IT-SECURITY: Difference between revisions

From osint.info
Jump to navigationJump to search
A (talk | contribs)
A (talk | contribs)
 
(21 intermediate revisions by the same user not shown)
Line 4: Line 4:
|-
|-
|Date||Source||Title||Tags
|Date||Source||Title||Tags
|-
|20220712||spiegel.de||[https://www.spiegel.de/politik/deutschland/plaene-von-spd-innenministerin-nancy-faeser-wie-deutschlands-cyberabwehr-offensiver-werden-soll-a-2976ada7-7b02-4c99-8bc6-0c4b47aac64a Pläne von Nancy Faeser: Wie Deutschlands Cyberabwehr offensiver werden soll]||[[IT-SECURITY]] / [[BSI]]
|-
|20220628||heise.de||[https://www.heise.de/news/Zero-Trust-Bund-will-bei-IT-Sicherheit-niemandem-mehr-vertrauen-7156348.html Zero Trust: Bund will bei IT-Sicherheit niemandem mehr vertrauen / Das Innenministerium plädiert im Kampf gegen Schläfersoftware für einen Paradigmenwechsel. Laut Außenressort hat Russland die Hunde von der Kette gelassen.]||[[BMI]] / [[IT-SECURITY]]
|-
|20201215||zdnet.com||[https://www.zdnet.com/article/academics-turn-ram-into-wifi-cards-to-steal-data-from-air-gapped-systems/ Academics turn RAM into Wi-Fi cards to steal data from air-gapped systems - AIR-FI technique can send stolen data at speeds of up to 100 b/s to Wi-Fi receivers at a distance of a few meters.]||[[IT-SECURITY]]
|-
|20190513||meltingasphalt.com||[https://www.meltingasphalt.com/interactive/going-critical/ Going Critical]||[[IT SECURITY]]
|-
|20190227||zerohegde.com||[https://www.zerohedge.com/news/2019-02-26/russia-has-fastest-hackers Russia Has The Fastest Hackers]||[[IT SECURITY]]
|-
|20190110||spiegel.de||[http://www.spiegel.de/netzwelt/web/daten-leak-sechs-lehren-a-1247370.html Nach der großen Aufregung Sechs Lehren aus dem Daten-Leak]||[[BUNDESTAG]] / [[PRIVACY]] / [[IT SECURITY]]
|-
|20181111||spiegel.de||[http://www.spiegel.de/netzwelt/netzpolitik/cyber-security-cluster-bonn-bsi-bundeswehr-und-telekom-gruenden-verein-a-1237842.html Bündnis für IT-Sicherheit "Armee der Guten" gegen die Hacker]||[[IT SECURITY]]
|-
|20180104||spiegel.de||[http://www.spiegel.de/netzwelt/gadgets/spectre-und-meltdown-die-wichtigsten-antworten-zu-den-schwachstellen-in-prozessoren-a-1186193.html Schwachstellen in Prozessoren Gespenstische Unsicherheit]||[[IT SECURITY]]
|-
|20180104||spiegel.de||[http://www.spiegel.de/netzwelt/netzpolitik/intel-arm-chip-hersteller-arbeiten-an-loesung-fuer-sicherheitsluecke-a-1186116.html Geräte weltweit betroffen Neue Sicherheitslücken - Chiphersteller arbeiten an Lösung]||[[IT SECURITY]]
|-
|20180103||googleprojectzero.blogspot.de||[https://googleprojectzero.blogspot.de/2018/01/reading-privileged-memory-with-side.html Reading privileged memory with a side-channel ]||[[IT SECURITY]]
|-
|20170408||newsweek.com||[http://www.newsweek.com/privacy-experts-cia-americans-open-cyber-attacks-580659 Tech & Science: Privacy Experts Say CIA Left Americans Open to Cyber Attacks]||[[IT SECURITY]] / [[CIA]] / [[US]] / [[WIKILEAKS]]
|-
|20170408||economist.com||[http://www.economist.com/news/science-and-technology/21720268-consequences-pile-up-things-are-starting-improve-computer-security Why everything is hackableComputer security is broken from top to bottom]||[[IT SECURITY]]
|-
|20160531||heise.de||[http://www.heise.de/newsticker/meldung/PornHub-Sicherheitsforscher-sollten-gluecklich-sein-3223501.html PornHub: "Sicherheitsforscher sollten glücklich sein"]||[[IT SECURITY]] / [[PORNHUB]]
|-
