Difference between revisions of "IT-SECURITY"
From OSINT.INFO
Jump to navigationJump to search(20 intermediate revisions by the same user not shown) | |||
Line 4: | Line 4: | ||
|- | |- | ||
|Date||Source||Title||Tags | |Date||Source||Title||Tags | ||
+ | |- | ||
+ | |20220712||spiegel.de||[https://www.spiegel.de/politik/deutschland/plaene-von-spd-innenministerin-nancy-faeser-wie-deutschlands-cyberabwehr-offensiver-werden-soll-a-2976ada7-7b02-4c99-8bc6-0c4b47aac64a Pläne von Nancy Faeser: Wie Deutschlands Cyberabwehr offensiver werden soll]||[[IT-SECURITY]] / [[BSI]] | ||
+ | |- | ||
+ | |20220628||heise.de||[https://www.heise.de/news/Zero-Trust-Bund-will-bei-IT-Sicherheit-niemandem-mehr-vertrauen-7156348.html Zero Trust: Bund will bei IT-Sicherheit niemandem mehr vertrauen / Das Innenministerium plädiert im Kampf gegen Schläfersoftware für einen Paradigmenwechsel. Laut Außenressort hat Russland die Hunde von der Kette gelassen.]||[[BMI]] / [[IT-SECURITY]] | ||
+ | |- | ||
+ | |20201215||zdnet.com||[https://www.zdnet.com/article/academics-turn-ram-into-wifi-cards-to-steal-data-from-air-gapped-systems/ Academics turn RAM into Wi-Fi cards to steal data from air-gapped systems - AIR-FI technique can send stolen data at speeds of up to 100 b/s to Wi-Fi receivers at a distance of a few meters.]||[[IT-SECURITY]] | ||
+ | |- | ||
+ | |20190513||meltingasphalt.com||[https://www.meltingasphalt.com/interactive/going-critical/ Going Critical]||[[IT SECURITY]] | ||
+ | |- | ||
+ | |20190227||zerohegde.com||[https://www.zerohedge.com/news/2019-02-26/russia-has-fastest-hackers Russia Has The Fastest Hackers]||[[IT SECURITY]] | ||
+ | |- | ||
+ | |20190110||spiegel.de||[http://www.spiegel.de/netzwelt/web/daten-leak-sechs-lehren-a-1247370.html Nach der großen Aufregung Sechs Lehren aus dem Daten-Leak]||[[BUNDESTAG]] / [[PRIVACY]] / [[IT SECURITY]] | ||
+ | |- | ||
+ | |20181111||spiegel.de||[http://www.spiegel.de/netzwelt/netzpolitik/cyber-security-cluster-bonn-bsi-bundeswehr-und-telekom-gruenden-verein-a-1237842.html Bündnis für IT-Sicherheit "Armee der Guten" gegen die Hacker]||[[IT SECURITY]] | ||
+ | |- | ||
+ | |20180104||spiegel.de||[http://www.spiegel.de/netzwelt/gadgets/spectre-und-meltdown-die-wichtigsten-antworten-zu-den-schwachstellen-in-prozessoren-a-1186193.html Schwachstellen in Prozessoren Gespenstische Unsicherheit]||[[IT SECURITY]] | ||
+ | |- | ||
+ | |20180104||spiegel.de||[http://www.spiegel.de/netzwelt/netzpolitik/intel-arm-chip-hersteller-arbeiten-an-loesung-fuer-sicherheitsluecke-a-1186116.html Geräte weltweit betroffen Neue Sicherheitslücken - Chiphersteller arbeiten an Lösung]||[[IT SECURITY]] | ||
+ | |- | ||
+ | |20180103||googleprojectzero.blogspot.de||[https://googleprojectzero.blogspot.de/2018/01/reading-privileged-memory-with-side.html Reading privileged memory with a side-channel ]||[[IT SECURITY]] | ||
+ | |- | ||
+ | |20170408||newsweek.com||[http://www.newsweek.com/privacy-experts-cia-americans-open-cyber-attacks-580659 Tech & Science: Privacy Experts Say CIA Left Americans Open to Cyber Attacks]||[[IT SECURITY]] / [[CIA]] / [[US]] / [[WIKILEAKS]] | ||
+ | |- | ||
+ | |20170408||economist.com||[http://www.economist.com/news/science-and-technology/21720268-consequences-pile-up-things-are-starting-improve-computer-security Why everything is hackableComputer security is broken from top to bottom]||[[IT SECURITY]] | ||
+ | |- | ||
+ | |20160531||heise.de||[http://www.heise.de/newsticker/meldung/PornHub-Sicherheitsforscher-sollten-gluecklich-sein-3223501.html PornHub: "Sicherheitsforscher sollten glücklich sein"]||[[IT SECURITY]] / [[PORNHUB]] | ||
+ | |- | ||
+ | |20151208||spiegel.de||[http://www.spiegel.de/netzwelt/netzpolitik/cyber-gesetz-eu-kommission-einigt-sich-auf-nis-richtlinie-a-1066642.html NIS-Richtlinie: EU-Kommission einigt sich auf neues Cyber-Gesetz]||[[EU]] / [[IT SECURITY]] | ||
+ | |- | ||
+ | |20150613||spiegel.de||[http://www.spiegel.de/netzwelt/netzpolitik/it-sicherheitsgesetz-was-sie-wissen-sollten-a-1038557.html Neues IT-Sicherheitsgesetz: So sollen Firmen auf Hackerangriffe reagieren]||[[IT SECURITY]] / [[DE]] | ||
+ | |- | ||
+ | |20150311||spiegel.de||[http://www.spiegel.de/netzwelt/netzpolitik/it-sicherheit-ministerium-stellt-180-millionen-euro-bereit-a-1023004.html IT-Sicherheit: Forschungsministerium will 180 Millionen Euro investieren]||[[IT SECURITY]] / [[DE]] | ||
+ | |- | ||
+ | |20140529||theguardian.com||[http://www.theguardian.com/technology/2014/may/29/us-cybercrime-laws-security-researchers US cybercrime laws being used to target security researchers - Security researchers say they have been threatened with indictment for their work investigating internet vulnerabilities]||[[US]] / [[IT SECURITY]] / [[CFAA]] | ||
+ | |- | ||
+ | |20131121||spiegel.de||[http://www.spiegel.de/netzwelt/web/internetsicherheit-28-prozent-der-deutschen-sind-im-netz-schutzlos-a-934824.html Internetsicherheit: 28 Prozent der Deutschen sind im Netz schutzlos]||[[IT SECURITY]] | ||
|- | |- | ||
|20130914||economist.com||[http://www.economist.com/news/leaders/21586345-covertly-weakening-security-entire-internet-make-snooping-easier-bad Internet snooping: Backdoor dealings - Covertly weakening the security of the entire internet to make snooping easier is a bad idea]||[[NSA]] / [[IT SECURITY]] | |20130914||economist.com||[http://www.economist.com/news/leaders/21586345-covertly-weakening-security-entire-internet-make-snooping-easier-bad Internet snooping: Backdoor dealings - Covertly weakening the security of the entire internet to make snooping easier is a bad idea]||[[NSA]] / [[IT SECURITY]] | ||
Line 26: | Line 62: | ||
|- | |- | ||
|} | |} | ||
+ | |||
+ | = Resources = | ||
+ | |||
+ | * https://twitter.com/bumblebike/status/832394003492564993 | ||
[[Category:Issues]] | [[Category:Issues]] |