His goal, he said, is to produce items that can be reused 100 times... Szaky explained that Loop is all about bringing back the milkman model, where glass bottles of milk were left on your porch, and you put the empties there to be picked up... "We want you to see Loop packaging 50 years from now still going around," Szaky said.

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

WhatsApp Adverts To Begin in 2020, But What About End-To-End Encryption?

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: latesthackingnews.com Direktlink direkt öffnen

Despite a seemingly never-ending trail of blunders, glitches, and privacy breaches at Facebook, people still trust WhatsApp. However, as revealed

WhatsApp Adverts To Begin in 2020, But What About End-To-End Encryption? on Latest Hacking News.


News Bewertung

Weiterlesen Weiterlesen

PoC: Encrypting Shellcode Into Invisible Unicode Characters

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

PoC: Encrypting Shellcode Into Invisible Unicode Characters submitted by /u/sectronex
[link] [comments]

News Bewertung

Weiterlesen Weiterlesen

TurboTax Is Using A 'Military Discount' to Trick Troops Into Paying to File Their Taxes

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: tech.slashdot.org Direktlink direkt öffnen

"Intuit, the maker of TurboTax, created and promoted a 'military discount' that charges service members who are eligible to file for free," reports ProPublica, in a story co-published with The Military Times: In patriotism-drenched promotions, press releases and tweets, TurboTax promotes special deals for military service members, promising to help them file their taxes online for free or at a discount. Yet some service members who've filed by going to the TurboTax Military landing page told ProPublica they were charged as much as $150 -- even though, under a deal with the government, service members making under $66,000 are supposed to be able to file on TurboTax for free... To find TurboTax's Free File landing page, service members typically have to go through the IRS website. TurboTax Military, by contrast, is promoted on the company's home page and elsewhere. Starting through the Military landing page directs many users to paid products even when they are eligible to get the same service for no cost using the Free File edition... The New York regulator investigating TurboTax is also examining the military issue, according to a person familiar with the probe. The authors of the article tested the software by entering tax information for a military household in Virginia that was eligible for free filing. TurboTax Military "tried to upgrade us or convince us to pay for side products six times. We declined those extras each time. "Finally, the program told us we had to pay $159.98 to finish filing. And that 'military discount'? All of $5."

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

EternalBlue: Erpresser legen die Stadt Baltimore mit NSA-Software lahm

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: winfuture.de Direktlink direkt öffnen

Usa, Nsa, National Security Agency, NSA Logo Wer eine Software entwickelt, muss damit rechnen, dass diese auch für ungewollte Zwecke missbraucht wird. Vom US-Geheimdienst NSA wurde 2016 ein Hacking-Tool verwendet, das seitdem bei zahlreichen Cy­ber­an­grif­fen weltweit eingesetzt wurde. Nun ist die Stadt Baltimore betroffen. (Weiter lesen)
News Bewertung

Weiterlesen Weiterlesen

How to tell if your iPhone is hacked/contains malware?

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

Idk if I’m being really paranoid but my iPhone has been acting strange recently. I’ve been getting frequent no caller id calls. (2 times a day every other day). I recently was using airdrop and my iPhone detects another iPhone when there’s no other iPhone in the room. It was acting a bit laggy (a simple reset fixed the lag) but A big issue I’m worried about was after the no called I’d call I visited a normal web page in safari and it was almost like the speakers were making noise. I was wondering if there’s a way you can tell if your iPhone has been hacked or contains a virus? And what steps should I take?

submitted by /u/learnit77
[link] [comments]
News Bewertung

Weiterlesen Weiterlesen

Mozilla Released Firefox 67 While Fixing 24 Security Vulnerabilities

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: latesthackingnews.com Direktlink direkt öffnen

Mozilla has released the latest version of Firefox browsers with major security updates. Allegedly, the new Firefox 67 brings fixes

Mozilla Released Firefox 67 While Fixing 24 Security Vulnerabilities on Latest Hacking News.


