Date |
Source |
Title |
Tags
|
20201215 |
zdnet.com |
Academics turn RAM into Wi-Fi cards to steal data from air-gapped systems - AIR-FI technique can send stolen data at speeds of up to 100 b/s to Wi-Fi receivers at a distance of a few meters. |
IT-SECURITY
|
20190513 |
meltingasphalt.com |
Going Critical |
IT SECURITY
|
20190227 |
zerohegde.com |
Russia Has The Fastest Hackers |
IT SECURITY
|
20190110 |
spiegel.de |
Nach der großen Aufregung Sechs Lehren aus dem Daten-Leak |
BUNDESTAG / PRIVACY / IT SECURITY
|
20181111 |
spiegel.de |
Bündnis für IT-Sicherheit "Armee der Guten" gegen die Hacker |
IT SECURITY
|
20180104 |
spiegel.de |
Schwachstellen in Prozessoren Gespenstische Unsicherheit |
IT SECURITY
|
20180104 |
spiegel.de |
Geräte weltweit betroffen Neue Sicherheitslücken - Chiphersteller arbeiten an Lösung |
IT SECURITY
|
20180103 |
googleprojectzero.blogspot.de |
Reading privileged memory with a side-channel |
IT SECURITY
|
20170408 |
newsweek.com |
Tech & Science: Privacy Experts Say CIA Left Americans Open to Cyber Attacks |
IT SECURITY / CIA / US / WIKILEAKS
|
20170408 |
economist.com |
Why everything is hackableComputer security is broken from top to bottom |
IT SECURITY
|
20160531 |
heise.de |
PornHub: "Sicherheitsforscher sollten glücklich sein" |
IT SECURITY / PORNHUB
|
20151208 |
spiegel.de |
NIS-Richtlinie: EU-Kommission einigt sich auf neues Cyber-Gesetz |
EU / IT SECURITY
|
20150613 |
spiegel.de |
Neues IT-Sicherheitsgesetz: So sollen Firmen auf Hackerangriffe reagieren |
IT SECURITY / DE
|
20150311 |
spiegel.de |
IT-Sicherheit: Forschungsministerium will 180 Millionen Euro investieren |
IT SECURITY / DE
|
20140529 |
theguardian.com |
US cybercrime laws being used to target security researchers - Security researchers say they have been threatened with indictment for their work investigating internet vulnerabilities |
US / IT SECURITY / CFAA
|
20131121 |
spiegel.de |
Internetsicherheit: 28 Prozent der Deutschen sind im Netz schutzlos |
IT SECURITY
|
20130914 |
economist.com |
Internet snooping: Backdoor dealings - Covertly weakening the security of the entire internet to make snooping easier is a bad idea |
NSA / IT SECURITY
|
20130906 |
theguardian.com |
NSA surveillance: A guide to staying secure - The NSA has huge capabilities – and if it wants in to your computer, it's in. With that in mind, here are five ways to stay safe |
NSA / IT SECURITY
|
20130905 |
nextgov.com |
INDUSTRY BACKLASH AGAINST SURVEILLANCE JEOPARDIZES CYBERSECURITY |
IT SECURITY / NSA
|
20130830 |
spiegel.de |
Spähaffäre: Wie leicht Edward Snowden die NSA knacken konnte |
IT SECURITY / NSA / SNOWDEN, EDWARD
|
20130830 |
theregiser.co.uk |
NSA: NOBODY could stop Snowden – he was A SYSADMIN - Virtually unfettered access blew sensitive docs wide open |
IT SECURITY / NSA / SNOWDEN, EDWARD
|
20130623 |
nytimes.com |
N.S.A. Leak Puts Focus on System Administrators |
NSA / IT SECURITY
|
20121130 |
bangkokpost.com |
COMPUTER CRIME: Ministries seek to avert cyber security 'crisis' |
IT SECURITY / TH
|
20.09.2012 |
spiegel.de |
Erhöhte Risikostufe: US-Behörde warnt vor Cyber-Angriffen auf Banken |
IT SECURITY FS-ISAC
|
26.07.2012 |
spiegel.de |
Sicherheitskonferenz Black Hat: Wo Hacker und Firmen Frieden schließen |
IT SECURITY
|
20.07.2012 |
afp.com |
Obama warns of cyber threats to US |
IT SECURITY
|