{"id":814,"date":"2024-03-15T12:29:48","date_gmt":"2024-03-15T11:29:48","guid":{"rendered":"https:\/\/kroener-online.de\/?p=814"},"modified":"2024-03-15T12:29:48","modified_gmt":"2024-03-15T11:29:48","slug":"uebertragung-auf-esim-kriminelle-kapern-fremde-rufnummern-per-qr-code-golem-de","status":"publish","type":"post","link":"https:\/\/kroener-online.de\/?p=814","title":{"rendered":"\u00dcbertragung auf eSIM: Kriminelle kapern fremde Rufnummern per QR-Code &#8211; Golem.de"},"content":{"rendered":"<p>Wer seine Handynummer auf eine eSIM \u00fcbertragen will, erh\u00e4lt daf\u00fcr in der Regel einen QR-Code. SIM-Swappern bietet dieser Ablauf eine Angriffsfl\u00e4che.<br \/>\n\u2014 Weiterlesen <a href=\"https:\/\/www.golem.de\/news\/uebertragung-auf-esim-kriminelle-kapern-fremde-rufnummern-per-qr-code-2403-183231.html\">www.golem.de\/news\/uebertragung-auf-esim-kriminelle-kapern-fremde-rufnummern-per-qr-code-2403-183231.html<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Wer seine Handynummer auf eine eSIM \u00fcbertragen will, erh\u00e4lt daf\u00fcr in der Regel einen QR-Code. SIM-Swappern bietet dieser Ablauf eine Angriffsfl\u00e4che. \u2014 Weiterlesen www.golem.de\/news\/uebertragung-auf-esim-kriminelle-kapern-fremde-rufnummern-per-qr-code-2403-183231.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[25],"tags":[],"class_list":["post-814","post","type-post","status-publish","format-standard","hentry","category-security"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pac17Y-d8","jetpack-related-posts":[{"id":641,"url":"https:\/\/kroener-online.de\/?p=641","url_meta":{"origin":814,"position":0},"title":"Infostealer: Kriminelle stehlen ChatGPT-Log-ins von \u00fcber 100.000 Nutzern &#8211; Golem.de","author":"volker.kroener","date":"21. Juni 2023","format":false,"excerpt":"Gestohlene Anmeldeinformationen von mehr als 100.000 ChatGPT-Nutzern sind seit Juni 2022 auf Darknet-Marktpl\u00e4tzen aufgetaucht. \u2014 Weiterlesen www.golem.de\/news\/infostealer-kriminelle-stehlen-chatgpt-log-ins-von-ueber-100-000-nutzern-2306-175146.html","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/kroener-online.de\/?cat=25"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":784,"url":"https:\/\/kroener-online.de\/?p=784","url_meta":{"origin":814,"position":1},"title":"Daten verschl\u00fcsseln und Geld erpressen: Gefahr durch Ransomware auf Unternehmen steigt &#8211; Golem.de","author":"volker.kroener","date":"14. Januar 2024","format":false,"excerpt":"Die bayerische Spezial-Staatsanwaltschaft warnt vor einer neuen Masche bei Ransomware. Kriminelle attackieren h\u00e4ufig mit einem Schlag gleich mehrere Unternehmen. \u2014 Weiterlesen www.golem.de\/news\/daten-verschluesseln-und-geld-erpressen-gefahr-durch-ransomware-auf-unternehmen-steigt-2401-181153.html","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/kroener-online.de\/?cat=25"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":657,"url":"https:\/\/kroener-online.de\/?p=657","url_meta":{"origin":814,"position":2},"title":"Phishing-Betrug: Sachsens Sozialministerium \u00fcberweist Betr\u00fcgern 225.000 Euro &#8211; Golem.de","author":"volker.kroener","date":"7. Juli 2023","format":false,"excerpt":"Durch eine gef\u00e4lschte Rechnung konnten Kriminelle das s\u00e4chsische Sozialministerium zur Zahlung eines sechsstelligen Geldbetrages bewegen. \u2014 Weiterlesen www.golem.de\/news\/phishing-betrug-sachsens-sozialministerium-verschenkt-225-862-33-euro-2307-175654.html","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/kroener-online.de\/?cat=25"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":687,"url":"https:\/\/kroener-online.de\/?p=687","url_meta":{"origin":814,"position":3},"title":"Zero-Day-L\u00fccke ausgenutzt: Hacker stehlen Daten von 12 norwegischen Ministerien &#8211; Golem.de","author":"volker.kroener","date":"25. Juli 2023","format":false,"excerpt":"Kriminelle haben \u00fcber eine Zero-Day-Schwachstelle sensible Daten von mehreren Ministerien der norwegischen Regierung abgegriffen. \u2014 Weiterlesen www.golem.de\/news\/zero-day-luecke-ausgenutzt-hacker-stehlen-daten-von-12-norwegischen-ministerien-2307-176137.html","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/kroener-online.de\/?cat=25"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":787,"url":"https:\/\/kroener-online.de\/?p=787","url_meta":{"origin":814,"position":4},"title":"Missbrauch m\u00f6glich: Whatsapp l\u00e4sst fremde Nutzer Ger\u00e4teinformationen abgreifen &#8211; Golem.de","author":"volker.kroener","date":"18. Januar 2024","format":false,"excerpt":"Anhand ihrer Rufnummer l\u00e4sst sich zum Beispiel feststellen, wie viele Ger\u00e4te eine Zielperson mit Whatsapp verwendet und wann sie diese wechselt. \u2014 Weiterlesen www.golem.de\/news\/missbrauch-moeglich-whatsapp-laesst-fremde-nutzer-geraeteinformationen-abgreifen-2401-181313.html","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/kroener-online.de\/?cat=25"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":782,"url":"https:\/\/kroener-online.de\/?p=782","url_meta":{"origin":814,"position":5},"title":"Lumma: Cyberkriminelle verbreiten Malware vermehrt via Youtube &#8211; Golem.de","author":"volker.kroener","date":"9. Januar 2024","format":false,"excerpt":"Die Angreifer infiltrieren fremde Youtube-Konten, verbreiten dar\u00fcber den Lumma-Stealer und sammeln damit anschlie\u00dfend weitere Zugangsdaten ein. \u2014 Weiterlesen www.golem.de\/news\/lumma-cyberkriminelle-verbreiten-malware-vermehrt-via-youtube-2401-180981.html","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/kroener-online.de\/?cat=25"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/kroener-online.de\/index.php?rest_route=\/wp\/v2\/posts\/814","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kroener-online.de\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kroener-online.de\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kroener-online.de\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kroener-online.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=814"}],"version-history":[{"count":0,"href":"https:\/\/kroener-online.de\/index.php?rest_route=\/wp\/v2\/posts\/814\/revisions"}],"wp:attachment":[{"href":"https:\/\/kroener-online.de\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=814"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kroener-online.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=814"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kroener-online.de\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=814"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}