News Bewertung

Weiterlesen Weiterlesen

The First Usable Electric Car Was Invented In Britain In 1884

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: hardware.slashdot.org Direktlink direkt öffnen

"Thomas Parker, sometimes described as the 'Edison of Britain', was a British engineer and electrical technologies inventor working in the 1800s who was also one of the world's first environmentalists," remembers Slashdot reader dryriver. Parker had been troubled by the pollution in coal-burning cities around London -- and decided to do something about it: Parker was very adept both at inventing new things and at significantly improving technologies that others had invented before him. He improved everything from steam pumps, to electrical batteries, electric motors, alternators and dynamos, invented the award winning "Kyrle Grate," which was designed to allow anthracite coal to be burned inside of it, and was responsible for the electrification of London's "Underground" Subway system and tramways build in other British cities. There has been attempts at electrical cars before Parker's going back as far as the 1830s, but his was revolutionary in many aspects. The Elwell-Parker car was fitted with Parker's high-capacity rechargeable batteries, and later vehicles had hydraulic brakes on all four wheels, as well as four-wheel steering. These features are even now being described as revolutionary. While Parker's electrical cars were quite popular in America and Britain for a number of years (read more here), soon improved gas- and diesel-based vehicles caused public interest in electric cars to wane. Parker's company Elwell Parker, which survives to this day, then focused on making electrical speciality vehicles for factories and warehouses -- electric carts for moving equipment and crates around, and precursors of modern forklifts, for example. While everybody knows electrical inventors like Edison and Tesla today, Thomas Parker is barely known and barely remembered...

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

Microsoft Says Windows 10 Your Phone App Can't Be Uninstalled

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: bleepingcomputer.com Direktlink direkt öffnen

Microsoft has stated that you will not be able to uninstall the Your Phone App from Windows 10 as it is now tightly integrated into the operating system. [...]
News Bewertung

Weiterlesen Weiterlesen

British Consumers Have Started To Dump Huawei Phones

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: mobile.slashdot.org Direktlink direkt öffnen

"British consumers have begun trading in smartphones from Huawei Technologies Co. in growing numbers since the Chinese tech giant was hit by a U.S. supply blacklist," reports Bloomberg: Trade-in and price-tracking companies report a surge in U.K. consumers trading in devices from the Shenzhen-based manufacturer, while interest from buyers fizzles. The numbers show that concerns around the company have extended beyond trade talks and corporate procurement and turned into backlash at retail, where Huawei makes most of its sales. Gadget trade-in website WeBuyTek, which buys and resells about 36,000 handsets a year, has seen a 540% increase in the number of Huawei devices booked this week versus last. That's the biggest jump it's ever seen, the company's director, Paul Walsh, said by email. "'We have temporarily stopped accepting any new trade-ins, as we expect the value of these devices to plummet," he said... The website www.SellMyMobile.com reported a rise of up to 282% in the number of people assessing the value of their Huawei handsets from May 20 to May 22, compared with previous days, according to a representative... The rush follows the decision by BT Group and Vodafone Group to pull the Huawei Mate 20 X phone from their launches of fifth-generation wireless products. The British carriers joined others from around the world, citing uncertainty after Huawei was cut off from U.S. companies by new trade restrictions and barred from receiving software support for the Android operating system from Alphabet Inc.'s Google. In other news, Microsoft removed Huawei laptops from its online store on Friday.

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

The 10 Endpoint Security Products for Business

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: hackercombat.com Direktlink direkt öffnen

Large data breaches often occur when hackers successfully attack a device such as a computer, mobile device, or laptop. To solve this problem, companies can provide endpoint security protection that...

The post The 10 Endpoint Security Products for Business appeared first on .


News Bewertung

Weiterlesen Weiterlesen

CMSeeK v1.1.2 - CMS Detection And Exploitation Suite - Scan WordPress, Joomla, Drupal And Over 170 Other CMSs

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: feedproxy.google.com Direktlink direkt öffnen


What is a CMS?
A content management system (CMS) manages the creation and modification of digital content. It typically supports multiple users in a collaborative environment. Some noteable examples are: WordPress, Joomla, Drupal etc.

