What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
Kaspersky.png 2019-02-22 18:53:00 Video: HackerOne CEO on the Evolving Bug Bounty Landscape (lien direct)

Threatpost talks to HackerOne CEO Marten Mickos on the EU\'s funding of open source bug bounty programs, how a company can start a program, and the next generation of bounty hunters.

Kaspersky.png 2019-02-22 18:32:00 Data Breaches of the Week: Tales of PoS Malware, Latrine Status (lien direct)

U.S. and subcontinent consumers were the most affected by this week\'s exposure revelations.

no_ico.png 2019-02-22 18:30:02 Rockwell Automation Vulnerability – Energy Companies Worldwide At Risk (lien direct)

Following the news that a power monitor by Rockwell Automation, that is used by energy companies worldwide, is vulnerable to public exploits, Andrea Carcano, Co-founder and CPO at Nozomi Networks commented below. Andrea Carcano, Co-founder and CPO at Nozomi Networks: “Both the reported vulnerabilities are related to the web interface exposed by the device for …

The ISBuzz Post: This Post Rockwell Automation Vulnerability – Energy Companies Worldwide At Risk appeared first on Information Security Buzz.

SecurityWeek.png 2019-02-22 18:06:03 Bug Allows Bypass of WhatsApp Face ID, Touch ID Protection (lien direct)

The Face ID and Touch ID authentication feature introduced recently to WhatsApp for iOS can be easily bypassed, but a patch has been released.

read more

BBC.png 2019-02-22 18:03:04 Nike app for self-tying shoe comes undone (lien direct)

The Google Android app that controls the new Adapt BB fails to sync with wearers\' feet.

MalwarebytesLabs.png 2019-02-22 17:59:01 The Advanced Persistent Threat Files: APT1 (lien direct) Next up in the Advanced Persistent Threat Files: APT1, a unit of the People\'s Liberation Army of China known for wide-scale and high-volume data collection on mostly English-speaking companies.

Categories:

Criminals Threat analysis

Tags:

(Read more...)

The post The Advanced Persistent Threat Files: APT1 appeared first on Malwarebytes Labs.

no_ico.png 2019-02-22 17:55:00 Labour Party (lien direct)

Following the news that the Labour Party has been forced to lock down access to its membership databases over rumours of a data breach, IT security experts commented below.  Jake Moore, Cyber Security Expert at ESET:  “Political parties will always be on a hacker\'s radar so their security teams should never take their foot off the gas. Cyber criminals are usually …

The ISBuzz Post: This Post Labour Party appeared first on Information Security Buzz.

WiredThreatLevel.png 2019-02-22 17:42:01 Why Facebook Search Suggests \'Photos of Female Friends in Bikinis\' (lien direct)

The social network has been criticized for directing users to search for photos only of female friends, not male ones. But it\'s not all Facebook\'s fault.

Kaspersky.png 2019-02-22 17:21:01 Threatpost News Wrap Podcast For Feb. 22 (lien direct)

From password manager vulnerabilities to 19-year-old flaws, the Threatpost team broke down this week\'s biggest news stories.

SecurityWeek.png 2019-02-22 17:05:00 Entrust to Acquire Hardware Security Module Maker nCipher (lien direct)

Entrust Datacard and Thales have signed a definitive agreement for Entrust to acquire the nCipher general purpose hardware security module (GP HSM) division of Thales. Financial details have not been disclosed.

read more

SecurityWeek.png 2019-02-22 16:09:02 Cybercriminals Promise Millions to Skilled Black Hats: Report (lien direct)

Cybercriminals say they are willing to pay over a million dollars per year to individuals with network management, penetration testing, and programming skills willing to put on a black hat, a new Digital Shadows report reveals. 

read more

TechRepublic.png 2019-02-22 15:55:03 Dropbox Business adds multi-team admins to help large teams stay organized (lien direct)

The new feature is helpful for customers whose organizations have grown in scale. Here\'s how it works.

