What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
WiredThreatLevel.png 2019-10-22 21:58:31 How to Watch Mark Zuckerberg\'s Libra Testimony in Congress (lien direct)

The Facebook CEO will appear before the House Financial Services Committee ostensibly to discuss the cryptocurrency, but the questions could range far beyond.

TechRepublic.png 2019-10-22 20:00:10 Sprint\'s IoT universe expands with new partnerships in Arizona (lien direct)

Curiosity IoT now includes NB-IoT, university curriculum and Remote Worker smart glasses system

WiredThreatLevel.png 2019-10-22 20:00:00 Should Europe Regulate American Tech Companies? (lien direct)

Four technology policy experts debate whether the EU has declared war on Silicon Valley.

TechRepublic.png 2019-10-22 19:42:14 MWC19 Los Angeles: Intelligent connectivity and 5G dominate opening keynote (lien direct)

The enterprise is in another industrial revolution, with 5G, AI, IoT, and big data leading the way.

SecurityAffairs.png 2019-10-22 19:39:55 Autoclerk travel reservations platform data leak also impacts US Government and military (lien direct)

vpnMentor\'s discovered a breach in a database belonging to Autoclerk, a reservations management system owned by Best Western Hotels and Resorts Group. Security experts at vpnMentor\'s discovered a breach in a database belonging to Autoclerk, a reservations management system owned by Best Western Hotels and Resorts Group. The data leak exposed sensitive personal information of thousands of users […]

The post Autoclerk travel reservations platform data leak also impacts US Government and military appeared first on Security Affairs.

TechRepublic.png 2019-10-22 19:30:31 US funding for university research continues to decline (lien direct)

Despite its world-leading research universities, the US ranks 28th out of 39 nations in university research funding.

WiredThreatLevel.png 2019-10-22 19:24:23 Polestar\'s First EV Is a Track-Happy Challenge to Tesla\'s Model 3 (lien direct)

With its first fully electric car, Polestar delivers a fully evolved sedan engineered for economy and more than enough performance.

Chercheur.png 2019-10-22 19:04:21 Ransomware Hits B2B Payments Firm Billtrust (lien direct)

Business-to-business payments provider Billtrust is still recovering from a ransomware attack that began last week.  The company said it is in the final stages of bringing all of its systems back online from backups.

Ransomware
bleepingcomputer.png 2019-10-22 17:27:41 U.S. Superior Court Systems Hacked to Spread Phishing Emails (lien direct)

A Texas man was sentenced today to 145 months in federal prison for hacking the Los Angeles Superior Court (LASC) computer system and using its servers to deliver around 2 million malspam emails. [...]

WiredThreatLevel.png 2019-10-22 17:01:57 Facebook\'s Plan for 2020 is Too Little Too Late, Critics Say (lien direct)

The social media company says it will more closely monitor foreign outlets, and warn users when posts are considered false-unless they\'re from politicians. 

TechRepublic.png 2019-10-22 16:58:59 Shattering myths and misperceptions about biometric debit and credit cards (lien direct)

Biometric cards could make a strong dent against credit card fraud, but several myths surround the technology.

TechRepublic.png 2019-10-22 16:39:00 NVIDIA looks beyond gaming graphics with 5G, AI, edge, and IoT at MWC LA (lien direct)

NVIDIA is envisioning a future where GPUs are leveraged to perform tasks too challenging for CPUs.

TechRepublic.png 2019-10-22 16:30:14 Slack expands app capabilities, adding granular permissions for better security (lien direct)

The addition of App Home screens create a central location for data at a glance, while granular permissions provide tighter controls for accessing information.

bleepingcomputer.png 2019-10-22 16:24:26 MedusaLocker Ransomware Wants Its Share of Your Money (lien direct)

A new ransomware called MedusaLocker is being actively distributed and victims have been seen from all over the world. It is not known at this time, how the attacker is distributing the ransomware. [...]

Ransomware
bleepingcomputer.png 2019-10-22 15:58:10 Scammers Behind €10 Million BEC Fraud Arrested in Spain (lien direct)

Three people, part of a Business Email Compromise (BEC) scammer group that stole roughly €10.7 million ($11,900,000) from 12 companies, were arrested in Spain by the Guardia Civil as part of Operation Lavanco. [...]

TechRepublic.png 2019-10-22 15:48:36 How to get more out of Slack with the slash command (lien direct)

Find out how to be a Slack ninja with slash commands.

TechRepublic.png 2019-10-22 15:30:10 How to enable automatic updates with Cockpit on CentOS 8 (lien direct)

CentOS 8 can be easily configured for regular, automatic software updates with the help of Cockpit.

TechRepublic.png 2019-10-22 15:27:57 Sprint expands 5G to 5 million more people in 7 cities (lien direct)

Coverage now available in more parts of New York Metro, Los Angeles, Washington D.C., Phoenix, Atlanta, Dallas-Fort Worth, and Houston.

TechRepublic.png 2019-10-22 15:18:16 How to send direct messages from anywhere in Slack (lien direct)

With Slack, you can send direct messages from any text area location. Find out how this is done in either the mobile or desktop app.