Release History
- Version 1.1.2 [19-05-2019]
- Version 1.1.1 [01-02-2019]
- Version 1.1.0 [28-08-2018]
- Version 1.0.9 [21-08-2018]
- Version 1.0.8 [14-08-2018]
- Version 1.0.7 [07-08-2018]
...
Changelog File

Functions Of CMSeek:
  • Basic CMS Detection of over 170 CMS
  • Drupal version detection
  • Advanced Wordpress Scans
    • Detects Version
    • User Enumeration
    • Plugins Enumeration
    • Theme Enumeration
    • Detects Users (3 Detection Methods)
    • Looks for Version Vulnerabilities and much more!
  • Advanced Joomla Scans
    • Version detection
    • Backup files finder
    • Admin page finder
    • Core vulnerability detection
    • Directory listing check
    • Config leak detection
    • Various other checks
  • Modular bruteforce system
    • Use pre made bruteforce modules or create your own and integrate with it

Requirements and Compatibility:
CMSeeK is built using python3, you will need python3 to run this tool and is compitable with unix based systems as of now. Windows support will be added later. CMSeeK relies on git for auto-update so make sure git is installed.

Installation and Usage:
It is fairly easy to use CMSeeK, just make sure you have python3 and git (just for cloning the repo) installed and use the following commands:
  • git clone https://github.com/Tuhinshubhra/CMSeeK
  • cd CMSeeK
  • pip/pip3 install -r requirements.txt
For guided scanning:
  • python3 cmseek.py
Else:
  • python3 cmseek.py -u <target_url> [...]
Help menu from the program:
USAGE:
python3 cmseek.py (for guided scanning) OR
python3 cmseek.py [OPTIONS] <Target Specification>

SPECIFING TARGET:
-u URL, --url URL Target Url
-l LIST, --list LIST Path of the file containing list of sites
for multi-site scan (comma separated)

MANIPULATING SCAN:
-i cms, --ignore--cms cms Specify which CMS IDs to skip in order to
avoid flase positive. separated by comma ","

--strict-cms cms Checks target against a list of provided
CMS IDs. separated by comma ","

--skip-scanned Skips target if it's CMS was previously detected.

RE-DIRECT:
--follow-redirect Follows all/any redirect(s)
--no-redirect Skips all redirects and tests the input target(s)

USER AGENT:
-r, --random-agent Use a random user agent
--googlebot Use Google bot user agent
--user-agent USER_AGENT Specify a custom user agent

OUTPUT:
-v, --verbose Increase output verbosity

VERSION & UPDATING:
--update Update CMSeeK (Requires git)
--version Show CMSeeK version and exit

HELP & MISCELLANEOUS:
-h, --help Show this help message and exit
--clear-result Delete all the scan result

EXAMPLE USAGE:
python3 cmseek.py -u example.com # Scan example.com
python3 cmseek.py -l /home/user/target.txt # Scan the sites specified in target.txt (comma separated)
python3 cmseek.py -u example.com --user-agent Mozilla 5.0 # Scan example.com using custom user-Agent Mozilla is 5.0 used here
python3 cmseek.py -u example.com --random-agent # Scan example.com using a random user-Agent
python3 cmseek.py -v -u example.com # enabling verbose output while scanning example.com

Checking For Update:
You can check for update either from the main menu or use python3 cmseek.py --update to check for update and apply auto update.
P.S: Please make sure you have git installed, CMSeeK uses git to apply auto update.

Detection Methods:
CMSeek detects CMS via the following:
  • HTTP Headers
  • Generator meta tag
  • Page source code
  • robots.txt

Supported CMSs:
CMSeeK currently can detect 170+ CMS. Check the list here: cmss.py file which is present in the cmseekdb directory. All the cmss are stored in the following way:
 cmsID = {
'name':'Name Of CMS',
'url':'Official URL of the CMS',
'vd':'Version Detection (0 for no, 1 for yes)',
'deeps':'Deep Scan (0 for no 1 for yes)'
}

Scan Result:
All of your scan results are stored in a json file named cms.json, you can find the logs inside the Result\<Target Site> directory, and as of the bruteforce results they're stored in a txt file under the site's result directory as well.