SecurityWeek.png 2019-02-22 15:43:04 DrainerBot SKD Sucks Data and Battery From Android Devices (lien direct)

A major mobile ad fraud operation impacts millions of users through infected consumer applications, Oracle reveals. 

read more

SecurityWeek.png 2019-02-22 15:05:00 Pulse Secure Unveils Software Defined Perimeter Solution (lien direct)

Pulse Secure, a company that specializes in secure access solutions, this week unveiled a new software defined perimeter (SDP) product designed to provide organizations direct secure access to their resources and applications.

read more

WiredThreatLevel.png 2019-02-22 15:00:00 Estimate the Friction Coefficient in That Massive Nascar Pile-Up (lien direct)

A crash knocked 21 cars out of the Daytona 500. But good news: Everyone walked away, and the video makes for a cool physics problem.

Blog.png 2019-02-22 14:52:01 Penetration Testing on Memcached Server (lien direct)

In our previous article, we learned how to configure Memcached Server in Ubuntu 18.04 system to design our own pentest lab. Today we will learn multiple ways to exploit Memcached Server. Table of Contents Dumping data from the Memcached server manually. Dumping data using libmemcached-tools. Dumping data using Metasploit. Monitoring using Watchers. Requirements Target: Memcached... Continue reading

The post Penetration Testing on Memcached Server appeared first on Hacking Articles.

TechRepublic.png 2019-02-22 14:45:01 Why CXOs are betting big on AI for business growth (lien direct)

With cloud and IoT adoption already underway, tech leaders are turning to artificial intelligence and machine learning initiatives, according to an EY report.

datasecuritybreach.png 2019-02-22 14:39:00 Un nouveau malware BabyShark cible les " Think Tanks " américains en charge de la sécurité intérieure (lien direct)

En février 2019, les chercheurs de l\'Unité 42 au sein de Palo Alto Networks ont identifié des mails d\'hameçonnage ciblé (spear phishing) envoyés en novembre 2018 qui contenaient un nouveau malware partageant la même infrastructure avec des playbooks(c\'est-à-dire des feuilles de route listant les actions et les objectifs utilisés par un malware ou une famille de […]

L\'article Un nouveau malware BabyShark cible les " Think Tanks " américains en charge de la sécurité intérieure est apparu en premier sur Data Security Breach.

ESET.png 2019-02-22 14:34:05 Cyber-extortionists take aim at lucrative targets (lien direct)

A new report shines some light on multiple aspects of the growing threat of cyber-extortion

itsecurityguru.png 2019-02-22 14:17:01 How To Get In Shape For Today\'s Security Challenges And Counter Ransomware Attack. (lien direct)

By Andreas Bechter, Global Technical Alliance Manager at Veritas Technologies Recently, I\'ve been doing intensive exercise. Not to lose some pounds before the inevitable post-Christmas weight gain, but because I\'m getting ready for an XLETIX obstacle course in Munich. It won\'t be easy. I\'ll need to run, climb, jump and crawl past miles of mud […]

The post How To Get In Shape For Today\'s Security Challenges And Counter Ransomware Attack. appeared first on IT Security Guru.

itsecurityguru.png 2019-02-22 14:13:01 Adverts selling logins for hacked accounts on adult websites doubled in 2018. (lien direct)

The number of adverts selling logins for hacked accounts on adult websites doubled in 2018. The number of detections for malware strains that hunt for login credentials on adult-themed websites tripled in 2018, while the number of adverts selling access to hacked accounts on porn portals doubled, according to a report published today by Kaspersky […]

The post Adverts selling logins for hacked accounts on adult websites doubled in 2018. appeared first on IT Security Guru.

itsecurityguru.png 2019-02-22 14:12:04 California proposes tougher customer protections. (lien direct)

California officials proposed legislation that, if passed, would set stricter guidelines for when companies need to inform customers of a data breach. The bill would require companies to notify California residents when their passport, passport card or green card numbers are compromised in data breaches. It would also require customers be notified of compromised biometric […]

The post California proposes tougher customer protections. appeared first on IT Security Guru.

itsecurityguru.png 2019-02-22 14:11:05 WTF PDF: Adobe re-patching its Acrobat, Reader patches. (lien direct)

