The largest Internet node in the world is located in Frankfurt. The umbrella company DE-CIX (Deutsche Commercial Internet Exchange) operates this node and has now decided to build a small version of the DE-CIX node within the Ruhr area with three providers from the Ruhr area. This small version is called Ruhr-CIX and could create new opportunities for many companies but also private persons from the Ruhr Area.
M.Sc. Jan Hörnemann
WhatsApp failure due to unreadable message!
The popular Messenger WhatsApp is frequently featured in our blog posts. In today’s blog post, we discuss a WhatsApp failure that could cause the app to crash and require reinstallation. This WhatsApp vulnerability is worth mentioning because it can be triggered by an unreadable message. How this message looks like and how you can protect yourself from this attack is explained in this article.
Pentest Tools #2 – gobuster
Penetration tests are one of the services offered by AWARE7 GmbH. We search for security holes in web applications or other systems and document them professionally. In our weekly blog series we present some tools that we use in most penetration tests. This week’s pentest tool #2 is gobuster.
Cyber security in shipping – BSI warns!
Digitization affects almost all industries. This includes the entire shipping and logistics industry that goes hand in hand with it. A large and costly example of this is the ransomware wave from 2017, when cyber security was affected by the malware “NotPetya” from many logistics companies and shipping lines in the shipping industry, and lost many millions as a result. Now the German Federal Office for Information Security has published a guide on how to improve IT security in this industry.
Facebook continues to fight against the spread of fake news!
The fight against fake news is still the big and important one for the big social networks. Facebook has now integrated a change in the App Messenger to ensure that fake news cannot spread so quickly. However, this change has been integrated into the popular Messenger WhatsApp for more than 1.5 years.
Bomb Threat – A new wave of blackmail mails is in circulation!
Already in the past we had to report about blackmail mails that are currently in circulation. A new and very current campaign is a blackmail email that claims that without the ransom money a bomb will explode.
Protective measures in the year of the hackers – methods for your own protection!
2020 is a very exciting year so far from the perspective of IT security. Due to the Corona pandemic, many employees had to work in the home office, or still do. This partial rapid step towards the “remote office” has created many security gaps that can be exploited by attackers. We have looked at various protective measures against hackers to make your systems more secure. We look at the step before the attack up to the reactive measures when an attack is in full swing.
Pentest-Tools #1 – dirbuster
Eine der Kernkompetenzen der AWARE7 GmbH sind die Penetrationstests. In diesen Tests geht es darum Sicherheitslücken in bspw. Web Applikationen zu finden. Bei solchen Tests werden diverse Pentest-Tools verwendet um Sicherheitslücken oder andere Schwachstellen zu finden. In unserer neuen Blog-Reihe werden wir wöchentlich ein Tool vorstellen, mit dem wir in unseren Pentest arbeiten. Unser Pentest-Tool #1 ist dirbuster.
Apple certified known malware!
Actually, the purpose of Apple’s notarization service is to protect Mac users from malware. But now it has become known that exactly this notarization service has certified software that contained the well-known malware “Shlayer”.
Trust Model or the Zero Trust Model – How should IT security be provided?
Due to the current effects of the COVID19 pandemic, many people are now thinking more about control. This partially awakened loss of control is not only in the health care system, but in many areas of society. This also includes IT systems, because especially the increasing home office creates new dangers that attackers can shamelessly exploit. In order to guarantee security we need models, and here there are two main opponents, the trust or zero trust model!