What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
ZDNet.png 2019-03-26 01:27:05 LockerGoga bug crashes ransomware before encrypting files (lien direct)

Bug could be used to create (temporary) LockerGoga vaccines.

WiredThreatLevel.png 2019-03-25 23:00:05 Apple Enters the Credit Card Market With-Yep-Apple Card (lien direct)

Apple Card lives both in the existing Wallet app and as a status-signaling physical titanium card.

TechRepublic.png 2019-03-25 22:56:00 Windows logo keyboard shortcuts: The complete list (lien direct)

The Windows logo key, which is common on most keyboards these days, can be a powerful tool if you know the right shortcuts. Here\'s an updated list to speed your work.

WiredThreatLevel.png 2019-03-25 22:17:03 Breaking Down Apple News+, Apple TV+, Apple Card and More (lien direct)

Catch up on the most important news today in 2 minutes or less.

WiredThreatLevel.png 2019-03-25 22:17:00 McDonald\'s Acquires Machine-Learning Startup Dynamic Yield for $300 Million (lien direct)

The fast-food giant\'s largest acquisition in 20 years is bringing machine learning to the drive-thru.

ZDNet.png 2019-03-25 22:05:01 Android ecosystem of pre-installed apps is a privacy and security mess (lien direct)

Extensive academic study finds data-harvesting and malware-laced pre-installed apps.

WiredThreatLevel.png 2019-03-25 21:35:04 All the New Services Apple Announced: News+, TV+, Apple Card, Apple Arcade (lien direct)

Apple held a media event at its Cupertino, California campus on Monday morning. It showed off a host of new content services and launched its own credit card.

no_ico.png 2019-03-25 21:27:04 Millions Of Emails Exposed In Oregon DHS Data Breach (lien direct)

News recently broke that the emails of over 350k clients of the Oregon Department of Human Services (DHS) have potentially been compromised after 9 employees were the target of a spear phishing campaign.  It left 2 million emails potentially exposed.   The Oregon Department of Human Services announced that roughly 2 million emails with Protected Health Information …

The ISBuzz Post: This Post Millions Of Emails Exposed In Oregon DHS Data Breach appeared first on Information Security Buzz.

bleepingcomputer.png 2019-03-25 21:11:03 iOS 12.2 Patches Over 50 Security Vulnerabilities (lien direct)

Apple released today security updates for iOS, fixing 51 vulnerabilities in version 12.2 of the operating system. The products impacted are iPhone 5s and later, iPad Air and newer, 6th generation iPods. [...]

SecurityAffairs.png 2019-03-25 21:08:03 Operation ShadowHammer – Supply-Chain attack hit ASUS users (lien direct)

Operation ShadowHammer – ASUS is the last victim of a clamorous supply chain attack that delivered a backdoor to more than one million users, Kaspersky Lab reported. Over 1 million ASUS users may have been impacted by a supply chain attack that leveraged the ASUS Live Update utility to inject a backdoor in ASUS systems. […]

The post Operation ShadowHammer – Supply-Chain attack hit ASUS users appeared first on Security Affairs.

Kaspersky.png 2019-03-25 20:52:05 ThreatList: Remote Workers Threaten 1 in 3 Organizations (lien direct)

More than one-third of surveyed organizations (36 percent) said have experienced a security incident because of a remote worker\'s actions.

WiredThreatLevel.png 2019-03-25 20:15:00 How to Check Your Computer for Hacked Asus Software Update (lien direct)

Hackers compromised Asus\'s Live Update tool to distribute malware to almost a million people. Here\'s how to find out if your computer has it.

WiredThreatLevel.png 2019-03-25 19:29:01 Apple TV+ Is Here-but the Streaming Service Has a Long Way to Go (lien direct)

The streaming service has big names, and deep pockets, but must-watch programming? Dunno.

TechRepublic.png 2019-03-25 18:42:05 What to expect from Ubuntu 19.04 (lien direct)

The next iteration of Ubuntu is a month away. Find out what new features and improvements will find their way into one of the most popular Linux distributions.

