NBC-Webseite dient Malware - Stay away!

Thursday, 21 February 2013

NBC-Webseite berichtet kompromittiert wurde, ist Umleiten von Benutzern auf bösartige Websites, Dancho Danchev. Laut HitmanPro hat die Website bösartige iFrames gespritzt worden, die zu führen...

View the Original article

Räuber-Chrome-Erweiterung-Hijacking-Facebook-Konten

Chrome Benutzer, davor hüten, eine Erweiterung mit dem Namen "Business-Flash-Player". Laut Bitdefender senior e-Bedrohung Analyst Bogdan Botezatu, der Link zum download kommt eingebettet in spam, die Hallo...

View the Original article

Rezension: Erweiterte permanente Bedrohung

Autor: Dr. Eric Cole Seiten: 320 Verlag: Syngress ISBN: 1597499498 Einführung als immer mehr Informationen verfügbar, und werden in elektronischer Form, die logische Konsequenz...

View the Original article

Schädliche URLs eclipsing Botnets als Malware-Verbreitung-Führer

McAfee Labs ergab, dass ausgefeilte Angriffe, die ursprünglich auf die Finanzdienstleistungsbranche nun zunehmend an anderen lebenswichtigen Sektoren der Wirtschaft, während Sie einen neuen Satz von Ne gerichtet sind...

View the Original article

25 % von DDoS-Attacken im Jahr 2013 werden anwendungsorientierte

Fünfundzwanzig Prozent der distributed Denial of Service (DDoS)-Attacken, die im Jahr 2013 auftreten werden anwendungsbasierte, laut Gartner. Während solche Vorfälle aussenden Angreifern gezielte Befehle, um eine...

View the Original article

Check Point stellt High-Performance Data Center-Sicherheits-appliance

Check Point startete seine neue 21700 Appliance mit 78 Gbit/s Firewall-Durchsatz, 25 Gbit/s von IPS-Durchsatz und eine 2.922 SecurityPower Unit (SPU) Bewertung. Sicherheitsgateways müssen die Möglichkeit haben...

View the Original article

Cenzic Enterprise integriert mit F5 BIG-IP-ASM

Cenzic kündigte die direkte API-Integration der Cenzic Enterprise 7.0-Suite von Produkten mit F5s BIG-IP Application Security Manager(ASM) 11,3. Mit dieser kombinierten Lösung können Kunden jetzt Init...

View the Original article

FireMon erweitert Situationsbewusstsein mit Security Manager 7.0

FireMon kündigte neue Funktionen Security Manager 7.0, die Organisationsfähigkeit zu identifizieren, verstehen und Verwalten von Änderungen in der Sicherheitslage in Echtzeit verbessern. Diese Funktionen gelten b...

View the Original article

Sicherheit ist oberste Grund, warum sie single-Sign-on nimmt

Sicherheit ist die Zahl ein Grund, warum IT-Experten einmaliges Anmelden (SSO) und Identity und Access Management (IAM)-Technologie implementieren, nach neuen Erkenntnissen Symplified. Die durchschnittliche org....

View the Original article

Google-Konto, die Entführung drastisch verringerte

Google setzt viele Sicherheitsmaßnahmen, Möchtegern-Google-Konto-Hijacker zu vereiteln, und nicht alle sind gut sichtbar, als die zwei-Faktor-Authentifizierung-Option in 2010 und 2011 eingeführt (für Firmen und...

View the Original article

The cyber war is real -- and our defenses are weak

http://www.flickr.com/photos/mysticpolitics/7619805526/

I used to think "cyber war" was the most overhyped security buzzphrase of all time. And it was -- until Stuxnet and APTs (advanced persistent threats) arrived. Now, as Bob Violino detailed in his recent InfoWorld article, all-out cyber war has begun.

Tags: 


View the Original article

Ubuntu Touch Preview coming to Nexus tablets this week

http://en.wikipedia.org/wiki/Ubuntu_Phone

After desktops and phones, Ubuntu is now bringing its Linux distribution to tablets. Coming Thursday, preview images for Google's Nexus tablets will be released, so we can all get a good long look at what Canonical is cooking up. They've published a YouTube video which details all that Ubuntu has to offer for tablets, and to be honest, it's looking quite good.



View the Original article

Higgs Boson calculations add up to new Armageddon scenario

http://asset0.cbsistatic.com/cnwk.1d/i/tim/2013/02/19/protoncol_610x269.png

Anyone who thinks the end is nigh with a giant asteroid colliding into Earth may have a new apocalypse scenario to worry about.

It all boils down to the Higgs Boson particle, aka the "God particle."

