Menu
Cybersikkerhet
  • Forum
  • Nylige innlegg
  • Min Profil
    • Aktivitet
    • Konto
    • Abonnementer
  • Registrer
  • Logg inn
  • Logg ut
Cybersikkerhet

Forfatter: secdef

secdef.no will give breif exerps of security related news from all over the world, covering all aspects of cyber and tech security. None of the articles presented are made by secdef.no.

AndroidHits: Mobile Phone Security Measures You Haven’t Considered Yet

Posted on 06/01/201908/01/2019 by secdef

By Akhil G On Jan 3, 2019 Everyone is exposed to hacking including a phone user. Reports show that 67% of companies have experienced cyber-attacks as a result of the employees using their mobile phones to extract their company’s data. Google has also reported that more than 1.3 million of its accounts have been breached through android apps…

+

Itsfoss.com: Kali Linux Review: Not Everyone’s Cup of Tea

Posted on 06/01/2019 by secdef

Kali Linux Review: Not Everyone’s Cup of Tea Last updated June 24, 2018 By Sylvain Leroux 36 Comments Brief: In this review of Kali Linux, we try to answer regular questions like what is Kali Linux, what is the use of Kali Linux and whether beginners should use Kali Linux or not? Kali Linux has gained a lot of popularity…

+

mradford.com: Compiz: Ubuntu Desktop’s little known best friend

Posted on 05/01/201905/01/2019 by secdef

Skrevet: 2018-12-05 Kilde: https://code.mradford.com/  The default GNOME desktop in Ubuntu is functional, but also pretty unfulfilling. TL;DR Compiz can quickly get you the desktop you deserve: a desktop with a very high degree of customizability, on top of being faster than the default GNOME Shell, and (as far as I can tell) faster than Mac or Windows. The best part is…

+

Analytics India: When Open Source And Cyber Security Bonds: Kali Linux, The Go-To OS For Penetration Testing

Posted on 05/01/201905/01/2019 by secdef

HARSHAJIT SARMAH When we talk about hacking, the first thing comes to our mind is a guy in a hoodie who is involved in data fraud, identity theft, and maybe even cyber terrorism (thanks to Hollywood!) However, this is not the scenario all the time; not all hacking is necessarily the criminal, destructive act. There…

+

Motherboard: Gmail vs ProtonMail: Which is More Secure?

Posted on 04/01/201909/01/2019 by secdef

By Lorenzo Franceschi-Bicchierai | Oct 19 2017, 4:45pm Which email provider is more suited for the paranoid user? Revelations of broad NSA surveillance and the constant flurry of data breaches have led many of us to become more security conscious. There are now more options than ever to communicate securely with encrypted messaging apps, and security…

+

bb: Baseband vulnerability could mean undetectable, unblockable attacks on mobile phones

Posted on 03/01/201905/01/2019 by secdef

 / CORY DOCTOROW / 3:21 PM WED JUL 20, 2016 The baseband firmware in your phone is the outermost layer of software, the «bare metal» code that has to be implicitly trusted by the phone’s operating system and apps to work; a flaw in that firmware means that attackers can do scary things to your hone that the phone…

+

PC MAG: 10 Essential Steps for Protecting Your Identity

Posted on 28/12/201805/01/2019 by secdef

BY NEIL J. RUBENKING  Identity theft can be a real nightmare. Follow this simple advice to fend off the bad guys. Identity theft can have far-reaching consequences. You could lose access to your financial accounts, or find yourself with a surprise lien on your house. You might even end up under arrest. What can you do…

+

TechExplore: Security firm shows vulnerability of smartwatches to hacker attacks

Posted on 28/12/201805/01/2019 by secdef

by Bob Yirka , Tech Xplore Security and anti-virus maker Bitdefender has released a warning to smarthphone users who use peripherals such as smartwatches—they’re not as invulnerable as most people think, and in fact can be quite easily hacked. To prove their assertion, they filmed one of their engineers hacking into a smartwatch and released…

+

The Hacker News: Here’s How Hackers Could Have Spied On Your DJI Drone Account

Posted on 28/12/201805/01/2019 by secdef

Swati Khandelwal Cybersecurity researchers at Check Point today revealed details of a potential dangerous vulnerability in DJI Drone web app that could have allowed attackers access user accounts and synced sensitive information within it, including flight records, location, live video camera feed, and photos taken during a flight. Thought the vulnerability was discovered and responsibly…

