Security hole

What is a firewall?

The term firewall appears very often in the context of corporate IT security. But what exactly is a firewall and what are the different types? So that you too can use this IT security tool correctly, we explain everything about the firewall in this article. What is a firewall? In … continue reading

Bar association affected by ransomware – perpetrators demand ransom!

The Bar Association’s electronic lawyer mailbox (BeA) has apparently fallen victim to a ransomware attack. A misconfigured database now allowed the attackers to demand ransomware, among other things. Bar association hit by ransomware 2 weeks ago The news website Golem already reported about 2 weeks ago that the information page … continue reading

Bluetooth security vulnerability – BLURtooth is dangerous for Bluetooth 4.2 to 5.0!

A new Bluetooth security vulnerability has been discovered by the organization behind the Bluetooth wireless technology. All devices using Bluetooth versions 4.2 to 5.0 are affected by this vulnerability. A feature in Bluetooth version 5.1 can be used to ensure that this device is not vulnerable to the discovered vulnerability.

continue reading

WhatsApp failure due to unreadable message!

The popular Messenger WhatsApp is frequently featured in our blog posts. In today’s blog post, we discuss a WhatsApp failure that could cause the app to crash and require reinstallation. This WhatsApp vulnerability is worth mentioning because it can be triggered by an unreadable message. How this message looks like and how you can protect yourself from this attack is explained in this article.

continue reading

Cyber security in shipping – BSI warns!

Digitization affects almost all industries. This includes the entire shipping and logistics industry that goes hand in hand with it. A large and costly example of this is the ransomware wave from 2017, when cyber security was affected by the malware “NotPetya” from many logistics companies and shipping lines in the shipping industry, and lost many millions as a result. Now the German Federal Office for Information Security has published a guide on how to improve IT security in this industry.

continue reading

Security gap in learning platform Mebis!

Learning platforms get in Covid19 times more and more attention and win strongly at users. However, not all of these platforms are secure and protect the users’ data sufficiently. This is also the case with the platform Mebis, which was developed by the Bavarian Ministry of Culture. A group of hackers has now published an article in which several vulnerabilities are mentioned that are contained in the Mebis platform.

continue reading

Mailto-Link can be exploited to grab sensitive files!

Email is still the main means of communication when you are in business. So-called mailto links ensure that the default email program automatically opens and an email with a predefined sender appears. Researchers of the Ruhr University Bochum have now discovered that in such links not only the recipient can be set, but also attachments can be defined.

continue reading

GlueBall security gap was only closed after 2 years!

A security hole that has been known since 2018 has now been closed. This vulnerability was called GlueBall by the two discoverers and was given the rating “Important” by Microsoft after it was ignored for 2 years.

continue reading

Instagram Security Tool Pysa – Facebook publishes Sourcecode

In order to check their own software for security relevant errors and security holes, the developers of Instagram use the security tool Pysa (this is the name it unfavorably shares with ransomware). The source code for this tool has now been disclosed and made freely available to Facebook.

continue reading

Unc0ver: Jailbreak for iOS 11 to 13.5 available!

Since Saturday, a non-permanent and fully reversible jailbreak is available for iOS 11 to 13.5. The possibility to break out of Apple’s operating system is based on a zero-day gap which is at home in the kernel. The developers are positive that the jailbreak also works with iOS 14. With the release of the jailbreak the developers renounce the participation in a bug bounty program.

continue reading