KW 40: Hungarian banks and telecoms services hit by cyber attack, Putin wants truce in cyberspace, Security update for Foxit Reader

NEWS

Hungarian banks and telecoms services hit by cyber attack: Some Hungarian banking and telecommunication services were briefly disrupted by a distributed-denial-of-service (DDoS) attack on Thursday launched from computer servers in Russia, China and Vietnam, according to telecoms firm Magyar Telekon. The volume of data traffic in the attack was ten times higher than the amount usually seen in DDoS events, the company said.
reuters.com

Putin wants truce in cyberspace: Russian President Vladimir Putin has proposed a truce with the United States in cyberspace. He issued a written statement outlining a four-point plan for what he called a reboot in the relationship between the United States and Russia in the field of information security. Moscow and Washington, he wrote, should issue guarantees of nonintervention into the internal affairs of each other, including into electoral processes.
nytimes.com

Security update for Foxit Reader: Foxit Software has closed some serious security holes in its PDF tool with the new version Foxit Reader 10.1. 13. A 3D plug-in is also available as a beta version in the update.
pcwelt.de

– Advertisement –
IoT – Ticker -The physical world meets the digital one. Internet of Things as an interface that revolutionizes both the industry and everyday life. Get a weekly update from the world of “Internet of Things”. iot-ticker.net

AI to combat child pornography: A system is being developed in Germany that filters out internet content based on pornographic patterns. The plan is to use this new AI system in Lower Saxony in the State Criminal Police Office to combat child abuse and child pornography. The aim is to identify illegal activities against children at an early stage. Several other federal states have already expressed an interest in the system in order to use it themselves.
noz.de

The creation of fake AI: Stewart Russell, professor at the University of California at Berkeley, explains that there is a misunderstanding about what AI really is. This not only leads to false information being passed on, but also increased the emergence of fake AI. There is a difference between pure data analysis and artificial intelligence. Such mundane systems are not called artificial intelligence in science, according to Russel.
sueddeutsche.de

Huawei encoder: A lot of security gaps golem.de
Cyber crime: 35 percent of Germans have been targeted heise.de
VPN service: Anonymity as an add-on ip-insider.de
AI-based cybersecurity: Dialogue forum for experts from science, business and administration bigdata-insider.de

– Advertisement –
African Edition – The weekly newsletter that provides you with hand-picked news about current discussions and news from Africa: from socio-political developments to African-European relations. The continent at a glance. african-edition.com

NUMBER OF THE WEEK

53 percent of 1,019 companies investigated had sensitive company data on relevant platforms.
t3n.de

BACKGROUND

IT uncertainties due to use of professional email addresses for private purposes: An increasing number of employees are using their professional email addresses for private purposes, making it easier for cybercriminals to obtain sensitive data. The General Association of the German Insurance Industry (GDV) has now found out that numerous professional e-mail addresses and passwords can be found on the Darknet. The association warns that it is easy for criminals to buy this information, use it for criminal activities and even blackmail employees.
t3n.de

Manipulated coffee maker: Martin Hron from the security software manufacturer Avast has proven the risk of misuse of poorly secured, smart devices. Due to a lack of authentication, he was able to execute commands from a smart coffee machine. This ranged from displaying any messages on the display to switching on the grinder and heating unit.
derstandard.de

QUOTE

“In cybersecurity, AI can make a significant contributions to reacting appropriately to current and future threats in the economy and society. A prerequisite for this is that the systems and their performance remain technically assessable and that specific minimum requirements are developed for different industries and fields of application.”
Prof. Michael Waidner, Head of the Fraunhofer Institute for Secure Information Technology and ATHENE Director.
bigdata-insider.de

SECURE?

Pay by hand: Amazon has developed a palm reader that customers at the checkout of Amazon supermarkets can use to pay for their purchases. Amazon One is the name of the new technology and it is intended to simplify shopping. So far, there is Amazon One only in Amazon Go supermarkets.
golem.de

Newsletter subscription

Subscribe to our free weekly newsletter for a compact overview of safety and security topics:

Safety-Security-Ticker

More digital news briefings

Our political briefings