TechRepublic.png 2019-03-25 18:39:01 How to care for the fragile nature of strategy (lien direct)

Determining your strategy may seem like the hard part. In reality, it\'s protecting and nurturing your strategy as it\'s developed and executed.

TechRepublic.png 2019-03-25 18:34:02 Apple\'s next big innovation: Becoming a bank via Apple Card (lien direct)

Forget Apple\'s TV+. Forget Apple News+. The real innovation and key to Apple\'s growth will be its spash into the credit card market.

WiredThreatLevel.png 2019-03-25 18:26:02 Meet LockerGoga, the Ransomware Crippling Industrial Firms (lien direct)

The new strain of malware represents a dangerous combination of aggressive disruption and high-stakes targets.

no_ico.png 2019-03-25 18:19:01 Facial Recognition Implemented By US Customs & Border Protection (lien direct)

The US Customs and Border Protection program called Biometric Exit has already been rolled out in 17 airports in the US. While passenger convenience is enhanced, there are some privacy concerns that have been raised. Facial recognition in airports: "The US Customs and Border Protection program, called Biometric Exit, is in 17 airports… The agency …

The ISBuzz Post: This Post Facial Recognition Implemented By US Customs & Border Protection appeared first on Information Security Buzz.

WiredThreatLevel.png 2019-03-25 18:14:03 Apple Launches Apple News+ Paid Subscription Service (lien direct)

Apple News Plus will cost $10 a month and provide subscribers with feature stories from hundreds of magazines and newspapers.

TechRepublic.png 2019-03-25 18:12:05 Apple launches Apple Card in payments services expansion (lien direct)

The Apple-branded credit card that offers a streamlined application process, daily cash back and enhanced security.

Kaspersky.png 2019-03-25 18:10:02 Malware Payloads Hide in Images: Steganography Gets a Reboot (lien direct)

Low-key but effective, steganography is an old-school trick of hiding code within a normal-looking image, where many cybersecurity pros may not think to look.

TechRepublic.png 2019-03-25 18:05:05 How to add the apps you choose to the Windows 10 context menu (lien direct)

The Windows 10 Context Menu is a powerful tool, but it has limits.

Blog.png 2019-03-25 17:42:04 NEW TECH: Data Theorem helps inventory sprawling APIs - as the first step to securing them (lien direct)

Remember when software used to come on CDs packaged in shrinked-wrapped boxes, or even before that, on floppy disks? Related: Memory-based attacks on the rise If you bought a new printer and wanted it to work on your desktop PC, you\'d have to install a software driver, stored on a floppy disk or CD, to […]

News.png 2019-03-25 17:38:04 Right-Wing Donor Adam Milstein Has Spent Millions of Dollars to Stifle the BDS Movement and Attack Critics of Israeli Policy (lien direct)

Gila Milstein, left, and husband Adam Milstein attend the American Friends of Magen David Adom\'s Red Star Ball at The Beverly Hilton Hotel on Nov. 1, 2016 in Beverly Hills, Calif.

Kaspersky.png 2019-03-25 17:30:05 Bugs in Grandstream Gear Lay Open SMBs to Range of Attacks (lien direct)

Attackers can remotely compromise multiple network devices (IP PBX, conferencing gear and IP phones), installing malware and eavesdropping via video and audio functions.

grahamcluley.png 2019-03-25 17:07:03 DLA Piper and its insurers clash over multi-million NotPetya payout (lien direct)
DLA Piper and its insurers clash over NotPetya payout

Multinational law firm was hit in the crossfire as Russia-backed ransomware spread, and Hiscox is reportedly declining to pay up citing an “act of war”.