|20151208||spiegel.de||[http://www.spiegel.de/netzwelt/netzpolitik/cyber-gesetz-eu-kommission-einigt-sich-auf-nis-richtlinie-a-1066642.html NIS-Richtlinie: EU-Kommission einigt sich auf neues Cyber-Gesetz]||[[EU]] / [[IT SECURITY]]
|-
|20150613||spiegel.de||[http://www.spiegel.de/netzwelt/netzpolitik/it-sicherheitsgesetz-was-sie-wissen-sollten-a-1038557.html Neues IT-Sicherheitsgesetz: So sollen Firmen auf Hackerangriffe reagieren]||[[IT SECURITY]] / [[DE]]
|-
|20150311||spiegel.de||[http://www.spiegel.de/netzwelt/netzpolitik/it-sicherheit-ministerium-stellt-180-millionen-euro-bereit-a-1023004.html IT-Sicherheit: Forschungsministerium will 180 Millionen Euro investieren]||[[IT SECURITY]] / [[DE]]
|-
|20140529||theguardian.com||[http://www.theguardian.com/technology/2014/may/29/us-cybercrime-laws-security-researchers US cybercrime laws being used to target security researchers - Security researchers say they have been threatened with indictment for their work investigating internet vulnerabilities]||[[US]] / [[IT SECURITY]] / [[CFAA]]
|-
|20131121||spiegel.de||[http://www.spiegel.de/netzwelt/web/internetsicherheit-28-prozent-der-deutschen-sind-im-netz-schutzlos-a-934824.html Internetsicherheit: 28 Prozent der Deutschen sind im Netz schutzlos]||[[IT SECURITY]]
|-
|-
|20130914||economist.com||[http://www.economist.com/news/leaders/21586345-covertly-weakening-security-entire-internet-make-snooping-easier-bad Internet snooping: Backdoor dealings - Covertly weakening the security of the entire internet to make snooping easier is a bad idea]||[[NSA]] / [[IT SECURITY]]
|20130914||economist.com||[http://www.economist.com/news/leaders/21586345-covertly-weakening-security-entire-internet-make-snooping-easier-bad Internet snooping: Backdoor dealings - Covertly weakening the security of the entire internet to make snooping easier is a bad idea]||[[NSA]] / [[IT SECURITY]]
|-
|-
|20130906||theguardian.com||[http://www.theguardian.com/world/2013/sep/05/nsa-how-to-remain-secure-surveillance NSA surveillance: A guide to staying secure - The NSA has huge capabilities – and if it wants in to your computer, it's in. With that in mind, here are five ways to stay safe]||[[NSA]] / [[IT SECURITY]]
|20130906||theguardian.com||[http://www.theguardian.com/world/2013/sep/05/nsa-how-to-remain-secure-surveillance NSA surveillance: A guide to staying secure - The NSA has huge capabilities – and if it wants in to your computer, it's in. With that in mind, here are five ways to stay safe]||[[NSA]] / [[IT SECURITY]]
|-
|20130905||nextgov.com||[http://www.nextgov.com/cybersecurity/2013/09/industry-backlash-against-surveillance-jeopardizes-cybersecurity/69940/?oref=ng-HPtopstory INDUSTRY BACKLASH AGAINST SURVEILLANCE JEOPARDIZES CYBERSECURITY]||[[IT SECURITY]] / [[NSA]]
|-
|-
|20130830||spiegel.de||[http://www.spiegel.de/netzwelt/netzpolitik/nsa-spaehaffaere-wie-snowden-zugriff-auf-die-geheimdokumente-bekam-a-919433.html Spähaffäre: Wie leicht Edward Snowden die NSA knacken konnte]||[[IT SECURITY]] / [[NSA]] /  [[SNOWDEN, EDWARD]]
|20130830||spiegel.de||[http://www.spiegel.de/netzwelt/netzpolitik/nsa-spaehaffaere-wie-snowden-zugriff-auf-die-geheimdokumente-bekam-a-919433.html Spähaffäre: Wie leicht Edward Snowden die NSA knacken konnte]||[[IT SECURITY]] / [[NSA]] /  [[SNOWDEN, EDWARD]]
Line 24: Line 62:
|-
|-
|}
|}
= Resources =
* https://twitter.com/bumblebike/status/832394003492564993


