What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
Blog.png 2019-07-21 16:46:05 ExifTool : A Meta-Data Extractor (lien direct)

In this article, we\'ll discover various methods to read, write and manipulate the meta-data information recorded in a variety of file types. In order to achieve this, we\'ll be using a tool known as “ExifTool”.  EXIF is an acronym for Exchangeable Image File Format and it is a standard for the inclusion of metadata in... Continue reading

The post ExifTool : A Meta-Data Extractor appeared first on Hacking Articles.

Blog.png 2019-07-21 16:24:03 EvilOSX-RAT for MacOS/OSX (lien direct)

In this article, we will learn to use EvilOSX tool which is a Remote Administrator tool (RAT ) for initializing foothold on MacOS/OSX like platform. It can dramatically increase access in a matter of seconds. Table of Content Introduction Installation Usage in Exploitation Usage in Post-Exploitation System Info Webcam Retrieve iCloud auth tokens Microphone Clipboard... Continue reading

The post EvilOSX-RAT for MacOS/OSX appeared first on Hacking Articles.

WiredThreatLevel.png 2019-07-21 13:00:00 A Meditation on Moon Shots, a Mid-Engine Corvette, and More Car News This Week (lien direct)

We debate the use of the term “moon shot,” digitally drive the first mid-engine \'Vette, and check in how on Formula E is fueling an all-electric future.

SecurityAffairs.png 2019-07-21 12:18:05 Emsisoft releases a second decryptor in a few days, this time for ZeroFucks ransomware (lien direct)

Security experts at Emsisoft released a second decryptor in a few days, this time announced a free decryptor for the ZeroFucks ransomware. A few days ago, the experts at Emsisoft released a free decryptor for the Ims00rry ransomware, now the malware team announced the released of a decryptor for the ZeroFucks ransomware. Victims of the […]

The post Emsisoft releases a second decryptor in a few days, this time for ZeroFucks ransomware appeared first on Security Affairs.

WiredThreatLevel.png 2019-07-21 12:00:00 An Alien-Hunting Russian Tech Mogul May Help Solve a Space Mystery (lien direct)

Russian billionaire Yuri Milner has invested a fortune to help SETI find the source of cosmic flashes that emit the energy of 500 million suns.

WiredThreatLevel.png 2019-07-21 12:00:00 The Story Universe of Magic: The Gathering Is Expanding (lien direct)

Can a complicated, nerdy card game turn into a cross-media story? Maybe it already is one.

WiredThreatLevel.png 2019-07-21 12:00:00 Are Super Automatic Espresso Machines Worth Buying? (lien direct)

These premium coffee machines promise a hot, perfect cup of espresso, automatically. We tried some out to see if they\'re worth $1,000-or more.

SecurityAffairs.png 2019-07-21 11:10:04 Security Affairs newsletter Round 223 – News of the week (lien direct)

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Kindle Edition Paper Copy Once again thank you! For nearly a year, Brazilian users have been targeted with router attacks NCSC report warns of DNS Hijacking Attacks SAP Patch Day – July 2019 addresses a critical flaw […]

The post Security Affairs newsletter Round 223 – News of the week appeared first on Security Affairs.

WiredThreatLevel.png 2019-07-21 11:00:00 \'Snowpiercer\' Trains an Eye on TV-and Its Genre DNA Runs Deep (lien direct)

Under the watch of the creator of \'Orphan Black,\' the post-apocalyptic thrill-ride folds in elements of \'Westworld,\' \'The Leftovers,\' and more.

WiredThreatLevel.png 2019-07-21 11:00:00 Adware Is the Malware You Should Actually Be Worried About (lien direct)

For all the attention on sophisticated nation-state attacks, the malware that\'s most likely to hit your phone is much more mundane.

bleepingcomputer.png 2019-07-21 10:30:00 IRS Improved Security But Taxpayer Data Is Still At Risk (lien direct)

The U.S. Internal Revenue Service (IRS) failed to implement a good deal of security controls recommended over the years, leaving financial reporting and taxpayer data vulnerable to "inappropriate and undetected use, modification, or disclosure." [...]

SecurityAffairs.png 2019-07-21 10:17:00 Hackers breach 62 US colleges by allegedly exploiting Ellucian Banner Web flaw (lien direct)

Hackers breached at least 62 college and university networks exploiting a flaw in Ellucian Banner Web Tailor, a module of the Ellucian Banner ERP. US Department of Education warned that hackers have breached at least 62 college and university networks by exploiting a vulnerability in the Ellucian Banner Web Tailor module of the Ellucian Banner ERP. The module is […]

The post Hackers breach 62 US colleges by allegedly exploiting Ellucian Banner Web flaw appeared first on Security Affairs.