Here is an example of the json report log:


Bruteforce Modules:
CMSeek has a modular bruteforce system meaning you can add your custom made bruteforce modules to work with cmseek. A proper documentation for creating modules will be created shortly but in case you already figured out how to (pretty easy once you analyze the pre-made modules) all you need to do is this:
  1. Add a comment exactly like this # <Name Of The CMS> Bruteforce module. This will help CMSeeK to know the name of the CMS using regex
  2. Add another comment ### cmseekbruteforcemodule, this will help CMSeeK to know it is a module
  3. Copy and paste the module in the brutecms directory under CMSeeK's directory
  4. Open CMSeeK and Rebuild Cache using R as the input in the first menu.
  5. If everything is done right you'll see something like this (refer to screenshot below) and your module will be listed in bruteforce menu the next time you open CMSeeK.

Need More Reasons To Use CMSeeK?
If not anything you can always enjoy exiting CMSeeK (please don't), it will bid you goodbye in a random goodbye message in various languages.
Also you can try reading comments in the code those are pretty random and weird!!!

Screenshots:
 Main Menu

Scan Result

 
WordPress Scan Result

Guidelines for opening an issue:
Please make sure you have the following info attached when opening a new issue:
  • Target
  • Exact copy of error or screenshot of error
  • Your operating system and python version
Issues without these informations might not be answered!

Disclaimer:
Usage of CMSeeK for testing or exploiting websites without prior mutual consistency can be considered as an illegal activity. It is the final user's responsibility to obey all applicable local, state and federal laws. Authors assume no liability and are not responsible for any misuse or damage caused by this program.

Follow @r3dhax0r:
Twitter

Team:
Team : Virtually Unvoid Defensive (VUD)



News Bewertung

Weiterlesen Weiterlesen

Generating custom wordlists for brute force attacks 📖💥

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

When rockyou.txt isn't enough, why not create your own. Targeted attacks can be more successful than just using a generic wordlist.

Here is a quick run down on how you can generate your own before brute forcing.

https://bit.ly/2HS18li

If anyone knows anymore, please let me know 😄

submitted by /u/lolppppp1
[link] [comments]
News Bewertung

Weiterlesen Weiterlesen

Microsoft Adds Python To Windows -- Sort Of

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: developers.slashdot.org Direktlink direkt öffnen

A post this week on Microsoft's developer blog explains "what we, the Python team, have done to make Python easier to install on Windows" after the next update. TLDR: Typing 'python' in Windows' Command Prompt will take you to the Microsoft Store's Python page: Microsoft has been involved with the Python community for over twelve years, and currently employ four of the key contributors to the language and primary runtime. The growth of Python has been incredible, as it finds homes among data scientists, web developers, system administrators, and students, and roughly half of this work is already happening on Windows. And yet, Python developers on Windows find themselves facing more friction than on other platforms. It's been widely known for many years that Windows is the only mainstream operating system that does not include a Python interpreter out of the box... So we made things easier. First, we helped the community release their distribution of Python to the Microsoft Store. This version of Python is fully maintained by the community, installs easily on Windows 10, and automatically makes common commands such as python, pip and idle available (as well as equivalents with version numbers python3 and python3.7, for all the commands, just like on Linux). Finally, with the May 2019 Windows Update, we are completing the picture. While Python continues to remain completely independent from the operating system, every install of Windows will include python and python3 commands that take you directly to the Python store page. We believe that the Microsoft Store package is perfect for users starting out with Python, and given our experience with and participation in the Python community we are pleased to endorse it as the default choice. And while this fix is only for Python, the Microsoft post adds that "Over time, we plan to extend similar integration to other developer tools and reduce the getting started friction."

