Data leak: An unprotected Comcast developer database was public viewable

[German]American cable and Internet giant Comcast has been hit by a data leak. An unprotected database of the developers with 1.5 billion data records and a lot of internal information was accessible to third parties via the Internet.

Continue reading

Posted in Security | Tagged | Leave a comment

Warning: 0-day exploit used to attack SonicWall SMA 100

[German]SonicWall  is currently warning of a 0-day exploit that is being actively exploited to attack SonicWall Secure Mobile Access devices in the SMA 100 series. A patch has been announced by SonicWall for February 2, 2021.

Continue reading

Posted in Security | Tagged | Leave a comment

RansomExx ransomware group targets VMWare ESXi vulnerabilities

[German]A warning for administrators of VMWare ESXi systems. The RansomExx ransomware gang appears to be involved in several incidents where vulnerabilities in VMWare ESXi instances have been exploited to attack virtual machines and encrypt their virtual disks.

Continue reading

Posted in Security, Virtualization | Tagged , | Leave a comment

Skype for Business Online – shuts down on July 31, 2021

Skype[German]A small reminder for administrators and users in the business environment who are still using Skype for Business Online. This service will be shut down as scheduled on July 31, 2021 and then replaced by Microsoft Teams.

Continue reading

Posted in Software | Tagged | Leave a comment

Hints for HP Printer Firmware Downgrade

[German]In this blog post, I provide advice on how users who have been surprised by an automatic firmware upgrade on HP printers can get the devices back to the previous firmware, if necessary. This is helpful, if an unwanted HP firmware update blocks the use  of third-party ink or toner cartridges on a printer. The article is a brief summary of hints given in various blog posts and the reader comments made there.

Continue reading

Posted in devices, Software | Tagged , , | 14 Comments

Why ISL Online: Critical factors when choosing a remote desktop solution

[Sponsored Post]In the rapidly evolving IT world, choosing the right remote desktop software is critical for organizations that value security, ease of use and reliability. One provider of secure remote access that has been on the market since 2001 is ISL Online, which presents some considerations for choosing such software below. More ...


Unmonitored Ghost account allowed Netfilim hackers to siphon off 1 month of data

[German]When it comes to computer security, the devil is often in the details. A deceased employee whose account still existed and was not monitored enabled a ransomware group to siphon off data from a system undetected for a month. But also involved were Cisco products with serious vulnerabilities that allowed the Netfilim group's attackers to access the Active Directory structures of the corporate network via an administrator account.

Continue reading

Posted in Security | Tagged | Leave a comment

Chromebook demand raised to new record in COVID-19 pandemic

[German]In the coronavirus pandemic, demand for computer systems for homeschooling increased. The latest figures from Canalsys for Q4 2020 show a massive increase in Chromebook sales.

Continue reading

Posted in devices | Tagged | Leave a comment

Windows 10: Windows Feature Experience Pack Insides

[German]Microsoft has been providing since 2020 so-called Windows Feature Experience Packs for Windows 10 (and Windows 10X). In the blog post I would like to summarize some information around this topic.

Continue reading

Posted in Windows | Tagged | Leave a comment

Windows 10: Secure Boot Insides on UEFI Systems

[German]Microsoft is pushing UEFI and Secure Boot for Windows 10 systems. Maybe some insides about Secure Boot on UEFI systems under Windows 10 (64 bit) are of interest.

Continue reading

Posted in Security, Windows | Tagged , | 2 Comments

Details of Emotet uninstallation by law enforcement officials

[German]Emotet malware will be automatically removed from Windows machines on April 25, 2021. This is done through a cleanup feature that International Law Enforcement installs on infected systems. Now there are some details about what happens during the uninstall process.

Continue reading

Posted in Security | Tagged | Leave a comment