TechRepublic.png 2019-03-25 16:56:05 How to install OpenSSH on Windows 10 to encrypt network communications (lien direct)

Learn how to use SSH natively within Windows 10 to secure communications between network devices.

bleepingcomputer.png 2019-03-25 16:54:01 Skype Experiencing Global Instant Messaging Delays (lien direct)

Skype\'s Instant Messaging service is currently experiencing delays in syncing and sending messages in multiple countries and regions according to Microsoft and a multitude of user reports. [...]

securityintelligence.png 2019-03-25 16:40:02 Adopting the NIST 800-53 Control Framework? Learn More About the Anticipated Changes in 2019 (lien direct)

>Organizations adopting NIST 800-53 should understand how upcoming changes will affect senior leadership accountability, data privacy and third-party assessments.

The post Adopting the NIST 800-53 Control Framework? Learn More About the Anticipated Changes in 2019 appeared first on Security Intelligence.

Kaspersky.png 2019-03-25 16:40:02 Some ASUS Updates Drop Backdoors on PCs in \'Operation ShadowHammer\' (lien direct)

The attack appears to be associated with a China-backed APT actor.

bleepingcomputer.png 2019-03-25 16:29:02 Firefox to Import Windows Root Certs To Avoid Antivirus SSL Scanning Issues (lien direct)

In order to prevent future errors caused by the SSL scanning feature of many antivirus programs, Mozilla is performing a test that imports the Windows root certificates into Firefox. [...]

ZDNet.png 2019-03-25 16:20:05 Google fixes Chrome \'evil cursor\' bug abused by tech support scam sites (lien direct)

Evil cursor trick was being abused by Partnerstroka gang to trap users on tech support sites.

DarkReading.png 2019-03-25 16:10:00 Attackers Compromise ASUS Software Update Servers to Distribute Malware (lien direct)

ShadowHammer campaign latest to highlight dangers of supply chain attacks.

WiredThreatLevel.png 2019-03-25 16:05:00 The Comedian With the Best Trump Impression? None of Them (lien direct)

Few, if any, actors have been able to accurately mimic the president\'s style.

WiredThreatLevel.png 2019-03-25 16:02:03 \'Us\' Broke a Lot of Box Office Records (lien direct)

Jordan Peele\'s horror flick made a lot of cash this weekend. Also, one of the Jonas Brothers knows how \'Game of Thrones\' ends.

ESET.png 2019-03-25 15:47:01 Two white hats hack a Tesla, get to keep it (lien direct)

>The electric automaker is working to release a fix for the underlying vulnerability in a matter of days

The post Two white hats hack a Tesla, get to keep it appeared first on WeLiveSecurity

MalwarebytesLabs.png 2019-03-25 15:46:03 A week in security (March 18 – 24) (lien direct) A roundup of cybersecurity news from March 18–24, including Facebook\'s privacy pivot, password reuse, new research on hospital phishing attacks, infected iPhone apps, and more.

Categories:

Security world Week in security

Tags:

(Read more...)

The post A week in security (March 18 – 24) appeared first on Malwarebytes Labs.

grahamcluley.png 2019-03-25 15:35:01 Popular family tracking app exposed real-time location data onto the internet – no password required (lien direct)
Popular family tracking app exposed real-time location data onto the internet – no password required

More than 238,000 individuals users have had their family\'s real-time location exposed for weeks on end after an app developer left sensitive data exposed on the internet, without a password.

Read more in my article on the Hot for Security blog.

bleepingcomputer.png 2019-03-25 15:08:02 Apple Introduces New Products During \'It\'s Show Time\' Event (lien direct)

During the Apple Special Event held today at the Steve Jobs Theater, Cupertino, CA, Apple announced new ways through which its customers can experience news and magazines, TV shows, and games, as well as a new type of credit card. [...]

no_ico.png 2019-03-25 15:04:03 Zero-day In WordPress SMTP Plug-in (lien direct)

The Easy WP SMTP Plug-in that is used by WordPress site owners to configure the SMTP settings of their site server’s outgoing emails, is being leveraged by hacker groups to create backdoor admin accounts and redirecting users to tech support scams. Both NinTechNet and Defiant – cybersecurity companies have reported the attacks. Does your WordPress website have either 'Easy …

The ISBuzz Post: This Post Zero-day In WordPress SMTP Plug-in appeared first on Information Security Buzz.