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

Irgendwie eine Mogelpackung: iFixit schaut auf "neue" MacBook-Tasten

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: winfuture.de Direktlink direkt öffnen

Apple, Tastatur, Macbook, Ifixit, Teardown, Butterfly Apple hat vor kurzem die MacBook Pro-Familie mit neuen Prozessoren aktualisiert und auch die eine oder andere Verbesserungen in die mobilen Rechner eingebaut. Für viele stellt sich jetzt auch wieder einmal die Frage, ob die Probleme mit der Butterfly-Tastatur behoben werden konnten. (Weiter lesen)
News Bewertung

Weiterlesen Weiterlesen

ASRock B450 Steel Legend - Mainboard mit B450-Chipsatz im Test

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: winfuture.de Direktlink direkt öffnen

Test, Zenchilli, Zenchillis Hardware Reviews, Mainboard, Motherboard, ASRock, ASRock B450 Steel Legend, ASRock B450, B450 Steel Legend, B450 ASRock hat unter der Bezeichnung Steel Legends eine neue Mainboard-Serie gestartet. Den Anfang machen in dieser das im ATX-Format gehaltene B450 und die kleinere Micro-ATX-Variante B450M. Ersteres hat unser Kollege von Zenchillis Hardware Reviews jetzt getestet und ist dabei unter anderem auch auf die Aspekte Overclocking und Spannungswandler eingegangen. Wie es der Name bereits erahnen lässt, ist auf dem ASRock B450 Steel Legend der B450-Chipsatz verbaut. (Weiter lesen)
News Bewertung

Weiterlesen Weiterlesen

Researcher exposes vulnerability in macOS Gatekeeper security mechanism

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

Researcher exposes vulnerability in macOS Gatekeeper security mechanism submitted by /u/hoangton
[link] [comments]

News Bewertung

Weiterlesen Weiterlesen

Windows 10 Mai Update-Probleme: AMD stellt neue Treiber bereit

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: winfuture.de Direktlink direkt öffnen

Microsoft, Betriebssystem, Windows, Windows 10, Update, Fehler, Redstone 5, Windows 10 Version 1809, Bugs, Windows 10 Oktober Update, Version 1809, Oktober-Update Ein Problem kann man jetzt bereits von der Liste der bekannten Probleme mit dem neuen Windows 10 Mai Update streichen: AMD hat eine Lösung für die Update-Blockade auf manchen Systeme vorgestellt, die mit AMD Ryzen- oder AMD Ryzen-Threadripper-Prozessoren ausgestattet sind. (Weiter lesen)
News Bewertung

Weiterlesen Weiterlesen

Ausführen beliebiger Kommandos in mod_http2 (Fedora)

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: pro-linux.de Direktlink direkt öffnen


News Bewertung

Weiterlesen Weiterlesen

Equifax’s Nightmare Continues, Credit Rating “Negative”

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: hackercombat.com Direktlink direkt öffnen

Since 2017, Hackercombat.com covered the data breach incident of Equifax and all its relevant angles. The latest was just last March 9, 2019, when the U.S. Senate’s Committee on Homeland...

The post Equifax’s Nightmare Continues, Credit Rating “Negative” appeared first on .


News Bewertung

Weiterlesen Weiterlesen

Cyber Security” an der Universität Bonn – was man wissen sollte

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: google.com Direktlink direkt öffnen

Ab dem Wintersemester 2019/20 wird der neue Studiengang “Cyber Security” an der Universität Bonn angeboten. Im Interview erklären beiden ...
News Bewertung

Weiterlesen Weiterlesen

Chromium Edge: Dark Mode und Übersetzer jetzt für alle Nutzer aktiv

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: winfuture.de Direktlink direkt öffnen

Browser, Leak, Edge, Microsoft Edge, Edge Beta Microsoft hat im Dev-Channel für den neuen auf Chromium-basierten Webbrowser Edge ein Update nachgereicht. Ein neues Build behebt Fehler der erst am Freitag herausgegebenen Version und bringt jetzt den Dark Mode und den eingebauten Übersetzer für alle Tester. (Weiter lesen)
News Bewertung

Weiterlesen Weiterlesen

Chromium Edge: Dark Mode und Übersetzer jetzt für alle Nutzer aktiv

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: winfuture.de Direktlink direkt öffnen

Browser, Leak, Edge, Microsoft Edge, Edge Beta Microsoft hat im Dev-Channel für den neuen auf Chromium-basierten Webbrowser Edge ein Update nachgereicht. Ein neues Build behebt Fehler der erst am Freitag herausgegebenen Version und bringt jetzt den Dark Mode und den eingebauten Übersetzer für alle Tester. (Weiter lesen)
News Bewertung

Weiterlesen Weiterlesen

Opinions on the necessity of MAC spoofing?

