Bundeskriminalamt liest WhatsApp mit
Published 22 JUL 2020 in Berliner Morgenpost.
— Welkom op mijn persoonlijke Website, gehost in Nederland om redenen van privacy: Achtergrond, Ervaring, Technisch en Zakelijk Nieuws —
Published 22 JUL 2020 in Berliner Morgenpost.
U.S. Army Cpl. Andrew Ramirez, assigned to Bravo Company, 44th Expeditionary Signal Battalion, 2nd Theater Signal Brigade, talks on a radio during during exercise Stoney Run, April 24, 2018 in the Sennelager Training Area, Germany. Stoney Run is an annual U.S.-U.K. signal exercise designed to test and validate communications and network capabilities, and enhance interoperability…
Zwischen März und Mai haben ausländische Akteure US-Staatsanleihen im Wert von über einer halben Billion US-Dollar abgestoßen. Niemals zuvor wurden so viele Treasury Bonds innerhalb eines Monats verkauft wie im März (299 Milliarden US-Dollar) und April (177 Milliarden US-Dollar). Das geht aus den vom Finanzministerium der Vereinigten Staaten von Amerika veröffentlichen Monatszahlen der Nettoverkäufe (Käufe…
Why should you become anonymous? And how can you even be anonymous on the web? Watch to learn how to use essential anonymity tools to become anonymous on the web. You will learn what it means to be anonymous on the web, how to use essential anonymity tools, and you’ll learn some tips and habits…
Cyber Weapons Lab, Episode 174 If you’re not an avid plane spotter, it can be quite difficult to look up in the sky and identify an aircraft. In this episode of Cyber Weapons Labs, we’re going to show you how to do it with your iPhone or Android and collect a ton of other OSINT…
In 2010, the discovery of Stuxnet, the sophisticated virus used by the U.S. and Israel to sabotage Iran’s nuclear program, ushered in a new era of warfare — in the digital realm. It also placed critical infrastructure around the world in the cross hairs by demonstrating how a remote digital attack could be done anonymously…
6,2 Milliarden Euro Risikokapital wurden laut der Wirtschaftsprüfungsgesellschaft EY 2019 in deutsche Start-Ups investiert, das entspricht einem Plus von rund 36 Prozent gegenüber dem Vorjahr. Davon gingen etwa 3,7 Milliarden Euro an Berliner Unternehmen. Damit ist die Bundeshauptstadt gleichsam auch Investitionshauptstadt. Mehr als die Hälfte (59 Prozent), der hierzulande in Start-Ups investierten Geldmenge ging an…
Exploitation of the bug can allow an attacker to lift sensitive information, delete files, execute code, carry out sabotage and more. A critical vulnerability, carrying a severity score of 10 out of 10 on the CvSS bug-severity scale, has been disclosed for SAP customers. SAP’s widely deployed collection of enterprise resource planning (ERP) software is…
A campaign discovered by Malwarebytes Labs in mid-April has lifted credentials from a number of e-commerce portals. Researchers have identified a credit-card skimming campaign that’s been active since mid-April that has a rather specific and unusual target: ASP.NET-based websites running on Microsoft Internet Information Services (IIS) servers. New research from Malwarebytes Labs recently uncovered the…
The Lightning Network is susceptible to attacks that could drain Bitcoin wallets by flooding the blockchain. A study published on June 29 revealed a way to drain Bitcoin (BTC) wallets’ funds on the Lightning Network by exploiting a bottleneck in the system. According to the “Flood & Loot: A Systemic Attack On The Lightning Network”…
Comparitech’s Paul Bischoff found that Amazon’s facial recognition platform misidentified an alarming number of people, and was racially biased. Facial recognition technology is still misidentifying people at an alarming rate – even as it’s being used by police departments to make arrests. In fact, Paul Bischoff, consumer privacy expert with Comparitech, found that Amazon’s face recognition…
In dem bodengebundenen Forschungsflugzeug wird das Kabinenklima mit Messtechnik samt spezieller Dummies untersucht. Bild: DLR Zum Start der Sommerferien sind Reisen innerhalb Europas wieder möglich. Doch wie groß ist das Risiko, sich im Flugzeug oder Zug mit dem Coronavirus anzustecken? Forscher untersuchen, wie sich die Viren in der Kabine verteilen. Die Flugzeugkabine ist nur schwach…
A multinational tech company gets schooled in the risks of doing business in China. A large, multinational technology company got a nasty surprise recently as it was expanding its operations to China. The software a local bank required the company to install so it could pay local taxes contained an advanced backdoor. The cautionary tale,…
SophosLabs published a study that revealed hackers use the blockchain network to share secret messages. A group of researchers from SophosLabs state that hackers operating the cryptojacking malware, Glupteba, have been using the Bitcoin blockchain network to communicate in secret. According to the report published on June 24, cybercriminals rely on a command and control…
The original 1995 ShockWave Global Download Servers at Macromedia HQ San Francisco Back in 1995 Macromedia’s influence on interactive media began with the launch of Shockwave, a technology that converted Macromedia Director presentations into a compressed format for web delivery: the first true animations on the Internet, which also allowed Youtube to exist later, delivering…
A partial screenshot of the BlueLeaks data cache. Hundreds of thousands of potentially sensitive files from US police departments across the United States were leaked online last week. The collection, dubbed “BlueLeaks” and made searchable online, stems from a security breach at Texas web design and hosting company Netsential that maintains a number of state…
Ethereum Classic performed its scheduled upgrade to bring Ethereum’s Istanbul features to the classic chain, making the two protocols fully compatible with each other. Ethereum Classic, the twin sibling of the Ethereum network, performed its scheduled Phoenix hard fork on May 31, which included features from Ethereum’s earlier Istanbul fork. The upgrade means that the…
Senior Level Executives are invited to participate in the Virtual Cyber Summit Power Hour DC Metro Edition. During these unprecedented times, it is more important than ever for business leaders to have a clear and well thought-out cyber security battle plan. Join us and learn from Leading Industry Experts from the US DHS, Arctic Wolf,…
Encountered this today: “The installation of a package which violates the quality standards isn’t allowed. This could cause serious problems on your computer. Please contact the person or organisation who provided this package file and include the details beneath.” #cybersecurity #notlinuxfriendly
Recently, I was tipped off about certain sites performing localhost port scans against visitors, presumably as part of a user fingerprinting and tracking or bot detection. This didn’t sit well with me, so I went about investigating the practice, and it seems many sites are port scanning visitors for dubious reasons. A Brief Port Scanning…
You must be logged in to post a comment.