Storys zum Thema Computerkriminalität
- Sprache:
- Medien:
- Zeitraum:
- Zeitraum:Gesamt
- 2mehr
Amsterdam District Court Decides In Favor of Proctorio and University of Amsterdam
Scottsdale (ots) - Win for Proctorio and online education as a whole. Students of UvA and other similar universities can now continue their education from their own home without sacrificing integrity or the validity of the degrees they earned. With the rapid spread of COVID-19, universities all over the world have been forced to transfer their physical learning ...
mehrFraunhofer-Institut für Sichere Informationstechnologie SIT
New code scanner finds software vulnerabilities without source code
mehrFraunhofer-Institut für Sichere Informationstechnologie SIT
Danger over the phone / Researchers at Fraunhofer SIT find serious security flaws in VoIP telephones
mehrHesco Defends Trademark in China
Leeds, England (ots/PRNewswire) - Brand successfully maintains rights to 'HESCO' Hesco Bastion Ltd has successfully defended its 'HESCO' trademark in China. The registered trademark was upheld after a Chinese manufacturer failed in its attempt to cancel the mark. The China National Intellectual Property Administration reached the decision to uphold Hesco's trademark and refuse the cancellation action after reviewing evidence of Hesco's use of the name in China. Hesco has ...
mehrCOMPUTER BILD Exclusive: PlayStation Server Scan Logfiles Uncover True Scope of Sony's Sloppy Data Security
Hamburg (ots) - Scan logs show that Sony servers were running extremely dated programs and Web services - vulnerabilities of obsolete software known for years on the Internet It was the largest data theft ever: on the 19th of April, hackers broke into Sony servers and stole the personal information of more than 100 ...
mehr
PAN AMP: 9th Congress on European Security and Defence
Berlin/Hamburg (ots) - In the preparatory stage of the 9th Congress on European Security and Defence (Berlin, 9th/10th November 2010) Robot-Technology® (10|06) for automated capture, evaluation and documentation of cyber attacks was presented for the first time. The technology performs an automated tracking of virtual attacks through the internet and Deep Internet® against processors, computers, systems or networks, and ...
mehr