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

submitted by /u/AntifascistOiBoy
[link] [comments]
News Bewertung

Weiterlesen Weiterlesen

Opinions on the necessity of MAC spoofing?

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: reddit.com Direktlink direkt öffnen

submitted by /u/AntifascistOiBoy
[link] [comments]
News Bewertung

Weiterlesen Weiterlesen

MacOS: Ungepatchte Schwachstelle in Apples Gatekeeper veröffentlicht

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: winfuture.de Direktlink direkt öffnen

Sicherheit, Sicherheitslücken, schloss, Abus, Kette Mit dem sogenannten "Gatekeeper" möchte Apple sicherstellen, dass auf den eigenen Computern ausschließlich vertrauenswürdige Software aus­ge­führt wird. Ein Sicherheitsforscher hat nun aber eine schwerwiegende Schwachstelle, welche das Tool außer Gefecht setzen kann, offengelegt. (Weiter lesen)
News Bewertung

Weiterlesen Weiterlesen

MacOS: Ungepatchte Schwachstelle in Apples Gatekeeper veröffentlicht

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: winfuture.de Direktlink direkt öffnen

Sicherheit, Sicherheitslücken, schloss, Abus, Kette Mit dem sogenannten "Gatekeeper" möchte Apple sicherstellen, dass auf den eigenen Computern ausschließlich vertrauenswürdige Software aus­ge­führt wird. Ein Sicherheitsforscher hat nun aber eine schwerwiegende Schwachstelle, welche das Tool außer Gefecht setzen kann, offengelegt. (Weiter lesen)
News Bewertung

Weiterlesen Weiterlesen

Can James Cameron and Arnold Schwarzenegger Revive The 'Terminator' Franchise?

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: entertainment.slashdot.org Direktlink direkt öffnen

"The Resistance's war against Skynet rages on with the sixth installment of the Terminator series," reports Variety, adding that the James Cameron-produced film "serves as a direct sequel to the first two movies in the franchise, relegating the events of the intervening films to alternate timelines." Or, as ET Online: puts it, "Arnold Schwarzenegger, Linda Hamilton and James Cameron are together again!" On Thursday, Paramount Pictures released the first trailer for Terminator: Dark Fate, and it's a reunion for the film franchise's original stars and filmmaker. Hamilton steps back into her role as the badass Sarah Connor, who teams up with Grace (Mackenzie Davis), a woman from the future who shows up in New Mexico and first appears much like Schwarzenegger's character did in the first movie. Directed by Deadpool's Tim Miller, Cameron wrote the story treatment for the sequel and was a producer on the film. After several action scenes, Sarah Connor knocks on the door of an old house, and the original Terminator (Schwarzenegger) appears with a salt-and-pepper beard. "We're back," Schwarzenegger, 71, tweeted along with the trailer, alluding to his iconic line "I'll be back." After two days the trailer has racked over 12.5 million views on YouTube, and James Cameron "not only assures that the new entry will be R-rated, but he makes it clear this will be, in more than one way, much more similar to the first two movies in the series," reports Movieweb -- quoting these remarks from one of Cameron's recent interviews. "I think, tonally, what makes this a direct sequel to T1 and T2 is as much about the tone as it is about the narrative: it's R rated, it's grim, it's gritty, it's fast, it's intense, it's linear."

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

Can James Cameron and Arnold Schwarzenegger Revive The 'Terminator' Franchise?