Plus: How Microsoft Edge helps Facebook Flash files dodge click-to-play rules in Edge. Adobe is taking a second crack at patching security bugs in its Acrobat and Reader PDF apps. The APSB19-13 release, out today, attempts to completely kill off vulnerability CVE-2019-7089, which a software update earlier this month tried to address but was found to have […]

The post WTF PDF: Adobe re-patching its Acrobat, Reader patches. appeared first on IT Security Guru.

itsecurityguru.png 2019-02-22 14:10:04 Critical vulnerabilities in Bigscreen VR app. (lien direct)

A vulnerability in both the Bigscreen virtual reality app and the Unity game development platform on which it’s built makes it possible for hackers to listen to conversations and access user computers, according to researchers at the University of New Haven. “Our research shows hackers are able to monitor people day in and day out […]

The post Critical vulnerabilities in Bigscreen VR app. appeared first on IT Security Guru.

itsecurityguru.png 2019-02-22 14:09:04 Labour reports former MP Joan Ryan to the Information Commissioner\'s Office. (lien direct)

Labour Party claims MP contacted its supporters after quitting for the Independent Group. Labour has reported its former MP Joan Ryan to the Information Commissioner\'s Office, though she strongly denies accessing party systems to contact members after resigning from the party on Tuesday to join the breakaway Independent Group. It is understood the party has informed the commissioner about […]

The post Labour reports former MP Joan Ryan to the Information Commissioner\'s Office. appeared first on IT Security Guru.

AlienVault.png 2019-02-22 14:00:00 Things I Hearted This Week, 22 Feb 2019 (lien direct)

We have two weeks of news to catch up with because I was travelling last week and wasn’t able to submit to the editor in time.

But that just means double the security fun. So let’s just jump right into it.

Helping The Smaller Businesses

Small and mid-sized businesses have most of the same cybersecurity concerns of larger enterprises. What they don't have are the resources to deal with them. A new initiative, the Cybersecurity Toolkit, is intended to bridge that gulf and give small companies the ability to keep themselves safer in an online environment that is increasingly dangerous.

Security Isn’t Enough. Silicon Valley Needs ‘Abusability’ Testing

It is time for Silicon Valley to take the potential for unintended, malicious use of its products as seriously as it takes their security. From Russian disinformation on Facebook, Twitter, and Instagram to YouTube extremism to drones grounding air traffic, Tech companies need to think not just about protecting their own users but about abusability: the possibility that users could exploit their tech to harm others, or the world.

Hackers Wipe US Servers of Email Provider VFEmail

Email provider VFEmail.net were compromised and disks formatted. Every VM, file server, and backup server was lost.

No ransom demand, no notice, just attack and destroy.

CISO Spotlight: Security Goals and Objectives for 2019

Rick Holland shares his security goals and objectives for 2019, which has some great insights and tips such as hyperfocusing on process / program improvements, establishing a security and risk playbook, avoiding ‘expense in depth’, eating their own BBQ, and investing in the team.

Court Camera Used to Spy on Juror’s Notebook

Some defense attorneys in San Juan County worry that Sheriff Ron Krebs has a finger on the scales of justice after learning he used a courtroom security camera to surreptitiously zoom in on defense documents and a juror’s notebook during a criminal trial last week.

The incident has drawn outrage from criminal and civil-rights attorneys and frustration from the county prosecutor, and prompted a rare weekend hearing during which a judge dismissed misdemeanor assault and trespass charges against a Lopez Island man after finding the incident amounted to government misconduct that had violated his right to a fair trial.

WiredThreatLevel.png 2019-02-22 14:00:00 One Woman Pushes Hula-Hooping to Its Absurd, Glittery Limits (lien direct)

How many hoops can a person hula? Marawa Ibrahim holds the record at 200-but when she\'s twirling a modest 100, her skill makes your head spin.

WiredThreatLevel.png 2019-02-22 14:00:00 Hyundai Nexo Review: The Hydrogen Fuel Cell-Powered Electric SUV (lien direct)

Hyundai has made an excellent car, but that may not be enough to overcome the difficulties of driving on hydrogen.