[[Category:Issues]]
[[Category:Issues]]

Latest revision as of 08:32, 13 July 2022

Articles

Date Source Title Tags
20220712 spiegel.de Pläne von Nancy Faeser: Wie Deutschlands Cyberabwehr offensiver werden soll IT-SECURITY / BSI
20220628 heise.de Zero Trust: Bund will bei IT-Sicherheit niemandem mehr vertrauen / Das Innenministerium plädiert im Kampf gegen Schläfersoftware für einen Paradigmenwechsel. Laut Außenressort hat Russland die Hunde von der Kette gelassen. BMI / IT-SECURITY
20201215 zdnet.com Academics turn RAM into Wi-Fi cards to steal data from air-gapped systems - AIR-FI technique can send stolen data at speeds of up to 100 b/s to Wi-Fi receivers at a distance of a few meters. IT-SECURITY
20190513 meltingasphalt.com Going Critical IT SECURITY
20190227 zerohegde.com Russia Has The Fastest Hackers IT SECURITY
20190110 spiegel.de Nach der großen Aufregung Sechs Lehren aus dem Daten-Leak BUNDESTAG / PRIVACY / IT SECURITY
20181111 spiegel.de Bündnis für IT-Sicherheit "Armee der Guten" gegen die Hacker IT SECURITY
20180104 spiegel.de Schwachstellen in Prozessoren Gespenstische Unsicherheit IT SECURITY
20180104 spiegel.de Geräte weltweit betroffen Neue Sicherheitslücken - Chiphersteller arbeiten an Lösung IT SECURITY
20180103 googleprojectzero.blogspot.de Reading privileged memory with a side-channel IT SECURITY
20170408 newsweek.com Tech & Science: Privacy Experts Say CIA Left Americans Open to Cyber Attacks IT SECURITY / CIA / US / WIKILEAKS
20170408 economist.com Why everything is hackableComputer security is broken from top to bottom IT SECURITY
20160531 heise.de PornHub: "Sicherheitsforscher sollten glücklich sein" IT SECURITY / PORNHUB
20151208 spiegel.de NIS-Richtlinie: EU-Kommission einigt sich auf neues Cyber-Gesetz EU / IT SECURITY
20150613 spiegel.de Neues IT-Sicherheitsgesetz: So sollen Firmen auf Hackerangriffe reagieren IT SECURITY / DE
20150311 spiegel.de IT-Sicherheit: Forschungsministerium will 180 Millionen Euro investieren IT SECURITY / DE
20140529 theguardian.com US cybercrime laws being used to target security researchers - Security researchers say they have been threatened with indictment for their work investigating internet vulnerabilities US / IT SECURITY / CFAA
20131121 spiegel.de Internetsicherheit: 28 Prozent der Deutschen sind im Netz schutzlos IT SECURITY
20130914 economist.com Internet snooping: Backdoor dealings - Covertly weakening the security of the entire internet to make snooping easier is a bad idea NSA / IT SECURITY
20130906 theguardian.com NSA surveillance: A guide to staying secure - The NSA has huge capabilities – and if it wants in to your computer, it's in. With that in mind, here are five ways to stay safe NSA / IT SECURITY
20130905 nextgov.com INDUSTRY BACKLASH AGAINST SURVEILLANCE JEOPARDIZES CYBERSECURITY IT SECURITY / NSA
20130830 spiegel.de Spähaffäre: Wie leicht Edward Snowden die NSA knacken konnte IT SECURITY / NSA / SNOWDEN, EDWARD
20130830 theregiser.co.uk NSA: NOBODY could stop Snowden – he was A SYSADMIN - Virtually unfettered access blew sensitive docs wide open IT SECURITY / NSA / SNOWDEN, EDWARD
20130623 nytimes.com N.S.A. Leak Puts Focus on System Administrators NSA / IT SECURITY
20121130 bangkokpost.com COMPUTER CRIME: Ministries seek to avert cyber security 'crisis' IT SECURITY / TH
20.09.2012 spiegel.de Erhöhte Risikostufe: US-Behörde warnt vor Cyber-Angriffen auf Banken IT SECURITY FS-ISAC
26.07.2012 spiegel.de Sicherheitskonferenz Black Hat: Wo Hacker und Firmen Frieden schließen IT SECURITY
20.07.2012 afp.com Obama warns of cyber threats to US IT SECURITY

Resources