SecurityAffairs.png 2019-03-25 15:01:00 Anubis II – malware and afterlife (lien direct)

Due to the growing demand for Android banking malware, threat actors continue using Anubis even is the creator has vanished. Introduction Besides being the Egyptian God associated with mummification and afterlife, Anubis is also an Android banking malware that has caused quite some trouble for over 300 financial institutions worldwide since 2017. Anubis II is […]

The post Anubis II – malware and afterlife appeared first on Security Affairs.

ANSSI.png 2019-03-25 15:01:00 VIENNA CYBER SECURITY WEEK 2019 – L\'engagement international pour la protection des infrastructures critiques (lien direct)

Représentant de cinquante-sept États à travers le monde, l\'OSCE est une organisation d\'ampleur internationale, qui agit pour la sécurité et la stabilité à l\'international. Elle participe à ce titre, depuis plusieurs années, au développement et au partage de la confiance numérique. Notamment la création et l\'adoption de mesures communes pour accroitre la coopération et la […]

TechRepublic.png 2019-03-25 15:00:02 Top 5 business concerns about public cloud applications (lien direct)

Some 99% of companies receive direct business value from cloud visibility, according to a Keysight Technologies report.

TechRepublic.png 2019-03-25 14:51:04 Apple\'s new iPads: The features business users will love (lien direct)

While Apple\'s new iPad Air and iPad Mini are largely just hardware updates, there are features that make the mobile devices great for business users.

ZDNet.png 2019-03-25 14:27:03 Hijacked ASUS Live Update software installs backdoors on countless PCs worldwide (lien direct)

ASUS reportedly distributed the hijacked software to users last year.

itsecurityguru.png 2019-03-25 14:19:02 Hackers could hack defibrillator implants. (lien direct)

A major flaw in defibrillator implants, used by more than 31,000 people in the UK, could allow hackers to take control of the devices and harm patients. The US Department of Homeland Security has issued a warning on devices used to treat patients with heart conditions, stating that an attacker could modify or control a […]

The post Hackers could hack defibrillator implants. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-25 14:18:03 Family Locator, a family tracking app, leaked real-time location data. (lien direct)

A popular family tracking app was leaking the real-time locations of more than 238,000 users for weeks after the developer left a server exposed without a password. Source: Tech Crunch

The post Family Locator, a family tracking app, leaked real-time location data. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-25 14:17:05 FEMA, US Disaster Relief organisation, exposes 2.3 million survivors\' personal details. (lien direct)

Disaster relief org FEMA has admitted, conveniently on a Friday night, to accidentally leaking banking details and other personal information of 2.3 million hurricane and wildfire survivors. Source: The Register

The post FEMA, US Disaster Relief organisation, exposes 2.3 million survivors\' personal details. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-25 14:16:05 RBS customers at risk of cyber attack due to security flaw. (lien direct)

Royal Bank of Scotland (RBS) customers have been put at risk of cyber-attack after being recommended flawed security software. Since January, the banking group has begun to offer its business banking customers a product called Thor Foresight Enterprise free of charge. Security researchers uncovered a flaw in it that made customers less secure. Source: BBC […]

The post RBS customers at risk of cyber attack due to security flaw. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-25 14:15:03 Security Researchers hack Telsa Car at Pwn2Own contest. (lien direct)

A team of security researchers has hacked a Tesla Model 3 car on the last day of the Pwn2Own 2019 hacking contest that was held this week in Vancouver, Canada. Team Fluoroacetate –made up of Amat Cama and Richard Zhu– hacked the Tesla car via its browser. They used a JIT bug in the browser renderer process […]

The post Security Researchers hack Telsa Car at Pwn2Own contest. appeared first on IT Security Guru.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21

Information mise à jours le: 2019-03-26 04:01:32
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Flux RSS Twitter