WiredThreatLevel.png 2019-02-22 14:00:00 How to Watch the Oscars 2019 (lien direct)

No host? That\'s a good thing. Here\'s how to tune in for the (fingers-crossed it\'s streamlined) ceremony.

TechRepublic.png 2019-02-22 13:55:01 Verizon\'s 5G network launch: What your business needs to know (lien direct)

Verizon will launch 5G in 30 cities this year, and both offices and remote workers stand to benefit.

TechRepublic.png 2019-02-22 13:46:00 ​5 tips: Choosing the best cloud vendor (lien direct)

When it comes to cloud security, know the difference between a great--or just okay--cloud vendor.

SecurityAffairs.png 2019-02-22 13:42:03 Google forgot to tell customers that Nest Hub has a microphone (lien direct)

Google on Wednesday revealed that it forgot to inform users that its Nest Secure home alarm system includes a microphone. Google announced this week that it forgot to inform users that its Nest Secure home alarm system includes a microphone. “The problem: Nest users didn’t know a microphone existed on their security device to begin […]

The post Google forgot to tell customers that Nest Hub has a microphone appeared first on Security Affairs.

TechRepublic.png 2019-02-22 13:41:01 ​4 steps to user buy-in for big data (lien direct)

Maximizing big data efforts remains a work in progress for many companies. Here\'s how to increase user adoption.

WiredThreatLevel.png 2019-02-22 13:00:00 Facebook Tamed the Feral Internet-and That\'s Too Bad (lien direct)

At least we still have Twitter.

The_State_of_Security.png 2019-02-22 12:32:01 Proposed Bill Would Strengthen California\'s Data Breach Notification Law (lien direct)

A new bill would strengthen California’s data breach notification law by expanding the types of information of whose exposure businesses are legally obligated to inform their customers. On 21 February, California Attorney General Xavier Becerra and Assembly Member Marc Levine (D-San Rafael) revealed AB 1130. This bill would require businesses to notify customers of a […]… Read More

The post Proposed Bill Would Strengthen California’s Data Breach Notification Law appeared first on The State of Security.

Kaspersky.png 2019-02-22 12:11:04 Threatpost Poll: Are Password Managers Too Risky? (lien direct)

Weigh in on password managers with our Threatpost poll.

WiredThreatLevel.png 2019-02-22 12:00:00 NASA\'s Space Shuttle Rises From the Dead to Power New Vehicles (lien direct)

New documents show that Boeing wants to use Space Shuttle engines on a secret military project, the latest move to reuse parts of the famous vehicle.

WiredThreatLevel.png 2019-02-22 12:00:00 Thumbtack Tries Bridging the Benefits Gap for Gig Workers (lien direct)

As tech companies draw scrutiny over on-demand labor practices, one platform is piloting a program in which worker benefits are supported by customers.

itsecurityguru.png 2019-02-22 11:55:02 Capgemini Announces The Closing Of The Acquisition Of Leidos Cyber, The Commercial Cybersecurity Division Of Leidos. (lien direct)

Capgemini announced today, following the fulfillment of all regulatory requirements, the closing of the acquisition of Leidos Cyber, the commercial cybersecurity arm of the FORTUNE 500® companyLeidos, announced in June 2018. The team of almost 500 elite cybersecurity professionals, located mainly in North America, will join the Group to address its increasing client demand for […]

The post Capgemini Announces The Closing Of The Acquisition Of Leidos Cyber, The Commercial Cybersecurity Division Of Leidos. appeared first on IT Security Guru.

itsecurityguru.png 2019-02-22 11:54:03 Aquilai Launches Ajax Intelligence Phishing Solution. (lien direct)

Aquilai has launched their cloud based Ajax Intelligence solution to combat all forms of email phishing prevalent on Microsoft Exchange, Office 365 and G Suite emails. Shaped in collaboration with GCHQ and National Cyber Security Centre staff, Ajax Intelligence is the most effective solution against email phishing available on the market. The architecture is optimised […]

