Norbert Kowallik

30 Added | 3 Magazines | 1 Like | 5 Following | @NorbertKowallik | Keep up with Norbert Kowallik on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Norbert Kowallik”

HTTPS Certificate Revocation is broken, and it’s time for some new tools | Ars Technica

Certificate Transparency and OCSP Must-Staple can't get here fast enough.<p>This article was originally published on Scott Helme's blog and is reprinted …

How to Browse the Web and Leave No Trace

On today’s web it’s hard to set a (digital) foot online without it attracting dozens of trackers and log entries, as companies look to learn …

Why You Really Need to Stop Using Public Wi-Fi

In today’s busy world, convenience seems to outweigh consequence, especially with how people use their mobile devices. Using free public Wi-Fi networks, for example, comes with any number of serious security risks, yet surveys show that the overwhelming majority of Americans do it anyway. In a …

Security | The Next Web

All stories in Security<p>Your bank is probably using phishing tactics on you<p>Have you ever received a phone call from your bank’s fraud department? A number appears on my phone that I don’t recognize, ...<p>Duncan Riach<p>Here's how to hack 40 websites in 7 minutes<p>Last summer I started learning about …

Security: Managing Hardware Restrictions via Group Policy

Security<p>Managing Hardware Restrictions via Group Policy<p>Jeremy Moskowitz<p>At a Glance:<p>Restricting hardware installations<br>• Restricting specific …

Meet PoisonTap, the $5 tool that ransacks password-protected computers | Ars Technica

The perils of leaving computers unattended is about to get worse.<p>The perils of leaving computers unattended just got worse, thanks to a newly …

Information Security

Changing IoT Passwords Won't Stop Attacks. Here's What Will.

The solution will take an industry-wide effort, it won't happen overnight, and the problem is not the users' fault!

Information Security

IE and Graphics head Microsoft's Patch Tuesday critical list

There's 15 flaw fixes covering 36 vulnerabilities in this month's patch bundle from Microsoft.<p>Microsoft's browsers need a lot of work – Internet …

Cujo is a firewall for the connected smart home network

“Cujo protects everything on your network,” the company’s CEO, Einaras Gravrock says, describing his product in the simplest terms ahead of its Disrupt NY launch this week. “Think of it as an immunity system for your network.”<p>The Cujo is surprisingly unassuming, a small plastic stump with light-up …

The next wave of cybercrime will come through your smart TV

Smart TVs are opening a new window of attack for cybercriminals, as the security defenses of the devices often lag far behind those of smartphones and desktop computers.<p>Running mobile operating systems such as Android, smart TVs present a soft target due to how to manufacturers are emphasizing …

Sicherheitslücke Smart Home - CHIP

Sicherheitslücke Smart Home (Partnerinhalt)<p>Smart-Home-Kits auf dem Prüfstand<p>Von Matthias Rößler, 25.02.2016<p><b>Smart-Home-Technik gehört die Zukunft.</b> …

Nine Computer Security Facts the Experts Really Wish You Knew

Every day, you hear about security flaws, viruses, and evil hacker gangs that could leave you destitute - or, worse, bring your country to its knees. …

Lenovo accused of compromising user security by installing adware on new PCs

Leading PC manufacturer shipped computers containing Superfish software that could leave users permanently open to attack when using public Wi-Fi network<p>Lenovo, the largest PC manufacturer in world, has been accused of fatally compromising user security by installing an adware application on all …

This Cybersecurity Medicine Might Be Tough To Swallow

Imagine you’re the CEO of a thriving company and you’ve been horrified by the news of the Sony hack, the Target breach and the litany of security issues that have plagued big companies in recent years. You swear you’re going to do whatever’s necessary to make sure it won’t happen to your company. …

31C3: Thunderstrike greift MacBooks über Thunderbolt an

Über eine EFI-Schwachstelle lässt sich die Firmware von MacBooks manipulieren. Einmal infiziert,lässt sich der Schädling nicht einmal durch den …

GlassWire: Kostenloser Netzwerkmonitor mit Firewall spricht nun Deutsch

Im Oktober 2014 stellte ich hier im Blog GlassWire vor. Eine kostenlose Software, die als Netzwerkmonitor mit Firewall agiert. Die Windows-Software, …

Eine App gegen Handyüberwachung

Auf dem Chaos Communication Congress 31C3 haben Forscher gezeigt, wie sich Handygespräche und SMS abfangen und manipulieren lassen. Die App …

Wieso Handy-Gespräche nicht mehr sicher sind

• Tobias Engel hat beim 31C3-Kongress des Chaos Computer Clubs das so genannte SS7-Netz geknackt.<br>• Der Hacker benötigt nicht mehr als eine Telefonnummer, …

2014: The spotlight year for advanced security

It seemed that no matter where I was this year the topic of computer security reared its ugly head. Whether consulting with business executives, …

Privacy is not dead: Microsoft lawyer prepares to take on US government

Interview: Brad Smith tells Dominic Rushe US demand for access to customer’s emails on server in Dublin strikes at heart of balance between safety and privacy<p>Imagine this scenario. German police investigating a press leak descend on Deutsche Bank headquarters in Frankfurt. They serve a warrant to …

Breitbandinternet: Routerzwang soll entfallen

Anzeige<p>Bundeswirtschaftsminister Sigmar Gabriel macht Druck, um Breitbandkunden in Deutschland möglichst bald eine freie Wahl des DSL- und …

The Secret Life of Passwords

WhatsApp wird sicherer als DeMail

Big Data : Was Google wirklich weiß

Big Data Was Google wirklich weiß<p>Von<p>-Aktualisiert am 20.11.2014-21:01<p>Zur Sonne, zur Freiheit: So sieht sich Google selbst. Bild: AFP<p>Schon lange …

7 IT Startups That Will Change How Businesses Innovate In 2015

<b>Editor’s note:</b> <i>Mike Kail is CIO and SVP of infrastructure at Yahoo. He sits on the board of ElasticBox and is also an investor in ZenPayroll.</i><p>New products and services are released every month that dramatically change how we can develop products and manage our IT shops. Innovation is everywhere; it …

PayPal deaktiviert SSL 3.0: Diese Shopsysteme müssen jetzt aktualisiert werden [Update]

Der Zahlungsanbieter PayPal reagiert auf die unter dem Namen „Poodle“ bekannt gewordene Sicherheitslücke im alten SSL-3-Protokoll und deaktiviert die …

SHA-2 in den Startlöchern: Umstellung der SSL-Zertifikate beginnt

Einige Full-Service-Provider bieten bereits seit einigen Monaten SHA-2-Zertifikate an, die auch kostenlos gegen die künftig veralterten …

Studie: Was sich aus den Datenspuren der Internetnutzer schließen lässt

Jeder Bürger produziert Datenspuren, ob bei Einkäufen, im Web oder bei der Nutzung des Smartphones. Eine neue Studie fasst zusammen, welche …

Gillmor Gang: Eating the World

The Gillmor Gang — Robert Scoble, Kevin Marks, Keith Teare, John Taschek, and Steve Gillmor. Recorded live Thursday, October 30, 2014. A good news week, disguised as mobile, Facebook, and notifications eating the world. Just beneath the surface, the power of micro-communities lurking.<p>@stevegillmor, …