While many people welcomed the arrival of Windows Subsystem for Linux (WSL) in Windows 10, it has been found to be a potential security issue. A new technique known as a Bashware has been discovered by security researchers that makes it possible for malware to use the Linux shell to bypass security software.
Wurde mein Lieblings-Passwort schon einmal in einem Datenleck veröffentlicht und kann deswegen einfach für Bruteforce-Angriffe verwendet werden? Diese Frage beantwortet ein neuer Webdienst des Sicherheitsforschers Troy Hunt.
"Airsage has taken it to the next level in the more recent past with GPS based anonymized data, but data with EXTENSIVE history. The Airsage product is zip code and smaller resolution and can provide months to years of location history of an anonymous cell phone id. " -- https://news.ycombinator.com/item?id=14803443
You can find anything and everything on the internet, yet nothing that explains how to track cell phones. Let us clarify right away, we are not talking about how to track your own cell phone in case it's lost or stolen. We are talking about tracking everyone that lives, breathes and wears a cell phone.…
M. Bilal, and S. Kang. (2017)cite arxiv:1704.02683Comment: This article is accepted for the publication in Cluster Computing-The Journal of Networks, Software Tools and Applications. Print ISSN 1386-7857, Online ISSN 1573-7543.
Z. Liao, S. Yang, and J. Liang. Proceedings of the 2010 IEEE/ACM Int'L Conference on Green Computing and Communications & Int'L Conference on Cyber, Physical and Social Computing, page 600--604. Washington, DC, USA, IEEE Computer Society, (2010)