Blogs
Links
Archives
Categories
Social networks
Awards
Sponsors
(Paypal-Donations)Recent Comments
- David on Tor.exe: Microsoft Defender triggers an "Trojan:Win32/Malgent!MTB" alert
- guenni on Windows 11 22H2/23H2: September 2023 Preview Update KB5030310 forces shadow font on desktop icons
- EP on Edge 117.0.2045.35/36 (19. Sept. 2023)
- Nothankstextshadow on Windows 11 22H2/23H2: September 2023 Preview Update KB5030310 forces shadow font on desktop icons
- Ferdinand Meyer on Office 365: Sign in Error 1001
Meta
Recent Comments
- David on Tor.exe: Microsoft Defender triggers an "Trojan:Win32/Malgent!MTB" alert
- guenni on Windows 11 22H2/23H2: September 2023 Preview Update KB5030310 forces shadow font on desktop icons
- EP on Edge 117.0.2045.35/36 (19. Sept. 2023)
- Nothankstextshadow on Windows 11 22H2/23H2: September 2023 Preview Update KB5030310 forces shadow font on desktop icons
- Ferdinand Meyer on Office 365: Sign in Error 1001
Archives
Categories
Meta
Tag Archives: devices
TP-LINK TL-WR840N: Vulnerability allows stack buffer overflow DOS
There is a vulnerability in the firmware of the TP-Link router TP-LINK TL-WR840N that allows a remote attacker to perform a stack buffer overflow DOS attack. TP-Link does not want to publish a security advisory for this, but has made … Continue reading
Advertising
Nexx garage door remote controller: Vulnerability allows access for hackers
[German]Anyone who owns a Nexx home automation system and uses it to remotely control their garage doors now has a fat problem. A vulnerability in the Nexx remote control allows hackers to gain unauthorized access to the garage doors. They … Continue reading
How to find weak passwords in Active Directory and eliminate them with PowerShell
[Sponsored Post]Weak or compromised passwords are a known gateway for attackers. If you are able to identify which users in Active Directory (AD) are threatened by this, then PowerShell can help to remedy it. However, PowerShell scripts cannot eliminate basic AD deficits, other tools are needed for this. More ...
Security: DJI drones and it's AeroScope vulnerabilities
[German]Drones from the Chinese manufacturer DJI have vulnerabilities that allow third parties to read radio traffic and determine the location of the drone pilot. This vulnerability comes from a monitoring feature called AeroScope (DroneID), developed by the manufacturer for "law … Continue reading
Advertising
D-Link: End of support for mydlink Home and mydlink Baby Monitor Apps and Cloud Services (Dec. 30, 2022)
[German]Are you using D-Link products like the mydlink Baby Monitor or mydlink Home. Today, December 30, 2022, vendor D-Link will shut down certain cloud services. The aforementioned devices will then become electronic junk because their functionality will be lost. An … Continue reading
Anker's Eufy deletes privacy pledges – time to disable cameras?
[German]The Anker subsidiary Eufy seems to have removed statements regarding data privacy and the use of surveillance camera data from its documentation and corporate website. This was reported by The Verge, which had asked the provider about the matter. The … Continue reading
Advertising
USB-C port for mobile devices mandatory from December 28, 2024 in European Union
[German]The countdown from when the USB-C port becomes mandatory in European Union for mobile devices as a charging port has begun. The EU has set December 28, 2024 as the start date from which this obligation will apply. This implements … Continue reading
Anchor Eufy Door Bell security cameras with vulnerabilities, data transferred to the cloud, Homebase 2 also has vulnerabilities
[German]Anker Eufy Door Bell security cameras are also sold in Germany. A security researcher has now found several security vulnerabilities in the firmware of the Eufy cameras. These transfer user images and facial recognition data to the cloud without the … Continue reading
European Union decided on USB C charging cable as a standard
[German]The common European standard for charging cables for mobile devices, which is based on the USB-C interface, has been decided and can now come. Following the overwhelming approval of the European Parliament on October 4, 2022, the Council of EU … Continue reading
Advertising
Attention: Backdoor in TechLogix Networx Power Delivery Unit; Isolate devices from Internet and Patch it
[German]There is a serious vulnerability (backdoor) in the firmware of power delivery units from the US manufacturer Networx. In older versions (prior to version 2.0.2a ), the firmware does not perform authentication, i.e. it is possible to switch off the … Continue reading
HP computers: Six firmware vulnerabilities unpatched for a year
[German]There are six serious vulnerabilities in the firmware of HP systems for the business sector (notebooks, desktops, etc.) that have not been fixed by updates for a year. There are still no firmware updates for some HP enterprise systems, although … Continue reading