Translate
Blogs
Links
Social networks
Awards
Sponsors
(Paypal-Donations)
Tag Archives: Security
Vulnerabilities in connected cars allow remote access at Honda, Nissan, Infiniti, Acura, etc.
[German]Modern vehicles are equipped with a lot of electronics and software so that they can access various functions as conveniently as possible. However, security researchers have identified serious weaknesses in vehicles from Honda, Nissan, Infiniti and Acura. In the U.S., … Continue reading
Ransomware attack responsible for Rackspace Exchange instance outage in Dec. 2022
[German]At the beginning of December 2022, there was an outage of the Exchange instances of the US provider Rackspace that lasted several days. Now the company has confirmed that a ransomware attack on its servers was the reason for this … Continue reading
Details of the vulnerability in NETGEAR Nighthawk WiFi6 Router (RAX30 AX2400)
[German]Netgear has released a last-minute patch to close a vulnerability in the firmware of the Nighthawk WiFi6 router (RAX30 AX2400) on December 1, 2022. A misconfiguration allowed attackers in router firmware prior to version V1.0.9.90 to communicate with these devices … Continue reading
Vulnerability in Citrix Workspace App for Windows allows password theft
[German]Citrix is warning users since September 2022 about a vulnerability in its Citrx Workspace app. There are reports that Citrix SSON stored passwords in the process memory can be retrieved at the user level. Updates are provided in the December … Continue reading
LastPass customer data accessed after cloud storage service hack (Nov. 2022)
[German]LastPass informed its customers a few hours ago that "unusual activity" was recently detected in a third-party cloud storage service. This cloud storage service is currently used by both LastPass and its subsidiary GoTo. However, those who use the LastPass … Continue reading
Why ISL Online: Critical factors when choosing a remote desktop solution
[Sponsored Post]In the rapidly evolving IT world, choosing the right remote desktop software is critical for organizations that value security, ease of use and reliability. One provider of secure remote access that has been on the market since 2001 is ISL Online, which presents some considerations for choosing such software below. More ...
Anchor Eufy Door Bell security cameras with vulnerabilities, data transferred to the cloud, Homebase 2 also has vulnerabilities
[German]Anker Eufy Door Bell security cameras are also sold in Germany. A security researcher has now found several security vulnerabilities in the firmware of the Eufy cameras. These transfer user images and facial recognition data to the cloud without the … Continue reading
Irish DPC fines Meta/Facebook €265 million after data privacy incident
[German]The Irish Data Protection Commission (DPC) has imposed a 265 million fine on Meta, Facebook's parent company. This follows a data protection incident in which millions of Facebook users' data was pulled from the company's systems via tools until September … Continue reading
Dell, HP, Lenovo uses outdated OpenSSL versionen in UEFI
[German]A firmware analysis by security vendor Binarly has revealed that devices from Dell, HP and Lenovo use outdated versions of the OpenSSL encryption library in their UEFI implementations. This poses a risk, as encryption could be broken and the update … Continue reading
Hackers penetrate energy systems via outdated Boa web server of IoT components
[German]Many vendors use outdated software components in their IoT components. Microsoft has now presented a case in which a web server that was discontinued in 2005 was misused to penetrate the systems of Indian power grid via vulnerabilities. The background … Continue reading
WhatsApp leak: Nearly 500 million user data offered in underground forum (Nov. 2022)
[German]On November 16, 2022, an unknown person offered a huge data set with approximately 487 million WhatsApp user data in an underground forum. The data set allegedly contains WhatsApp user data from 84 countries. The leak contains also mobile phone … Continue reading