SecurityAffairs.png 2019-07-21 09:17:03 WizzAir informed customers it forced a password reset on their accounts (lien direct)

The airline company WizzAir informed its customers that it had reset the account passwords due to a technical issue in the system. The airline company WizzAir had reset the account passwords of its users due to a technical issue in its system. In an email message sent to the customers, the company explained that it […]

The post WizzAir informed customers it forced a password reset on their accounts appeared first on Security Affairs.

SecurityAffairs.png 2019-07-21 08:49:02 Twitter account of Scotland Yard hacked and posted bizarre messages (lien direct)

The principal Twitter account of Scotland Yard, which has more than 1.2 million followers, was hacked and tweeted a series of bizarre messages on Friday night. Hackers took over the Scotland Yard\'s principal Twitter account and tweeted a dozen bizarre messages on Friday night, some of the tweets referred to the British rapper Digga D. Digga D, real name […]

The post Twitter account of Scotland Yard hacked and posted bizarre messages appeared first on Security Affairs.

WiredThreatLevel.png 2019-07-21 04:08:00 Phase 4 of the Marvel Cinematic Universe Isn\'t Cinematic (lien direct)

A good portion of the upcoming Marvel Studio\'s slate will be streaming on Disney+.

WiredThreatLevel.png 2019-07-21 00:35:00 *Star Trek: Picard* Shows Where the Franchise Is Boldly Going (lien direct)

It\'s also a look at CBS All Access\' future.

WiredThreatLevel.png 2019-07-21 00:18:01 \'Snowpiercer,\' \'Picard,\' and More Awesome Trailers Hit Comic-Con (lien direct)

Comic-Con\'s biggest day brought the most massive trailers of the convention.

WiredThreatLevel.png 2019-07-20 22:01:01 Comic-Con\'s Batman VR Experience Soars-While Others Fall Flat (lien direct)

A couple of experiences shone in San Diego, but most of them proved that AR and VR need care-and money-to excel.

SecurityAffairs.png 2019-07-20 19:09:01 0v1ru$ hackers breach FSB contractor SyTech and expose Russian intel projects (lien direct)

SyTech, a contractor for the Federal Security Service of the Russian Federation (FSB) has been hacked, attackers stole data about internal projects. Attackers have hacked SyTech, a contractor for the Federal Security Service of the Russian Federation (FSB), and exfiltrated data about internal projects. According to the Russian media, SyTech has been working with FSB […]

The post 0v1ru$ hackers breach FSB contractor SyTech and expose Russian intel projects appeared first on Security Affairs.

TechWorm.png 2019-07-20 15:49:03 Israeli firm can steal your private data from Apple, Google, Facebook and Amazon (lien direct)

Apple, Google, Facebook, and Amazon are vulnerable to malware from an Israeli firm Israel-based cybersecurity company, NSO Group has developed a surveillance tool that can obtain user data from Apple, Google, Facebook, Amazon and Microsoft servers, according to The Financial Times. NSO Group, whose software product was used to hack Facebook-owned WhatsApp Messenger in May, […]

The post Israeli firm can steal your private data from Apple, Google, Facebook and Amazon appeared first on TechWorm.

bleepingcomputer.png 2019-07-20 14:52:05 Russian FSB Intel Agency Contractor Hacked, Secret Projects Exposed (lien direct)

A contractor for the Russian Federal Security Service (FSB) has been hacked and secret projects that were being developed for the intelligence agency were leaked to Russian Media. These projects detail Russia\'s attempt to de-anonymize users on the Tor network, collect data from social networks, and how to isolate the Russian internet [...]

no_ico.png 2019-07-20 14:50:05 Happy Apollo Day! (lien direct)

Today is the 50th Anniversary of “One small step for a man, one giant leap for mankind.” It’s an event worth celebrating, in the same way we celebrate Yuri’s Night. The holy days — the holidays — that we celebrate say a great deal about us. They shape who we are. The controversies that emerge…

Continue reading

InfosecIsland.png 2019-07-20 14:45:03 Cisco Patches Critical Flaw in Vision Dynamic Signage Director (lien direct)

Cisco released a security patch for the Vision Dynamic Signage Director, to address a Critical vulnerability (CVE-2019-1917) that could allow attackers to execute arbitrary actions on the local system.