Tags: 


View the Original article

A look at Mandiant and their allegations on China hacking

http://www.mandiant.com/

A private technology security firm on Tuesday described in extraordinary detail efforts it blamed on a Chinese military unit to hack into 141 businesses, mostly inside the U.S., and steal commercial secrets. China denies the claim. Here's a look at the company, Mandiant, and why its report is significant.

What is Mandiant?



View the Original article

Microsoft's Windows Blue may have just hit milestone 1

http://cdn-static.zdnet.com/i/r/story/70/00/011514/windowsbluem1-v1-200x164.png?hash=MQL4AmNlZJ&upscale=1

The Windows team at Microsoft just completed the first milestone build (M1) of Windows Blue, the first full-fledged update to Windows 8, according to a couple of sources of mine.
windowsbluem1

One of my contacts said that M1 marks the half-way point in the Windows Blue development schedule. The last and final milestone build of Windows Blue will be M2, said this contact, who requested anonymity.



View the Original article

How to Force an Android Device to Find a System Update

http://cdn.howtogeek.com/wp-content/uploads/2013/02/android-system-update-downloaded.png

Whenever Google releases a new version of Android for its Nexus devices, it doesn’t roll out to everyone at once. It may take several days before your device receives the update, but you don’t have to wait.

Note that this only works if an OTA (over-the-air) update is actually available – for example, if you’ve got a Nexus 4 running Android 4.2.1 and you haven’t yet received a notification to update to Android 4.2.2. This won’t help if you’re using an Android device that isn’t receiving updates.



View the Original article

How Anonymous accidentally helped expose two Chinese hackers

http://cdn.arstechnica.net/wp-content/uploads/2013/02/Unit61398.jpg

How did security firm Mandiant put names to two previously unknown Chinese hackers who, it says, steal American corporate secrets for the Chinese government? With a little inadvertent help from Anonymous.



View the Original article

Google Glass' user interface revealed

http://youtu.be/v1uyQZNg2vE

This is amazing. Not only has Google just opened up the pre-order program for Google Glass to 'creative individuals', it has also unveiled what the user interface looks like and how it works. It's... Nothing short of amazing. I'm throwing money, credit cards, my car keys, my house keys, my Surface RT, my cats, everything at my screen. I want this so bad.



View the Original article

Twitter's Response To The Burger King Hacking: Do A Better Job At Protecting Your Password

http://static2.businessinsider.com/image/5124e93069bedd2d09000034-645-483-400-/burger-king-hacked-twitter-2.png

In response to the hacking of Burger King and Jeep's Twitter accounts this week, Twitter put up a new blog post encouraging people to protect their passwords.

Here are Twitter's tips:



View the Original article

BlackBerry squashes W-TIFF-F bug that's ripe for malware squirters

http://en.wikipedia.org/wiki/BlackBerry

BlackBerry has patched a security vulnerability that allowed hackers to run malicious code on systems running its BlackBerry Enterprise Server (BES) software.

The bug, rated as "high severity", is triggered by specially crafted TIFF image files that travel into BES as users visit webpages, receive emails and exchange instant message conversations.



View the Original article

China steps up defence on hacking allegations

http://en.wikipedia.org/wiki/China

Chinese state media stepped up the war of words on Thursday over allegations of sophisticated cyberattacks on US firms, branding the accusations a "commercial stunt" and accusing Washington of ulterior motives.

American Internet security firm Mandiant earlier this week said that a Chinese military cyberspy unit is targeting US and other foreign firms and organisations with hacking attacks.



View the Original article

Apple releases 'malware removal tool' following computer hack

http://en.wikipedia.org/wiki/Apple_Inc.

Apple will release a malware removal tool after a number of Mac systems were infected by computer hackers who targeted Facebook last week.

Unknown hackers infected the computers of some Apple workers when they visited a website for software developers that had been infected with malicious software.

The malware had been designed to attack Mac computers, the Telegraph reports. The same software, which infected Macs by exploiting a flaw in a version of Oracle Corp's Java software used as a plug-in on Web browsers, was used to launch the attacks against Facebook.



View the Original article

Forum site gives more details on Apple and Facebook hacks

http://en.wikipedia.org/wiki/Facebook

The popular forum site that hackers used to access employee computers at Apple and Facebook gave more details today on how the cyberattack happened.

The site's owner Ian Sefferman confirmed previous reports that hackers injected JavaScript into his site, iPhonedevsdk, and were then able to use a previously unknown exploit to access certain user's computers. He also said that the cyberattack most likely ended on January 30, 2013.