+

TP: Baseband Zero Day Exposes Millions of Mobile Phones to Attack

Posted on 28/12/201805/01/2019 by secdef

Author:Tom Spring A previously undisclosed baseband vulnerability impacting Huawei smartphones, laptop WWAN modules and IoT components was revealed Thursday at the Infiltrate Conference. MIAMI—A previously undisclosed baseband vulnerability impacting Huawei smartphones, laptop WWAN modules and IoT components was revealed Thursday at the Infiltrate Conference by researcher Ralf-Phillip Weinmann, managing director at security firm Comsecuris. In…

+
  • Previous
  • 1
  • 2
  • 3
  • Next

Om sidene

secdef.no cybersikkerhet logo

Dette nettstedet publiserer deler av artikler fra hele verden innen IKT og cybersikkerhet. I tillegg har vi et diskusjonsforum. Ingen av artiklene er laget av secdef.no.

Avstemning

Hvilket operativsystem bruker du?

View Results

Loading ... Loading ...
  • Polls Archive

Kategorier

  • Droner (2)
  • Hacking (4)
  • Hardware (7)
  • ID-sikkerhet (5)
  • Mac (1)
  • Mobiltelefoni (8)
  • Nyheter (13)
  • Smartklokker (1)
  • Software (16)
  • Sosiale medier (2)
  • Telecom (1)
  • VPN (1)
  • WiFi/Bluetooth (3)

Annonse

Siste artikler

  • Motherboard: Criminals Are Tapping into the Phone Network Backbone to Empty Bank Accounts
  • Infographic: dataplugger
  • comparitech: Definitive WiFi Analyzer Guide Including the 20 Best Tools
  • The Verge: The best laptops from CES 2019
  • Geospatialworld.net: 2018Highlight: Five technologies that disrupted drone market
  • TechRadar: The Best VPN service 2019
  • Cnet: Over-the-air wireless charging will come to the smartphone

Kategorier

#cybersecurity

#cybersecurity

CryptoStaunchThe Crypto Staunch@CryptoStaunch·
5m

MetaMask Token - How to Add Or Send Custom Tokens | Link: https://t.co/cYipyS6gF9

#fintech #blockchain #crypto #cryptocurrency #business #cybersecurity #market #futures #finance Retweet

Reply on TwitterRetweet on TwitterLike on TwitterTwitter
CyberDomainCyberWarrior@CyberDomain·
8m

#CyberSecurity #Hacker This Machine Kills Secrets: Julian Assange, the Cypherpunks, and Their Fight to Empower Whistleblowers - https://t.co/Kjv7Xft5kY

Reply on TwitterRetweet on TwitterLike on TwitterTwitter
EdScoop_newsEdScoop News@EdScoop_news·
8m

Software flaw allows Stanford students to view Social Security numbers, applications of other students #cybersecurity https://t.co/eUZ2hpnqLE

Reply on TwitterRetweet on TwitterLike on TwitterTwitter
illumioIllumio@illumio·
9m

You are only as good as your team. Great tips from @TechRepublic on raising employee awareness for better #cybersecurity: https://t.co/EyseT503h1

Reply on TwitterRetweet on TwitterLike on TwitterTwitter
MyHackerNewsComMyHackerNewsCom@MyHackerNewsCom·
10m

Torrent Uploaded “CracksNow” Banned From Popular Torrent Sites
sudo update
#hackwarenews #myhackernews #cyber #hackers #informationsecurity #infosec #cybersecurity #hack #hacking #privacy https://t.co/YxDH3Xgj7D

Reply on TwitterRetweet on TwitterLike on TwitterTwitter
Load More...

:// Om nettsiden

Denne nettsiden gir deg smakebiter på artikler innen cybersikkerhet og IKT-sikkerhet. Artiklene er hentet fra inn og utland. Tips på hvordan du skal sikre mobilen, PC eller Mac, nettbrett, nettverk, sosiale medier kontoer med mer. Secdef.no er foreløpig en testside.

Om secdef.no

Dette nettstedet publiserer deler av artikler fra hele verden innen IKT og cybersikkerhet. I tillegg har vi et diskusjonsforum. Ingen av artiklene er laget av secdef.no.

©2019 Cybersikkerhet | WordPress Theme by Superb Themes
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.Accept Read More
Privacy & Cookies Policy