Blogs
Links
Social networks
Awards
Sponsors
(Paypal-Donations)
Category Archives: Security
Chrome 104.0.5112.101/102 fixes 11 vulnerabilities
[German]Google has released the update of Google Chrome 104.0.5112.101 for Linux and macOS and 104.0.5112.102 for Windows on the desktop in the stable channel on August 16, 2022. The security update closes numerous vulnerabilities.
Windows Defender Credential Guard Update and Revisions (August 9, and 15, 2022)
[German]Microsoft also patched Windows Defender Credential Guard on patchday, August 9, 2022, with the security updates. Both an elevation of privilege vulnerability and a security feature bypass vulnerability were closed. However, Microsoft had not provided any documentation on this.
Signal victim of Twilio hack
[German]In the article Twilio data security incident findings after SMS phishing attack, I had reported on the security incident at provider Twilio, where data was stolen by hackers through a phishing attack. Twilio offers programmable voice, text, chat, video and … Continue reading
Vulnerabilities in Xiaomi smartphones
[German]Chinese vendor Xiaomi ships smartphones with vulnerabilities: A themes app that tries to bypass Google's built-in Android security protection. In addition, security researchers have discovered a vulnerability in MediaTek chips that make the payment system integrated in Xiaomi smartphones vulnerable. … Continue reading
Car safety: Kia Challenge and Hyundai Key found on the web
[German]Software security in cars – a hot topic. On platforms such as TikTok, a trend known as the Kia Challenge or Kia Boys is celebrating a happy new era – the aim is to steal vehicles from Kia or Hyundai … Continue reading
Why ISL Online: Critical factors when choosing a remote desktop solution
[Sponsored Post]In the rapidly evolving IT world, choosing the right remote desktop software is critical for organizations that value security, ease of use and reliability. One provider of secure remote access that has been on the market since 2001 is ISL Online, which presents some considerations for choosing such software below. More ...
Twilio data security incident findings after SMS phishing attack
[German]Cloud communications company Twilio has recently fallen victim to a cyberattack, according to recent media reports (here and here). The attackers penetrated some of the company's customer databases after stealing employee credentials via an SMS phishing attack. The Lookout, Inc, … Continue reading
New China Leak? Hacker claims to have captured data of 48.5 million COVID app users from Shanghai
[German]Is there a new data leak in China that has captured personal data of millions of people? A hacker has claimed to have obtained the personal data of 48.5 million users of a COVID mobile health code app operated by … Continue reading
Tesla vehicle data collection
IEEESpectrum is planning a short series of reports examining Tesla's collection and use of data from its customers' vehicles. Part 1 will summarize what is known about what data Tesla collects and uploads to its servers.
Google-free Threema Libre as Android app
A small note for users of the messenger Threema. The developers are very privacy-conscious and do not use any software libraries from Google or third-party providers in their app. In the meantime, the app is also available for FDroid. So … Continue reading
Warning: Vulnerability in IT asset management platform Device42
IT management platforms can become dangerous vulnerabilities. When vulnerabilities allow root access and enable remote code execution, such asset management platforms become a danger. In a warning, Bitdefender reveals the risks that existed with the Device42 product and why an … Continue reading