Tags: 


View the Original article

MTV, BET 'Hack' Stunt Backfires

http://www.vibe.com/sites/vibe.com/files/styles/main_image/public/article_images/MTV_Hack1_creepy.jpg

The popular networks unsuccessfully tried to 'Catfish' their respective followers. We have details on how they failed miserably after the jump.

In an apparent move to gain Twitter followers, the sister networks pretended hackers took over their accounts.



View the Original article

First space tourist plans to make trip to Mars in 2018

http://asset2.cbsistatic.com/cnwk.1d/i/tim/2013/02/20/593391main_pia14832-43_800-600_620x465_610x458.jpg

Earth's first space tourist won't be outdone by a few fancy NASA rovers with their cutesy names, sky cranes and whatnot. So like the saying goes, if you can't beat 'em, make the unprecedented 500-day round-trip journey to Mars to join 'em.

That's the insanely ambitious plan that Dennis Tito, who was the first private space traveler a little less than 12 years ago will announce in more detail next week.

Tags: 


View the Original article

Making sense of the PS4 game lineup

http://asset2.cbsistatic.com/cnwk.1d/i/tim/2013/02/20/App_ps4Announce_610x436.jpg

So the world didn't exactly get what it wanted out of Sony's PlayStation 4 debut tonight. There was no sight of the actual console itself and details about its specific release date and price were also nowhere to be seen.

Sony's team-up with Gaikai is sure to net some interesting ideas and implementations with cloud streaming, the sharing of game screens, remote play and other concoctions, but it was the games themselves that made the biggest impact.



View the Original article

Adobe's emergency patch for Reader and Acrobat is here

http://en.wikipedia.org/wiki/Adobe_Systems

Adobe has released the emergency update for Reader and Acrobat that it promised late last week.

The company decided to get a move on to deal with a newly-reported vulnerability that was actively being exploited, at least on Windows and the Mac.

The timeline has been pretty swift:

    2012-02-12: Bug reported in a blog post by FireEye. Details scant.
    2013-02-13: Adobe publishes a security bulletin, including a workaround for Windows users.
    2013-02-17: (Weekend) Adobe announces patch "next week."
    2013-02-20: Patch is released.



View the Original article

McAfee finds sophisticated attacks targeting other 'critical sectors' of the economy

http://en.wikipedia.org/wiki/McAfee

Financial services has been a favorite target for sophisticated attacks in the last few years, but cyber criminals are moving on to other "critical sectors of the economy," according to McAfee.

In the security giant's fourth quarter threats report, researchers highlighted some of the new schemes being used in this regard and other high-profile attacks, including advanced persistent threats (APTs) such as Operation High Roller and Project Blitzkrieg.



View the Original article

Identity fraud in U.S. is on the rise, report

http://en.wikipedia.org/wiki/United_States

While cyberattacks and hacking seem to be constantly making headlines these days, identity fraud is also on the rise.

A new report by Javelin Strategy and Research shows that identity fraud has increased for the last three years in a row -- affecting more than 5 percent of U.S. adults. In 2012, 12.6 million people were identity victims.



View the Original article

Mandiant's China Hacking Claims Draw Criticism

http://www.mandiant.com/

Maybe it wasn’t China. Maybe it was, but suppose it wasn’t. That’s the reaction of at least one computer security consultant to yesterday’s blockbuster report from the security firm Mandiant, which accused a unit of China’s People’s Liberation Army of carrying out a series of hacking attacks against companies in the U.S., Canada, the U.K. and elsewhere over a series of years.

Jeffrey Carr, CEO of Taia Global, writes today in a blog post that he thinks Mandiant’s report is full of holes.



View the Original article

Qualys CEO to address security in a hyperconnected world at RSA Conference 2013

Qualys Chairman and CEO Philippe Courtot will examine the evolution of security in a hyperconnected world in his keynote at RSA Conference 2013. Courtot�s keynote, which will also feature John Pesc...

View the Original article

Alert Logic releases new log manager

Alert Logic announced a new release of Log Manager which enables real-time security monitoring of critical security logs. By combining correlation with on-the-fly parsing of logs, Log Manager can aler...

View the Original article

SmishGuru simulated attack service launches

Wombat released SmishGuru, a simulated attack service for security officers to train employees how to recognize and avoid the most subtle yet potentially harmful smishing attacks. While the mobile ...

View the Original article
 
Support : Creating Website | Johny Template | Mas Template
Copyright © 2011. HatHack German - All Rights Reserved
Template Created by Creating Website Inspired by Sportapolis Shape5.com
Proudly powered by Blogger