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: entertainment.slashdot.org Direktlink direkt öffnen

"The Resistance's war against Skynet rages on with the sixth installment of the Terminator series," reports Variety, adding that the James Cameron-produced film "serves as a direct sequel to the first two movies in the franchise, relegating the events of the intervening films to alternate timelines." Or, as ET Online: puts it, "Arnold Schwarzenegger, Linda Hamilton and James Cameron are together again!" On Thursday, Paramount Pictures released the first trailer for Terminator: Dark Fate, and it's a reunion for the film franchise's original stars and filmmaker. Hamilton steps back into her role as the badass Sarah Connor, who teams up with Grace (Mackenzie Davis), a woman from the future who shows up in New Mexico and first appears much like Schwarzenegger's character did in the first movie. Directed by Deadpool's Tim Miller, Cameron wrote the story treatment for the sequel and was a producer on the film. After several action scenes, Sarah Connor knocks on the door of an old house, and the original Terminator (Schwarzenegger) appears with a salt-and-pepper beard. "We're back," Schwarzenegger, 71, tweeted along with the trailer, alluding to his iconic line "I'll be back." After two days the trailer has racked over 12.5 million views on YouTube, and James Cameron "not only assures that the new entry will be R-rated, but he makes it clear this will be, in more than one way, much more similar to the first two movies in the series," reports Movieweb -- quoting these remarks from one of Cameron's recent interviews. "I think, tonally, what makes this a direct sequel to T1 and T2 is as much about the tone as it is about the narrative: it's R rated, it's grim, it's gritty, it's fast, it's intense, it's linear."

Read more of this story at Slashdot.


News Bewertung

Weiterlesen Weiterlesen

Stiftung Warentest Multifunktions-Drucker: App statt Scanner, geht das?

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: winfuture.de Direktlink direkt öffnen

Test, Stiftung Warentest, Heft, Symbolbild, test.de Die Stiftung Warentest hat nach dem großen Drucker-Test vor einigen Wochen noch einmal nachgelegt. Dieses Mal geht man der Frage nach, was neue Multifunktionsdrucker, die auf Apps statt Scanner setzen, taugen. Zudem hat Test.de seine Datenbank mit neuen Druckern gefüttert. (Weiter lesen)
News Bewertung

Weiterlesen Weiterlesen

Stiftung Warentest Multifunktions-Drucker: App statt Scanner, geht das?

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: winfuture.de Direktlink direkt öffnen

Test, Stiftung Warentest, Heft, Symbolbild, test.de Die Stiftung Warentest hat nach dem großen Drucker-Test vor einigen Wochen noch einmal nachgelegt. Dieses Mal geht man der Frage nach, was neue Multifunktionsdrucker, die auf Apps statt Scanner setzen, taugen. Zudem hat Test.de seine Datenbank mit neuen Druckern gefüttert. (Weiter lesen)
News Bewertung

Weiterlesen Weiterlesen

Snapchat-Mitarbeiter sollen eigene User massiv ausspioniert haben

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: google.com Direktlink direkt öffnen

Snapchat ist einer der populärsten Social-Media-Dienste und bietet Usern die Möglichkeit, Bilder und Videos zu verschicken, die nach dem Öffnen ...
News Bewertung

Weiterlesen Weiterlesen

Apple Could Take Samsung by Surprise with Full-Screen Touch ID on 2020 iPhone

Zur Kategorie wechselnIT Security Nachrichten vom | Quelle: news.softpedia.com Direktlink direkt öffnen

Apple abandoned the fingerprint reader, officially known as Touch ID, with the debut of the iPhone X, with the company instead betting all-in on facial recognition, or Face ID, as the exclusive authentication system. Meanwhile, Samsung, which continues to be Apple’s number one rival, continued to invest aggressively in fingerprint sensors, so this year’s Galaxy S10 introduced a new system that has the reader embedded into the glass. Apple, however, could take both its users and its competitors by surprise with the 2020 iPhone when the company could bring back Touch ID with a completely innovative approach. This device, according to Barclays analyst Blayne Curtis (via MR), could come with a full-screen fingerprint sensor, which means that you can touch the display anywhere you want to unlock the device. On the Galaxy S10, users must put the finger in a certain place...
News Bewertung

Weiterlesen Weiterlesen

Seitennavigation

Seite 1 von 3.995 Seiten (Bei Beitrag 1 - 35)
139.810x Beiträge in dieser Kategorie

Nächste 2 Seite | Letzte Seite

[ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ]