What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
SecurityAffairs.png 2019-09-21 15:16:32 Iran denies successful cyber attacks hit infrastructures of its oil sector (lien direct)

In the last hours, some western media reported destructive cyber attacks against infrastructures in the Iranian oil sector, but Iran denied it. Last week drone attacks have hit two major oil facilities run by the state-owned company Aramco in Saudi Arabia, one of them is the Abqaiq site. Western Governments and Saudi Arabia blamed Iran for […]

The post Iran denies successful cyber attacks hit infrastructures of its oil sector appeared first on Security Affairs.

SecurityAffairs.png 2019-09-21 14:37:13 MMD-0063-2019 – Summarize report of three years MalwareMustDie research (Sept 2016-Sept 2019) (lien direct)

Hello, it’s unixfreaxjp here. It has been a while since I wrote our own blog, and it is good to be back. Thank you for your patience for all of this time. The background It was after September 2016 when we decided to move our blog and since then I had a lot of fun […]

The post MMD-0063-2019 – Summarize report of three years MalwareMustDie research (Sept 2016-Sept 2019) appeared first on Security Affairs.

SecurityAffairs.png 2019-09-21 14:09:15 One of the hackers behind EtherDelta hack also involved in TalkTalk hack (lien direct)

US authorities have indicted two men for hacking the exchange EtherDelta in December 2017, one of them was also accused of TalkTalk hack. US authorities have indicted two men, Elliot Gunton and Anthony Tyler Nashatka, for hacking the cryptocurrency exchange EtherDelta in 2017. In December 2017, the popular cryptocurrency exchange EtherDelta was hacked, attackers conducted […]

The post One of the hackers behind EtherDelta hack also involved in TalkTalk hack appeared first on Security Affairs.

ZDNet.png 2019-09-21 14:05:00 Apple neutered ad blockers in Safari, but unlike Chrome, users didn\'t say a thing (lien direct)

On the other hand, everyone was busy blasting Google for a similar plan in Chrome.

WiredThreatLevel.png 2019-09-21 14:00:00 Space Photos of the Week: Cassini\'s Sojourn Around Saturn (lien direct)

Orbital images of the planet\'s iconic rings approach fine art.

WiredThreatLevel.png 2019-09-21 14:00:00 How Vikings Went Into a Trancelike Rage Before Battle (lien direct)

Ethnobotanists have a new theory on which plant the berserkers ingested.

bleepingcomputer.png 2019-09-21 13:01:48 Jira Server and Service Desk Fix Critical Security Bugs (lien direct)

Atlassian released updates for Jira Service Desk and Jira Service Desk Data Center to fix a critical-severity security bug that can be exploited by anyone with access to a vulnerable customer portal. [...]

WiredThreatLevel.png 2019-09-21 13:00:00 \'The Dark Crystal\' Prequel Is \'Game of Thrones\' With Puppets (lien direct)

Netflix\'s 10-episode series is very, very impressive and has at least one Muppet-phobic freaked out.

WiredThreatLevel.png 2019-09-21 13:00:00 Extreme-Risk Laws Reduce Gun Violence (lien direct)

Opinion: Red Flag laws help prevent suicides and mass shootings, and buy time for people in crisis to get help.

WiredThreatLevel.png 2019-09-21 13:00:00 WeWork\'s Wi-Fi Is Woefully Insecure (lien direct)

The Saudi oil strike, a license plate privacy disaster, and more of the week\'s top security news.

WiredThreatLevel.png 2019-09-21 12:15:40 A Simple Way to Make It Harder for Mobile Ads to Track You (lien direct)

Beating back the scourge of online ad tracking entirely is almost impossible. But you can futz with your smartphone\'s "ad ID" to slow it down.

WiredThreatLevel.png 2019-09-21 12:00:00 Hackers Hit Click2Gov Bill-Paying Portals in 8 Cities (lien direct)

The new wave of attacks comes after a previous Click2Gov hack compromised 300,000 payment cards.

WiredThreatLevel.png 2019-09-21 12:00:00 Garmin 6S Pro Review: A Sports Party for Your Wrist (lien direct)

Garmin\'s latest multisport watch is a bonanza of wrist-based navigation, data-tracking, and battery-saving features.

WiredThreatLevel.png 2019-09-21 11:00:00 Amazon and the All-Electric Future of Fleet Vehicles (lien direct)

Fleets, like the 100,000 delivery vans the retailer ordered from startup Rivian, will make electrics seem more commonplace, and easier to charge.

WiredThreatLevel.png 2019-09-21 11:00:00 It\'s a Great Time to Buy a Kindle (and 10 More Tech Deals) (lien direct)

Amazon is clearing out Kindles, and there are some deep discounts on some iPhone alternatives this weekend.

WiredThreatLevel.png 2019-09-21 11:00:00 Apple Arcade Makes You Ask, What Is a Videogame Worth? (lien direct)

The curated ecosystem can be great for creators, but it alters the perceived value of certain titles.

bleepingcomputer.png 2019-09-21 09:45:04 Microsoft Marks Two Windows 10 1903 Issues as Resolved (lien direct)

Microsoft has marked a Windows 10 Chinese IME issue and a Windows Desktop Search or Start Menu issue as resolved in the Windows 10 Health Dashboard. [...]

SecurityAffairs.png 2019-09-21 08:32:03 5 Cybersecurity Trends in the Professional Services Sector (lien direct)

Cybersecurity is an increasingly significant focus for many companies as cyberattacks become more frequent and more costly. Which are 5 Cybersecurity trends in the professional services sector? Professional services organizations are especially vulnerable due to the high value of the industry and the data they store - like Social Security numbers, personal financial information and classified […]

The post 5 Cybersecurity Trends in the Professional Services Sector appeared first on Security Affairs.

Blog.png 2019-09-21 04:50:53 DC8: Vulnhub Walkthrough (lien direct)

DC8 VM is made by DCAU. This VM is a purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing. It is of intermediate level and is very handy in order to brush up your skills as a penetration tester. The ultimate goal of this challenge is to bypass... Continue reading

The post DC8: Vulnhub Walkthrough appeared first on Hacking Articles.

Blog.png 2019-09-20 23:11:21 RSA warns Digital Transformation is supercharging Digital Risk (lien direct)

“Digital transformation” is the buzz word du jour in industry. But executives at RSA Security warn that it is also magnifying digital risk in ways that are easy to miss. -->

WiredThreatLevel.png 2019-09-20 22:49:24 A Developer Deletes His Code to Protest Its Use by ICE (lien direct)

Seth Vargo removed a tool used by customers of his former employer, Chef. The company quickly restored it, because the software is open source.

WiredThreatLevel.png 2019-09-20 22:47:54 \'Inside Bill\'s Brain\' Calls BS on Malcolm Gladwell\'s \'Outliers\' Theory (lien direct)

The author and pundit claimed he knew the formula for the Microsoft cofounder\'s genius. Davis Guggenheim\'s Netflix doc shows a much more logical equation.

WiredThreatLevel.png 2019-09-20 22:18:17 The Area 51 Raid Was the Worst Way to Spot an Alien or UFO (lien direct)

Dozens of revelers gathered near the top-secret base, purportedly hoping to glimpse some extraterrestrial life-but all they got were memes and selfies.

WiredThreatLevel.png 2019-09-20 21:32:08 Why It Matters That YouTube Changed Its Verification System (lien direct)

For creators, the move is just another example of a giant corporation forcing its whims and experiments on their work.

TechRepublic.png 2019-09-20 20:00:00 npm CEO Bryan Bogensberger exits after eight months of turmoil (lien direct)

Bogensberger joined the company in January 2019, with reports of frequent turmoil and high-profile exits during his tenure, including co-founder and COO Laurie Voss.

SecurityAffairs.png 2019-09-20 19:38:25 Two selfie Android adware apps with 1.5M+ downloads removed from Play Store (lien direct)

Experts at Wandera\'s threat research team discovered two adware apps on the Google Play Store that were downloaded 1.5M+ times. Researchers at Wandera discovered two adware selfie filter camera apps on the Google Play that were pushing ads and that can record audio. The bad news is that the two apps were downloaded 1.5M+ times. […]

The post Two selfie Android adware apps with 1.5M+ downloads removed from Play Store appeared first on Security Affairs.

WiredThreatLevel.png 2019-09-20 19:17:11 A Major Legal Battle May Change How Digital Game Sales Work (lien direct)

Valve\'s Steam platform is currently appealing a case in France over consumers\' ability to resell games.

TechRepublic.png 2019-09-20 19:03:12 Cybersecurity company tops Glassdoor list of highest paying firms at $170,929 annually (lien direct)

Find out which companies are at the top of Glassdoor\'s highest-paying salary list in a new wide-ranging survey.

ZDNet.png 2019-09-20 18:50:46 Facebook suspended tens of thousands of apps from 400 developers (lien direct)

Cambridge Analytica fallout yielded tens of thousands of app suspensions and bans.

Pirate.png 2019-09-20 18:50:11 Edward Snowden / Cloud Act : Les risques si nous confions nos données à des prestataires de cloud américains (lien direct)
Six ans après avoir été à l\'origine de la plus importante fuite de documents des services secrets américains, l\'ancien sous-traitant de la NSA Edward Snowden raconte son parcours dans " Mémoires vives " et met en garde le monde entier sur les pratiques de surveillance et d\'espionnage du gouvernement Américain.
Pirate.png 2019-09-20 18:44:18 Smartphone & collecte abusive des données : 62% des Français sont inquiets (lien direct)
Les abus de collecte d\'informations des éditeurs d\'applications mobiles inquiètent les Français, selon une étude menée par Kaspersky. Une calculatrice qui demande à accéder au répertoire ? Une lampe torche qui voudrait aussi envoyer des SMS ? Les demande d\'accès de certaines applications mobiles ont de quoi faire se lever plus d\'un sourcil… Et les utilisateurs, de mieux en mieux renseignés, ne sont pas dupe.
WiredThreatLevel.png 2019-09-20 18:42:48 A Washington Whistle-Blower Tops This Week\'s Internet News Roundup (lien direct)

Last week, a whistle-blower raised concerns about Trump\'s phone calls. Also, *Saturday Night Live*\'s Shane Gillis saga took over Twitter.

bleepingcomputer.png 2019-09-20 18:41:58 The Week in Ransomware - September 20th 2019 - Fairly Quiet (lien direct)

This has been a fairly quiet week with no real big news other than further updates from Nemty, the introduction of TFlower, and another Ordinypt campaign targeting Germany. [...]

WiredThreatLevel.png 2019-09-20 18:27:17 Thousands of Tech Workers Join Global Climate Change Strike (lien direct)

Employees in Silicon Valley want their companies to do more to help the planet. Will this activism make a difference?

MalwarebytesLabs.png 2019-09-20 18:18:26 What role does data destruction play in cybersecurity? (lien direct) Organizations are keen to protect the personal data of their employees and customers from cyberattack. But what about the data they no longer need? We discuss why data destruction is just as important to cybersecurity as protection.




(Read more...)

The post What role does data destruction play in cybersecurity? appeared first on Malwarebytes Labs.

WiredThreatLevel.png 2019-09-20 18:10:16 (Déjà vu) A Global Climate Strike, a Dangerous Huawei Move, and More News (lien direct)

Catch up on the most important news from today in two minutes or less.

WiredThreatLevel.png 2019-09-20 17:58:59 The Feds Need to \'Grow a Set and Do Their Jobs\' (lien direct)

Lawmakers are busy building their case against Silicon Valley\'s giants, but they\'re less optimistic about the agencies in charge of antitrust enforcement.

WiredThreatLevel.png 2019-09-20 17:42:20 An End to Pornography, Sophistry, and Panty Raids (lien direct)

How I stopped being polite to the self-styled Great Men of the Edge Organization.

TechRepublic.png 2019-09-20 17:15:31 How to create a new build job in Jenkins (lien direct)

With Jenkins set as your CI/CD automation tool, you\'ll want to know how to create a new build job for a project.

TechRepublic.png 2019-09-20 17:06:00 How to add GitHub support to Jenkins (lien direct)

Add your GitHub repository to the powerful Jenkins automation platform.

Checkpoint.png 2019-09-20 16:58:16 Celebrating 20 years of Recognition by Gartner as Leader in Network Firewall MQ (lien direct)

By Michael A. Greenberg, Product Marketing Manager, Security Platforms Check Point is proud to announce, that for the 20th time in the company\'s history, Gartner\'s Magic Quadrant has positioned Check Point as a Leader in the network firewall category. Year after year, we put our technologies and solutions to the test showing our dedication to…

The post Celebrating 20 years of Recognition by Gartner as Leader in Network Firewall MQ appeared first on Check Point Software.

TechRepublic.png 2019-09-20 16:53:28 How to install Jenkins on Ubuntu Server 18.04 (lien direct)

Looking for a tool to enable continuous integration and delivery of your application? Give Jenkins a try.

Blog.png 2019-09-20 16:38:43 HA: Infinity Stones Vulnhub Walkthrough (lien direct)

Today we are going to solve our CTF challenge called “HA: Infinity Stones” We have developed this lab for the purpose of online penetration practices. Solving this lab is not that tough if have proper basic knowledge of Penetration testing. Let\'s start and learn how to breach it. Download Here Level: Intermediate Task: Find 6... Continue reading

The post HA: Infinity Stones Vulnhub Walkthrough appeared first on Hacking Articles.

TechRepublic.png 2019-09-20 15:59:06 How to send private messages in Slack (lien direct)

Sending direct messages in Slack is a great way to get input from individual members of your workspace.

TechRepublic.png 2019-09-20 15:21:08 Governments still struggling to contend with weaponized social media platforms (lien direct)

A report from a former NSA operative says countries across the world are still adjusting to the new reality of sophisticated cyberwarfare.

Blog.png 2019-09-20 15:17:31 Hack the Box: Luke Walkthrough (lien direct)

Hello! Everyone and Welcome to yet another CTF challenge from Hack the Box, called \'Luke,\' which is available online for those who want to increase their skills in penetration testing and Black box testing. Luke is a retired vulnerable lab presented by Hack the Box for making online penetration testing practice suitable to your experience... Continue reading

The post Hack the Box: Luke Walkthrough appeared first on Hacking Articles.

TechRepublic.png 2019-09-20 15:16:24 Raspberry Pi and Arduino powered robot lets users make art from wine (lien direct)

Combining cloud computing and Internet of Things hardware, the Splash Machine allows users to create their own wine art online, streamed live and photographed for posterity.

ZDNet.png 2019-09-20 15:15:18 Exclusive: TalkTalk hacker also breached EtherDelta cryptocurrency exchange (lien direct)

Elliot Gunton and Anthony Tyler Nashatka charged for 2015 EtherDelta hack.

bleepingcomputer.png 2019-09-20 15:03:00 Meet Stop Ransomware: The Most Active Ransomware Nobody Talks About (lien direct)

Have you ever heard of the STOP Ransomware? Probably not, as few write about it, most researchers don\'t cover it, and for the most part it targets consumers through cracked software, adware bundles, and shady sites. [...]

TechRepublic.png 2019-09-20 14:59:00 How to set up Slack keyword alerts (lien direct)

Make your Slack life a bit more efficient with the help of keyword alerts.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21

Information mise à jours le: 2019-09-22 08:07:45
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Flux RSS Twitter