Cars Research Security Hacker penetrates with ease in systems from large tech corporations An

12:05  09 april  2021
12:05  09 april  2021 Source:   finanzen.net

How to build the perfect hi-fi system

  How to build the perfect hi-fi system System building needs careful thought – so whether you're just starting or upgrading, allow us to offer a little advice.It’s an elegant metaphor, whether it’s describing a musical ensemble, a football team or a hi-fi system. In essence, building the perfect hi-fi system is about balance as much as individual quality. The whole should amount to more than, or at the very least equal, the sum of its parts.

a hacker managed to penetrate into systems of more than 35 corporations and used the same method each time. Thanks to his work, the vulnerabilities were closed by the partly very prominent companies, which is why a bonus of $ 130,000 was waiting for the professional hacker.

Mario Vedder/Getty Images © Provided by finanzen.net Mario Vedder / Getty Images Research Security Hacker penetrates in large corporations An

with increasing digitization in private and professional life is growing the risk of becoming aim of cyber attacks. Whether sensitive private data or company information: If hackers find security gaps in systems, they often get free access to any data.

4 ways to outsmart a burglar and keep your home safe

  4 ways to outsmart a burglar and keep your home safe These are the latest burglary tricks and trends to be aware of.To help homeowners step up their security levels and prevent break-ins, Izzy Schulman, Director at Keys4U, has revealed the latest burglary trends to be aware of. Take a look at the advice below to help you outsmart burglars...

How this access can be obtained, a Security Research Hacker in the US has shown a total of over 35 tech companies, including in the Apple , Microsoft , PayPal , , , , ,




, and



, he used his own statements according to the method of "Dependency Confusion" - "Dependency Convention" - to penetrate into the systems of the companies.

Dependency Packages

The Research Hacker is Alex Birsan, which explained in detail in a blog article, as he gained access to the systems with its method by using the vulnerabilities referred to as "Dependency Confusion" to malware Install on the systems.

He has specifically apart from the internal systems of the respective corporate networks. Birsan donored privately used "Dependency Packages" with public malware packages that wore the same name. These public packages can be uploaded to specific servers that companies used for specific software. Lands such a malware package with a company and, for example, invites a company admin this package falsely down, the malware is in the system of the company.

Cybercrime: The Franco-Israeli hacker Ulcan tried this Thursday in four cases of violent hoaxes

 Cybercrime: The Franco-Israeli hacker Ulcan tried this Thursday in four cases of violent hoaxes Living in Israel today, Grégory Chelli, his real name, is the author of numerous malicious calls, in particular against the mayor de Lille Martine Aubry © Youtube Ulcan screenshot on Youtube PROCES - Living in Israel today, Grégory Chelli, whose real name is, is the author of numerous malicious calls, in particular against the mayor of Lille Martine Aubry This Thursday begins the trial of Grégory Chelli, said Ulcan , a Franco-Israeli hacker specializing in violent harassment on the Internet.

As a rule, the malware is packed in repositories of programming programs such as Python, NorD or Rubygems. So far, the hackers have so far stated that the Admin's spurtscrews on downloads from the scripts and download accordingly the contaminated script instead of the regular script. However,

Brisan has developed this method to increase the chances of success of an attack.

The version number is crucial

The Research Hacker was explicitly defined in the course of its efforts, which public codes of Github and PayPal are used. This could explicitly identify the "Dependencies", use the names for his malware codes and also load the "Dependencies" into public repositories.

X1 The infection rate of the systems increased significantly as Brisan commented. However, success is not due solely to the matching name, but rather a further small but important detail for the project. If Python Dependencies are to be installed, the coders use a specific command (PIP Insatll Library) with the addition "-Extra-index URL", whereupon locally and online searched for the Dependency. X1X1 If the system finds several of the dependencies of the same name, it is always downloaded with the higher version number. Accordingly, Brisan designated his malicious software with a very high version number to overlay the automated installation process. X1X1 For this note, the hacker received a $ 130,000 bonus, as companies adapted system sequence accordingly and now conclude this vulnerability.Henry Ely / editors Finanzen.net X1

If all companies pay a minimum tax rate .
are state matters. US Finance Minister Janet Yellen sees the apparently global and calls for a worldwide minimum tax rate for internationally active companies. © Leah Millis / Reuters US Finance Minister Janet Yellen: The USA worked with the G20 group of leading economies to find a drawing consensus, Yellen said in the run-up to a meeting of the International Monetary Fund (IMF) and the World Bank. The aim is to not mutually undercut each other in dealing with the corporations.

usr: 3
This is interesting!