SecurityWeek.png 2019-07-20 14:19:05 Scotland Yard Twitter and Emails Hacked (lien direct)

London\'s Metropolitan Police apologised Saturday after its Twitter, emails and news pages were targeted by hackers and began pumping out a series of bizarre messages.

read more

WiredThreatLevel.png 2019-07-20 13:00:00 Are Humans the Meanest Species in the Universe? (lien direct)

Melinda Snodgrass\' novel *The High Ground* examines human cruelty in an alien first-contact scenario.

WiredThreatLevel.png 2019-07-20 13:00:00 Browser Extensions Scraped Data From Millions of People (lien direct)

Slack passwords, NSO spyware, and more of the week\'s top security news.

ZDNet.png 2019-07-20 12:59:00 Hackers breach FSB contractor, expose Tor deanonymization project and more (lien direct)

SyTech, the hacked company, was working on research projects for the FSB, Russia\'s intelligence service.

bleepingcomputer.png 2019-07-20 12:22:01 Microsoft Edge Uses Controlled Feature Rollout to Test New Features (lien direct)

The Chromium-based Microsoft Edge is using Controlled Featured Rollout to test new features with randomly selected small groups of users. Over time, Microsoft gradually increases the size of the control group to garner further feedback and usage statistics. [...]

WiredThreatLevel.png 2019-07-20 12:00:00 How Formula E Racing Makes Electric Cars Faster, Smarter, Funner (lien direct)

For automakers like BMW, Audi, and Jaguar, making EVs for the track is a natural way to hone EVs for the streets.

WiredThreatLevel.png 2019-07-20 12:00:00 Sony RX 100 VI Review: It Does What Your Phone Camera Can\'t (lien direct)

It\'s small, lightweight, and has an impressive zoom. But that comes with a hefty price tag.

WiredThreatLevel.png 2019-07-20 11:00:00 Space Photos of the Week: This Apollo Went to 11 (lien direct)

The space race was the ultimate demonstration of US prowess. There was more to it than winning, though.

bleepingcomputer.png 2019-07-20 10:30:03 Windows Defender Gets a New Name: Microsoft Defender (lien direct)

Windows Defender is being rebranded to Microsoft Defender to indicate that it now part of a cross platform family of products. This includes enterprise products, which offer solutions for multiple OS platforms. [...]

SecurityAffairs.png 2019-07-20 05:18:02 Former NSA contractor sentenced to 9 years for stealing classified data (lien direct)

The former NSA contractor who pled guilty to stealing over 50TB of data from the Agency, was sentenced to nine years in prison The former National Security Agency contractor Harold Thomas Martin III, who was accused and subsequently pled guilty to stealing over 50TB of classified NSA data, was sentenced to nine years in prison. The man was […]

The post Former NSA contractor sentenced to 9 years for stealing classified data appeared first on Security Affairs.

WiredThreatLevel.png 2019-07-20 02:19:05 \'Game of Thrones\' Goes on a Victory Lap-and an Apology Tour (lien direct)

The show\'s farewell panel at Comic-Con was a one-sided goodbye.

Blog.png 2019-07-20 01:33:01 Symfonos:2 Vulnhub Walkthrough (lien direct)

Today we are going to take another CTF challenge from the series of Symfonos. The credit for making this VM machine goes to “Zayotic” and it is another boot2root challenge where we have to root the server and capture the flag to complete the challenge. You can download this VM here. Security Level: Intermediate Penetrating Methodology: Scanning... Continue reading

The post Symfonos:2 Vulnhub Walkthrough appeared first on Hacking Articles.

WiredThreatLevel.png 2019-07-19 23:58:02 The App Creeping on Your IG Location, Jakarta\'s Insurance Crisis, and More News (lien direct)

Catch up on the most important news from today in two minutes or less.

WiredThreatLevel.png 2019-07-19 23:53:00 Netflix\'s \'The Witcher\' Makes a Play to Be the Next \'Game of Thrones\' (lien direct)

The streaming service might have the new fantasy crossover hit.

no_ico.png 2019-07-19 23:33:00 Researchers Trick AI Algorithm Into Trusting Malware (lien direct)

Security researchers at Skylight Cyber have discovered a way to bypass a Machine Learning algorithm from Cylance, inserting code from a benign file that\'s been previously marked as safe. The algorithm is weighted to automatically trust this code, so will mark files containing it as safe, even if they contain malware or have been identified as malicious …

The ISBuzz Post: This Post Researchers Trick AI Algorithm Into Trusting Malware appeared first on Information Security Buzz.

