Mit dem einem sogenannten "Security-Checkup" sollen die Nutzer mögliche Angriffe auf ihr Konto besser verhindern lernen.

Facebook will seine Nutzer dazu bringen, die per Voreinstellung laxen Sicherheits-Einstellungen zum Kontenschutz zu überdenken. Dazu sollen die Nutzer in den nächsten Wochen im Newsfeed einen Hinweis auf den "Security Check" erhalten. Dieses Tool geleitet durch die Sicherheits-Einstellungen und gibt Hinweise, wo Verbesserungen möglich sind.

  • Als erstes zeigt es dem Nutzer, von welchen Geräten und Fremd-Apps aus er derzeit angemeldet ist und wie lange die letzte Aktivität her war.
  • Danach fordert der Security-Check dazu auf, die "Anmeldungswarnungen" zu aktivieren, um unberechtigte Zugriffe Fremder sofort mitgeteilt zu bekommen.
  • Zum Schluss gibt es Tipps, um die Passwortsicherheit zu erhöhen.

Alle diese Maßnahmen sind bereits jetzt über die Sicherheits-Einstellungen im Profil erreichbar.

Mehr dazu lesen ...

Link zum Security-Checkup

Six critical vulnerabilities have left 95 per cent of Google Android phones open to an attack delivered by a simple multimedia text, a mobile security expert warned today. In some cases, where phones parse the attack code prior to the message being opened, the exploits are silent and the user would have little chance of defending their data. The vulnerabilities are said to be the worst Android flaws ever uncovered.

 Joshua Drake, from Zimperium zLabs, who reported the bugs in April this year, said whilst Google has sent out patches to its partners, he believes most manufacturers have not made fixes available to protect their customers. “All devices should be assumed to be vulnerable,” Drake, vice president of platform research and exploitation at Zimperium, told FORBES. He believes as many as 950 million Android phones could be affected, going on figures suggesting there are just over 1 billion in use. Only Android phones below version 2.2 are not affected, he added.

The weaknesses reside in Stagefright, a media playback tool in Android. They are all “remote code execution” bugs, allowing...

Put a computer on a sniper rifle, and it can turn the most amateur shooter into a world-class marksman. But add a wireless connection to that computer-aided weapon, and you may find that your smart gun suddenly seems to have a mind of its own—and a very different idea of the target.

Security researchers Runa Sandvik, left, and husband, Michael Auger, right, have figured out how to hack into a Tracking Point TP750 rifle to control the trajectory of the bullets fired.Click to Open Overlay Gallery
Security researchers Runa Sandvik, left, and husband Michael Auger have figured out how to hack into a Tracking Point TP750 rifle to disable it or control the trajectory of its bullets.  Greg Kahn for WIRED

At the Black Hat hacker conference in two weeks, security researchers Runa Sandvik and Michael Auger plan to present the results of a year of work hacking a pair of $13,000 TrackingPoint self-aiming rifles. The married hacker couple have developed a set of techniques that could allow an attacker to compromise the rifle via its Wi-Fi connection and exploit vulnerabilities in its software. Their tricks can change variables in the scope’s calculations that make the rifle inexplicably miss its target, permanently disable the scope’s computer, or even prevent the gun from firing. In a demonstration for WIRED (shown in the video above), the researchers were able to dial in their changes to the scope’s targeting system so precisely that they could cause a bullet to hit a bullseye of the hacker’s choosing rather than the one chosen by the shooter.

“You can make it lie constantly to the user so they’ll always miss their shot,” says Sandvik, a former developer for the anonymity software Tor. Or the attacker can just as easily lock out the user or erase the gun’s entire file system. “If the scope is bricked, you have a six to seven thousand dollar computer you can’t use on top of a rifle that you still have to aim yourself.”

The exposed circuitboards of the Tracking Point TP750.Click to Open Overlay Gallery
Sandvik and Auger got their hands on two of the $13,000 TP750 rifles, and dissected this one to access its circuit board and reverse engineer its software.  Greg Kahn for WIRED

Since TrackingPoint launched in 2011, the company has sold more than a thousand of its high-end, Linux-power rifles with a self-aiming system. The scope allows you to designate a target and dial in variables like wind, temperature, and the weight of the ammunition being fired. Then, after the trigger is pulled,...

Am Mittwoch läutet Microsoft mit Windows 10 ein neues Betriebssystem-Zeitalter ein. Die futurezone gibt einen Überblick über die wichtigsten Neuerungen.                                


Ab sofort ist Windows 10 für die breite Masse verfügbar. Ein großer Teil der Nutzer bekommt das neue Betriebssystem sogar kostenlos als Upgrade für ältere Windows-Versionen geliefert. Das neue System wartet mit zahlreichen neuen Funktionen auf und will so die Fehler, die sich Microsoft mit dem von vielen Anwendern ungeliebten Windows 8 begangen hat, wieder ausbügeln. Die futurezone hat die finale RTM-Version (Build 10.0.10240) getestet und gibt einen Überblick über die wichtigsten Neuerungen von Windows 10.

Windows 10 IoT will power a range of intelligent, connected IoT devices. From small devices like gateways, to mobile point- of- sale to powerful industry devices like robotics and specialty medical devices, Windows 10 IoT offers a converged platform for devices with enterprise-grade security from the device to the cloud, and native connectivity for machine-to-machine and machine-to-cloud scenarios with Azure IoT Services....