At the beginning of October, the IT security industry will meet at it-sa 2019 – and this year AWARE7 GmbH will also be present. Own booth, Live Hacking Shows & an experience project for the increase of IT security awareness. Visit us at booth 10.0-520! [Read more…] about AWARE7 GmbH at the it-sa 2019!
One data leak on Facebook follows the next – it won’t be quiet around the social network group. Now 419 million phone numbers of accounts have been published. The unencrypted data is linked to the Facebook ID and can thus be clearly assigned. [Read more…] about Data leak on Facebook: 419 million public phone numbers!
It is now standard to work on the road. In almost every train or plane people are sitting in front of laptops working. Whether it’s just retrieving e-mails or coordinating appointments, these types of data should not fall into the wrong hands. All you have to do is follow our tips so that you can work on the road and prevent your data from being tapped.
1. The correct use of WIFI hot spots
You can find them everywhere and meanwhile almost every train is equipped with a public WIFI hot spots. We already reported on the use of this type of Internet access last year. If you regularly use open WIFI hot spots, you should read the entire article and apply the tips listed there.
In short, it is important that you connect to the right hot spot. The name or a login window are not sufficient authentications. Since you are in a public network you should assume that everything can potentially be read by someone else. Accordingly, sensitive actions such as online banking should be avoided.
Pay special attention to dubious links or warning messages. Avoid surfing on HTTP pages and rename your device so that no personal details are integrated (default Apple name: Iphone from Jan).
2. Never leave your devices unattended
Always keep an eye on your technical equipment to protect it from theft. If there is no other way than to leave your technical equipment unattended, such as going to the toilet, you should protect it with passwords or PINs.
3. Do not allow a view of your screen
There are two ways to make sure that no one can look over your shoulder:
Use privacy filters for your screen. This filter blackens the image for people who are not sitting right in front of the screen. (Available for about 30€).
Choose a seat that does not allow strangers to look at your screen unnoticed. Seats at the window are ideal for this, as people in the aisle cannot see the screen.
4. Call as anonymously as possible
During telephone calls, the entire train compartment inevitably listens in. As a rule, we recommend that you postpone telephone calls as far as possible, as you may disturb other people, among other things. If it is not possible to postpone the call, you should avoid mentioning sensitive data. This includes full names, telephone numbers, company names or company-related data.
5. Carry out updates before you start your journey
Updates are used to close security gaps among other things. Since you are always a potential target in a public network, you should ensure that known security gaps are closed with current updates.
Try to do as much offline work as possible on the road so you don’t have to connect to a public network.
If you use the tips listed above, you can work safely on the road but we recommend that you use sensitive data as sparingly as possible in public networks.
The Exploit 10KBLAZE construction kit was opened and represents a major danger for the majority of all SAP systems. The Office for Cyber Security and Digital Infrastructure (CISA) from the USA announced a public warning message for the SAP systems on May 2, 2019. [Read more…] about 10KBLAZE – Great Danger for SAP-Systems
The blackmail business has been flourishing on the Internet for quite some time – a new scam is now hitting developers who are deleting the public git repository. All that remains is a note with the wallet, to which approx. 0.1 bit coins are to be transferred in order to get back to the data.
The developers are not completely innocent. Since most developers have a local repository, the damage is limited. Interesting and critical to the same is the attack anyway. [Read more…] about Git repository deleted – developers blackmailed!