{"id":693,"date":"2023-08-02T21:48:55","date_gmt":"2023-08-02T19:48:55","guid":{"rendered":"https:\/\/kroener-online.de\/?p=693"},"modified":"2023-08-02T21:48:55","modified_gmt":"2023-08-02T19:48:55","slug":"isolierte-systeme-in-gefahr-malware-stiehlt-daten-von-rechnern-ohne-internet-golem-de","status":"publish","type":"post","link":"https:\/\/kroener-online.de\/?p=693","title":{"rendered":"Isolierte Systeme in Gefahr: Malware stiehlt Daten von Rechnern ohne Internet &#8211; Golem.de"},"content":{"rendered":"<p>Damit Cyberkriminelle mit einer Malware Daten stehlen k\u00f6nnen, ist meist eine Internetverbindung erforderlich. Es geht auch anders.<br \/>\n\u2014 Weiterlesen <a href=\"https:\/\/www.golem.de\/news\/isolierte-systeme-in-gefahr-malware-stiehlt-daten-von-rechnern-ohne-internet-2308-176382.html\">www.golem.de\/news\/isolierte-systeme-in-gefahr-malware-stiehlt-daten-von-rechnern-ohne-internet-2308-176382.html<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Damit Cyberkriminelle mit einer Malware Daten stehlen k\u00f6nnen, ist meist eine Internetverbindung erforderlich. Es geht auch anders. \u2014 Weiterlesen www.golem.de\/news\/isolierte-systeme-in-gefahr-malware-stiehlt-daten-von-rechnern-ohne-internet-2308-176382.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[25],"tags":[],"class_list":["post-693","post","type-post","status-publish","format-standard","hentry","category-security"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pac17Y-bb","jetpack-related-posts":[{"id":745,"url":"https:\/\/kroener-online.de\/?p=745","url_meta":{"origin":693,"position":0},"title":"ChatGPT, Bard und andere: KI-Systeme erm\u00f6glichen Ausleiten von Daten &#8211; Golem.de","author":"volker.kroener","date":"15. November 2023","format":false,"excerpt":"Durch gezielte Abfragen lassen sich private und gesch\u00fctzte Daten aus KI-Systemen ausleiten. Die Angriffe zeigen ein prinzipielles Problem. \u2014 Weiterlesen www.golem.de\/news\/chatgpt-bard-und-andere-ki-systeme-ermoeglichen-ausleiten-von-daten-2311-179405.html","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/kroener-online.de\/?cat=25"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":691,"url":"https:\/\/kroener-online.de\/?p=691","url_meta":{"origin":693,"position":1},"title":"Nutzerdaten in Gefahr: Beh\u00f6rden warnen vor gef\u00e4hrlichen Idor-Schwachstellen im Web &#8211; Golem.de","author":"volker.kroener","date":"31. Juli 2023","format":false,"excerpt":"Durch Idor-Schwachstellen in Webanwendungen sind bereits Daten von Millionen von Anwendern in die H\u00e4nde Cyberkrimineller gelangt. \u2014 Weiterlesen www.golem.de\/news\/nutzerdaten-in-gefahr-behoerden-warnen-vor-gefaehrlichen-idor-schwachstellen-im-web-2307-176294.html","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/kroener-online.de\/?cat=25"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":710,"url":"https:\/\/kroener-online.de\/?p=710","url_meta":{"origin":693,"position":2},"title":"Nutzerdaten in Gefahr: Microsoft Onedrive als Werkzeug f\u00fcr Ransomware-Angriffe &#8211; Golem.de","author":"volker.kroener","date":"11. August 2023","format":false,"excerpt":"Onedrive soll die Daten von Windows-Nutzern eigentlich vor Ransomware-Angriffen sch\u00fctzen. Effektiv ist das aber offenbar nicht immer. \u2014 Weiterlesen www.golem.de\/news\/nutzerdaten-in-gefahr-microsoft-onedrive-als-werkzeug-fuer-ransomware-angriffe-2308-176674.html","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/kroener-online.de\/?cat=25"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":784,"url":"https:\/\/kroener-online.de\/?p=784","url_meta":{"origin":693,"position":3},"title":"Daten verschl\u00fcsseln und Geld erpressen: Gefahr durch Ransomware auf Unternehmen steigt &#8211; Golem.de","author":"volker.kroener","date":"14. Januar 2024","format":false,"excerpt":"Die bayerische Spezial-Staatsanwaltschaft warnt vor einer neuen Masche bei Ransomware. Kriminelle attackieren h\u00e4ufig mit einem Schlag gleich mehrere Unternehmen. \u2014 Weiterlesen www.golem.de\/news\/daten-verschluesseln-und-geld-erpressen-gefahr-durch-ransomware-auf-unternehmen-steigt-2401-181153.html","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/kroener-online.de\/?cat=25"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":631,"url":"https:\/\/kroener-online.de\/?p=631","url_meta":{"origin":693,"position":4},"title":"Wir wurden gehackt\u2026","author":"volker.kroener","date":"7. Juni 2023","format":false,"excerpt":"\u2026immer \u00f6fter erreicht uns eine solche Nachricht von einem Gesch\u00e4ftspartner, und wir beginnen umgehend mit der Bewertung der nun auch f\u00fcr uns entstandenen Situation. Zuerst haben wir ein Sicherheitsereignis, das im Laufe der Untersuchungen zu einem Sicherheitsvorfall werden kann. Welche Systeme sind mit diesem Gesch\u00e4ftspartner verbunden? Kann es zu einer\u2026","rel":"","context":"In &quot;Diverses&quot;","block_context":{"text":"Diverses","link":"https:\/\/kroener-online.de\/?cat=1"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kroener-online.de\/wp-content\/uploads\/2023\/06\/augustinus_cybercrossattack_between_two_companys_network_4k_b4bd6a82-e9c0-43a5-a228-9c5702343732.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kroener-online.de\/wp-content\/uploads\/2023\/06\/augustinus_cybercrossattack_between_two_companys_network_4k_b4bd6a82-e9c0-43a5-a228-9c5702343732.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kroener-online.de\/wp-content\/uploads\/2023\/06\/augustinus_cybercrossattack_between_two_companys_network_4k_b4bd6a82-e9c0-43a5-a228-9c5702343732.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kroener-online.de\/wp-content\/uploads\/2023\/06\/augustinus_cybercrossattack_between_two_companys_network_4k_b4bd6a82-e9c0-43a5-a228-9c5702343732.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":754,"url":"https:\/\/kroener-online.de\/?p=754","url_meta":{"origin":693,"position":5},"title":"Spionagetool aufgedeckt: Patternz sammelt Daten von Milliarden von Menschen &#8211; Golem.de","author":"volker.kroener","date":"20. November 2023","format":false,"excerpt":"Das Tool greift wohl auf sogenannte RTB-Daten zur\u00fcck, die Angreifern teils hochsensible Informationen liefern \u2013 auch \u00fcber EU-Entscheidungstr\u00e4ger. \u2014 Weiterlesen www.golem.de\/news\/spionagetool-aufgedeckt-patternz-sammelt-daten-von-milliarden-von-menschen-2311-179573.html","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/kroener-online.de\/?cat=25"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/kroener-online.de\/index.php?rest_route=\/wp\/v2\/posts\/693","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kroener-online.de\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kroener-online.de\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kroener-online.de\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kroener-online.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=693"}],"version-history":[{"count":0,"href":"https:\/\/kroener-online.de\/index.php?rest_route=\/wp\/v2\/posts\/693\/revisions"}],"wp:attachment":[{"href":"https:\/\/kroener-online.de\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=693"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kroener-online.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=693"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kroener-online.de\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=693"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}