The latest firmware update is intended to close a security hole in Logitech hardware devices that allows access to wireless keyboards or mice. However, the update did not completely close this vulnerability. [Read more…] about Logitech Hardware – Vulnerability still Exploitable!
What do Woodstock, the first online message and the moon landing have in common? It all happened in 1969. Half a century later, these events are still firmly anchored in our memories. At AWARE7 the technical revolution through the internet was our main focus. [Read more…] about How old is the internet? A milestone turns 50!
The annual report 2019 of the Huawei Cyber Security Evaluation Centre Oversight Board (HCSEC) shows that Huawei has ignored basic (partly their own) rules of software development for years and uses partly unmanageable software. Microsoft also reports that Huawei software unnecessarily used techniques otherwise known from malware.
They exist – the situations in which large files have to be transferred. In the office you can still help yourself with USB sticks. From a distance you can now use another service: Firefox Send!
The Open Source Browser service can be used by any browser. The service should encrypt the uploaded data end-to-end and offers manageable, but useful, additional functions. [Read more…] about Firefox Send – Transfer Big Data!
News around Android, Google and new operating systems like Fuchsia in this case, cause a lot of furore. After all, the development of an operating system is very time-consuming.
Who wants to reinvent the wheel today – and Google wants that with Fuchsia partly – must consider many things. But let’s start at the beginning! [Read more…] about Google Fuchsia and the future of Android