TechRepublic.png 2019-07-19 21:41:05 How to use built-in design settings to quickly format an Office document (lien direct)

You can spend a long time formatting a Microsoft Word or Excel document to get just the look you want, or you can create a custom style set and click an option. You\'ll choose the latter once you give it a try.

TechRepublic.png 2019-07-19 21:27:01 Office Q&A: How to remove page numbers from a table of contents in a Word document (lien direct)

You can use built-in options to build a simple table of contents, but quite often, you\'ll need to change the underlying field code to get the results you want.

WiredThreatLevel.png 2019-07-19 21:25:04 Amazon Warns Customers: Those Supplements Might Be Fake (lien direct)

The company confirmed that it had notified users earlier this week that the Align supplements they purchased were likely counterfeits.

ZDNet.png 2019-07-19 21:04:00 Hackers breach 62 US colleges by exploiting ERP vulnerability (lien direct)

Hackers are breaching college networks and creating fake accounts that are used "almost immediately for criminal activity."

WiredThreatLevel.png 2019-07-19 20:44:00 Gadget Lab Podcast: Twitter\'s Major Design Overhaul (lien direct)

Twitter has launched its first major redesign in several years. The question is whether it\'s enough to make a dent in the hate and harassment.

SecurityAffairs.png 2019-07-19 20:38:02 Israel surveillance firm NSO group can mine data from major social media (lien direct)

The Israeli surveillance firm NSO Group informed its clients that it is able to scoop user data by mining from major social media. The Financial Times reported that the Israeli surveillance firm NSO Group informed its clients that it is able to mine user data from major social media. NSO is based in Herzliya, near […]

The post Israel surveillance firm NSO group can mine data from major social media appeared first on Security Affairs.

no_ico.png 2019-07-19 20:28:01 Fake Office 365 Site Pushes Trickbot Trojan As Browser Update (lien direct)

Attackers have created a fake Office 365 site that is distributing the TrickBot password-stealing Trojan disguised as Chrome and Firefox browser updates. In BleepingComputer’s testing, this fake Office 365 site found by MalwareHunterTeam looks like any site that would normally belong to Microsoft. In fact all of its links point to pages hosted on Microsoft domains.  Expert Comments:  Corin Imai, Senior Security Advisor at DomainTools: …

The ISBuzz Post: This Post Fake Office 365 Site Pushes Trickbot Trojan As Browser Update appeared first on Information Security Buzz.

no_ico.png 2019-07-19 19:15:01 Foreign Hackers Still Actively Targeting US Political Organisations (lien direct)

It has been reported that tech giant Microsoft says it has detected more than 740 infiltration attempts by nation-state actors in the past year targeting U.S.-based political parties, campaigns and other democracy-focused organisations including think tanks and other nonprofits. Microsoft did not say how many infiltration attempts were successful but noted in a blog post Wednesday that such targeting similarly …

The ISBuzz Post: This Post Foreign Hackers Still Actively Targeting US Political Organisations appeared first on Information Security Buzz.

no_ico.png 2019-07-19 19:15:01 Security Experts On Millions Of Chinese Citizens Exposed via Loan Apps Leaking Location And (lien direct)

Researchers have discovered financial data, personally identifiable information (PII), and real-time location of millions of Chinese users have been leaked by an open Elastic cluster hosted on infrastructure owned by Aliyun Computing Co (also known as Alibaba Cloud). The highly sensitive information was added to the publicly-accessible database by over 100 mobile loan-related apps used by Chinese people when applying …

The ISBuzz Post: This Post Security Experts On Millions Of Chinese Citizens Exposed via Loan Apps Leaking Location And appeared first on Information Security Buzz.

bleepingcomputer.png 2019-07-19 18:59:02 The Week in Ransomware - July 19th 2019 - Targeted Attacks (lien direct)

What a week. Every day we see a new city, police station, college, government agency, or company being affected by a ransomware attack. To make matters worse, they are getting hit with targeted ransomware that asks for a hefty price to get a decryptor. [...]

TechRepublic.png 2019-07-19 18:22:00 How to most efficiently use your storage (lien direct)

Compression and deduplication are mature, which is a nice way of saying their evolution is basically done.

WiredThreatLevel.png 2019-07-19 18:14:03 This App Lets Your Instagram Followers Track Your Location (lien direct)

By aggregating data from geotagged posts and stories, Who\'s in Town can paint a detailed picture of the habits and haunts of anyone with a Instagram account.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21

Information mise à jours le: 2019-07-22 04:01:37
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Flux RSS Twitter