Slashdot
Boeing's Poor Information Security Threatens Passenger Safety, National Security, Says Researcher
1 min · · itwbennett writes: Security researcher Chris Kubecka has identified (and reported to Boeing and the Department of Homeland Security back in August) a number of security vulnerabilities in Boeing's… · Shared by 9, including Merkstatt@troet.cafe 📯
heise online
Windows 7: Supportende für Microsofts Security Essentials (MSE) im Januar 2020
2 min · · Mit dem Support für Windows 7 endet auch der MSE-Support. Auch Nutzer des ESU-Programms müssen auf alternative Schutzsoftware umsteigen. · Shared by 8, including Merkstatt@troet.cafe 📯
Forbes
Microsoft Security: Password Problem Affecting 44 Million Users Revealed
3 min · · Microsoft's threat research team has found more than 44 million user accounts with a rather serious password problem · Shared by 9, including Merkstatt@troet.cafe 📯
ZDNET
A decade of hacking: The most notable cyber-security events of the 2010s
20+ min · · ZDNet takes a look over the most important data breaches, cyber-attacks, and malware strains of the last decade. · Shared by 19, including Sebastien Meunier, Merkstatt@troet.cafe 📯, 🇺🇦Evan Kirstel #B2B #TechFluencer
The Washington Post
Phone logs in impeachment report renew concern about security of Trump communications
· The president has routinely spoken to Giuliani and others on cellphones vulnerable to monitoring, according to current and former officials. · Shared by 37, including W. David Stephenson, Dean Baker, Amy Siskind 🏳️🌈, Merkstatt@troet.cafe 📯, Scott McLeod, Trey Tweets Into the Void, Cat Zakrzewski, Carl Zimmer
The New York Times
Stop! Don’t Charge Your Phone This Way
3 min · · You might want to think twice before plugging in at an airport or on the train. · Shared by 69, including Frank Gruber, Leah Klungness, Tiffany Shlain, HeidiCohen - Top Global Marketer, Merkstatt@troet.cafe 📯, Marc R Gagné MAPP, Daniel Kraft, MD
Mashable
Stalkerware is a toxic tool for domestic abusers. This coalition wants to stop it.
1 min · · The coalition is made of human rights and privacy groups, as well as internet security companies. · Shared by 9, including Merkstatt@troet.cafe 📯
Quartz
Rudy Giuliani’s security company gets an “F” for website security
2 min · · The president's cybersecurity adviser doesn't maintain even the most rudimentary security protocols. · Shared by 11, including John Keefe, Merkstatt@troet.cafe 📯
heise online
USA: Militär, Grenzschutz und Polizei bauen riesiges Biometrie-Überwachungsnetz
3 min · · Neben dem Department of Homeland Security baut auch das Pentagon eine Biometriedatenbank auf, in der bereits 7,4 Millionen Identitäten gespeichert sind. · Shared by 9, including Merkstatt@troet.cafe 📯
heise online
Microsoft: Ärger mit Access nach November-2019-Sicherheitsupdates
2 min · · Nach Installation der aktuellen Security-Updates scheitern Abfragen aus Access oftmals mit einem Fehler. Es gibt Workarounds; Updates sind geplant. · Shared by 8, including Merkstatt@troet.cafe 📯
Mashable
Twitter just fixed a major problem with its security settings
2 min · · Update your settings now! · Shared by 9, including Merkstatt@troet.cafe 📯
TNW
146 security flaws uncovered in pre-installed Android apps
2 min · · Researchers at Kryptowire have uncovered 146 security vulnerabilities in preinstalled apps across 29 Android handset manufacturers. · Shared by 10, including Merkstatt@troet.cafe 📯, TNW Top Stories
Forbes
10 Charts That Will Change Your Perspective Of AI In Security
5 min · · 80% of telecommunications executives stated that they believe their organization would not be able to respond to cyberattacks without AI. · Shared by 45, including Gil Press, James Gingerich #B2B #Technology #Influencer, Bob E. Hayes, Gerd Leonhard, Iain Brown, PhD, 🇺🇦Evan Kirstel #B2B #TechFluencer, Ronald van Loon, Terence Mills, Tamara McCleary, Nige Roberts-Willson, Merkstatt@troet.cafe 📯, Amber Mac
youtube.com
This AI Clones Your Voice After Listening for 5 Seconds 🤐
· ❤️ Check out Weights & Biases here and sign up for a free demo: https://www.wandb.com/papers The shown blog post is available here: https://www.wandb.com/art... · Shared by 155, including Pablo Fernandez Cid, Thomas Billeter, Merkstatt@troet.cafe 📯, Will Preston, Matthias Lampe, rudolph regter, Rick King, Javi Cantón @javicanton@mas.to, 瑞拿頭, Sibylle Peuker, Dr. Alec Couros, Tom Connor
heise online
Marktübersicht: Neue Techniken der Endpoint-Security
4 min · · Was einst mit trivialen Virenschutzprogrammen für Desktops angefangen hat, hat sich unter dem Schlagwort „Endpoint-Security“ zu komplexen Schutzmechanismen für alle erdenklichen Endpunkte und Geräte… · Shared by 6, including Merkstatt@troet.cafe 📯
Stammy
Getting started with security keys
· How to stay safe online and prevent phishing with FIDO2, WebAuthn and security keys. A look into YubiKeys, TOTP authenticator apps, passwordless and more. · Shared by 143, including Linus Basig, mastodon.social/@renestalder, Mark Kaigwa, Tom Connor, Esther Schindler, Christopher Allen, Merkstatt@troet.cafe 📯, Davor, Gabriele, pizza.lottie 🍕, OM, mdy, Philippe, Niklaus Gerber