The post Aquilai Launches Ajax Intelligence Phishing Solution. appeared first on IT Security Guru.

itsecurityguru.png 2019-02-22 11:54:00 New Kaspersky CyberTrace Streamlines Threat Intelligence Flows For Better Initial Response To Cyberthreats. (lien direct)

With the number of available threat intelligence sources continuing to grow, a third of CISOs feel under pressure as they cannot consume cybercrime intelligence easily or effectively. To help large companies overcome this challenge, Kaspersky Lab has launched Kaspersky CyberTrace – a free threat intelligence fusion and analysis tool. It aggregates and evaluates disconnected data […]

The post New Kaspersky CyberTrace Streamlines Threat Intelligence Flows For Better Initial Response To Cyberthreats. appeared first on IT Security Guru.

itsecurityguru.png 2019-02-22 11:53:04 ISC)² Invests In The Professional Development Of Global Cybersecurity Workforce. (lien direct)

(ISC)² – the world\'s largest non-profit membership association of certified cybersecurity professionals – today announced the founding of its Professional Development Institute (PDI) to combat one of the largest challenges facing the cybersecurity community today – a global shortage of skilled and trained professionals to defend organizations against the evolving onslaught of cyber threats. Provided […]

The post ISC)² Invests In The Professional Development Of Global Cybersecurity Workforce. appeared first on IT Security Guru.

itsecurityguru.png 2019-02-22 11:53:02 CylancePROTECT Now Available On AWS Marketplace. (lien direct)

Cylance Inc., the leading provider of AI-driven, prevention-first security solutions, today announced the availability of its award-winning endpoint protection offering, CylancePROTECT® on AWS Marketplace. Cylance has built the largest AI platform in the industry, enabling it to offer a portfolio of solutions ranging from enterprise endpoint protection, detection, and response, to Smartantivirus for consumers, to […]

The post CylancePROTECT Now Available On AWS Marketplace. appeared first on IT Security Guru.

zataz.png 2019-02-22 11:44:01 J\'ai installé un virus sur ton ordinateur pendant que tu visitais ton site pour adulte (lien direct)

Ce que je craignais depuis plusieurs semaines vient d’arriver. L’arnaque " J\'ai installé un virus sur ton ordinateur pendant que tu visitais ton site pour adulte " prend une nouvelle dimension avec un moyen de faire payer les internautes de manière plus … efficace. Depuis le mois d...

Cet article J\'ai installé un virus sur ton ordinateur pendant que tu visitais ton site pour adulte est apparu en premier sur ZATAZ.

ZDNet.png 2019-02-22 11:42:00 Fake Google reCAPTCHA used to hide Android banking malware (lien direct)

The phishing campaign impersonates Google in attacks against banking institutions and their users.

DarkReading.png 2019-02-22 11:20:00 New Legislation Builds on California Data Breach Law (lien direct)

This bill requires businesses to notify consumers of compromised passport numbers and biometric data.

ZDNet.png 2019-02-22 11:00:00 Credit card details worth nearly $3.5 million put up for sale on hacking forum (lien direct)

Card details of 2.15 million Americans advertised in a separate forum ad.

ZDNet.png 2019-02-22 10:28:02 Adobe sends out second fix for critical Reader data leak vulnerability (lien direct)

The original patch issued for the zero-day can be bypassed.

ESET.png 2019-02-22 10:27:00 ML-era in cybersecurity: A step toward a safer world or the brink of chaos? (lien direct)

As the use of this technology grows so to does the risk that attackers may hijack it

The_Hackers_News.png 2019-02-22 07:56:03 How to Stop Facebook App From Tracking Your Location In the Background (lien direct)

Every app installed on your smartphone with permission to access location service "can" continually collect your real-time location secretly, even in the background when you do not use them. Do you know? - Installing the Facebook app on your Android and iOS smartphones automatically gives the social media company your rightful consent to collect the history of your precise location. If you

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21

Information mise à jours le: 2019-02-22 20:01:43
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Flux RSS Twitter