Category Archives: Security

Printing Shellz: Vulnerabilities in HP multi-function printers (MFPs)

[German]Today (Nov. 30,) is Computer Security Day, and this topic fits perfectly. There are several firmware vulnerabilities of certain HP LaserJet, HP LaserJet Managed, HP PageWide and HP PageWide Managed products. These are potentially vulnerable to a buffer overflow. This … Continue reading

Posted in devices, Security | Tagged , , , | Leave a comment

Panasonic: Data leak over four months

[German]Japanese (electronics) company Panasonic admitted last Friday to unauthorized access to its servers by a third party. A thin-lipped announcement reported only one access on Nov. 11, 2021. But those accesses appear to have occurred over the past four months, … Continue reading

Posted in Security | Tagged | 1 Comment

November 30, is Computer Security Day

[German]November 30, is Computer Security Day, a day that has been dedicated to secure IT worldwide since 1988. The initiative for Computer Security Day goes back to the US Association for Computer Security Day. The aim of this day of … Continue reading

Posted in Security | Tagged | Leave a comment

Cynos Android malware infects more than 9 million Huawei smartphones

[German]The Chinese smartphone manufacturer Huawei has temporarily removed 190 Android apps from its app store. The reason: Russian security vendor Dr. Web had discovered that these apps were infected with the Cynos Android malware while analyzing apps in the Huawei … Continue reading

Posted in Android, Security | Tagged , , , | Leave a comment

Azure Confidential Computing with AMD VMs

[German]Microsoft has released an initial preview of Azure DCasv5/ECasv5 (confidential virtual machines with AMD SEV-SNP VM isolation) powered by third-generation AMD EPYC™ processors with SEV-SNP.

Posted in Cloud, Security, Virtualization | Tagged , , | Leave a comment

Why ISL Online: Critical factors when choosing a remote desktop solution

[Sponsored Post]In the rapidly evolving IT world, choosing the right remote desktop software is critical for organizations that value security, ease of use and reliability. One provider of secure remote access that has been on the market since 2001 is ISL Online, which presents some considerations for choosing such software below. More ...


Cyber attack on IKEA's mail system, Trojan distributed?

[German]IKEA has experienced a cyber attack on its email system, the company said in an internal email alert to employees. Attackers are attempting a reply-chain email attack on IKEA employees' inboxes by replying to legitimate emails from the company but … Continue reading

Posted in Security | Tagged | Leave a comment

0patch fixes LPE vulnerability (CVE-2021-24084) in Mobile Device Management Service

[German]There is an unpatched Local Privilege Escalation vulnerability (CVE-2021-24084) in Windows Mobile Device Management Service. The vulnerability has been known since 2020, but has not yet been patched by Microsoft. ACROS Security has therefore developed a free 0patch solution to … Continue reading

Posted in Security, Windows | Tagged , , | Leave a comment

SentinelLabs finds three vulnerabilities in Oracle VirtualBox

[German]Security researchers from SentinelLabs have taken a closer look at Oracle's virtualization solution Virtualbox, which runs on Windows, macOS and Linux. They found three vulnerabilities in the virtualization tool. A vulnerability in Oracle VM VirtualBox allows program takeover and denial-of-service … Continue reading

Posted in Security, Virtualization | Tagged , | Leave a comment

Printjack: Security researchers warn against attacks on printers

[German]Printers are widespread, even if the paperless office is the goal. Printers are networked, but rarely protected against attacks. People don't think the devices are really worth protecting. But in times of IoT and under the General Data Protection Regulation … Continue reading

Posted in devices, Security | Tagged , | Leave a comment

Security vulnerabilities in iDRAC8/9 software put Dell servers at risk

[German]Multiple vulnerabilities existed in the iDRAC8 and iDRAC9 management software used on Dell servers. The vulnerabilities allowed remote attackers to control the execution of processes and gain access to the underlying operating system via a stack buffer overflow flaw. Dell … Continue reading

Posted in Security | Tagged , | Leave a comment