TechRepublic.png 2019-10-22 15:02:49 How to collaborate in Google Docs, Sheets, and Slides: 4 tips (lien direct)

When two or more people have access to content in Google Docs, Sheets, or Slides, these four practices may help make collaboration proceed smoothly.

ZDNet.png 2019-10-22 15:02:08 Magecart group linked to Dridex banking Trojan, Carbanak (lien direct)

Domain tracking has led to connections between different cyberattack campaigns.

MalwarebytesLabs.png 2019-10-22 15:00:00 The forgotten domain: Exploring a link between Magecart Group 5 and the Carbanak APT (lien direct) Bread crumbs left behind open up a possible connection between Magecart Group 5 and Carbanak.

Categories:

Threat analysis

Tags:

(Read more...)

The post The forgotten domain: Exploring a link between Magecart Group 5 and the Carbanak APT appeared first on Malwarebytes Labs.

TechRepublic.png 2019-10-22 14:49:11 How to deploy a container with Ansible (lien direct)

Find out how to deploy a Docker container using an Ansible playbook.

TechRepublic.png 2019-10-22 14:35:05 GNOME Foundation steps up its open source patent defense (lien direct)

Commentary: RPI is suing the GNOME Foundation over Shotwell, an open source project. GNOME refuses to back down, for good reason.

ESET.png 2019-10-22 14:16:24 NordVPN reveals breach at datacenter provider (lien direct)

The company says that the incident, going back to March 2018, affected only 1 out of its 3,000 servers

The post NordVPN reveals breach at datacenter provider appeared first on WeLiveSecurity

no_ico.png 2019-10-22 14:06:51 NordVPN Breach: How Bug Bounty Programs Can Help And Resolve (lien direct)

NordVPN, the virtual private network provider, today confirmed it was hacked through an expired, exposed, and outdated internal private key. VPN providers are becoming significantly popular due to providing security and are used frequently by users in hostile environments. So apparently NordVPN was compromised at some point. Their (expired) private keys have been leaked, meaning …

The ISBuzz Post: This Post NordVPN Breach: How Bug Bounty Programs Can Help And Resolve appeared first on Information Security Buzz.

no_ico.png 2019-10-22 14:04:14 The Guide To Achieving A Robust Cyber-Security Strategy (lien direct)

Cybercrime damages are expected to cost businesses an enormous $6 trillion annually by 2021, and as cyber-threats become more frequent and sophisticated, the stakes are getting higher. Now, more than ever, it has become crucial for businesses of all sizes to implement a security strategy that delivers around the clock. All organisations should be operating under …

The ISBuzz Post: This Post The Guide To Achieving A Robust Cyber-Security Strategy appeared first on Information Security Buzz.

ZDNet.png 2019-10-22 13:51:46 Czech authorities dismantle alleged Russian cyber-espionage network (lien direct)

Czech officials said Russian operatives used local companies to launch cyber-attacks against foreign targets.

no_ico.png 2019-10-22 13:50:27 Expert On Spelevo Exploit Kit & Maze Ransomware (lien direct)

The Spelevo exploit kit was spotted by security researchers while infecting victims with Maze Ransomware payloads via a new malicious campaign that exploits a Flash Player. Maze Ransomware, a variant of Chacha Ransomware, was initially found by Malwarebytes security researcher Jérôme Segura in May. The researcher found that the ransomware was being distributed using the Fallout exploit kit via a …

The ISBuzz Post: This Post Expert On Spelevo Exploit Kit & Maze Ransomware appeared first on Information Security Buzz.

Ransomware
bleepingcomputer.png 2019-10-22 13:41:11 Billing Provider Billtrust Suffers Outage After Malware Attack (lien direct)

U.S. financial services provider Billtrust experienced an outage affecting all of its services after some of the company\'s computing systems were impacted by a malware attack on October 17. [...]

Malware
no_ico.png 2019-10-22 13:39:47 COMMENT: Equifax Used Default \'Admin\' User Name And Password To Secure Hacked Portal (lien direct)

Equifax staffers used the default user name and password – \'admin’ – to secure a portal containing sensitive customer information, Computing reported. That’s according to a class-action lawsuit launched against the company in the US, claiming securities fraud by the company over the 2017 data breach that spilled information on around 148 million accounts of people in …

The ISBuzz Post: This Post COMMENT: Equifax Used Default ‘Admin’ User Name And Password To Secure Hacked Portal appeared first on Information Security Buzz.

Data Breach
itsecurityguru.png 2019-10-22 13:39:21 OneLogin Partners with Prianto (lien direct)

OneLogin, an industry leading provider of Unified Access Management (UAM), has partnered with Prianto UK to facilitate the distribution of its services in the UK. This collaboration will enable Prianto and OneLogin to fulfill their joint commitment of providing a secure, seamless experience for end-users and administrators alike. This collaboration brings together a company specialising […]

The post OneLogin Partners with Prianto appeared first on IT Security Guru.

no_ico.png 2019-10-22 13:30:10 Comment: US Military And Government Data Included In 179GB Database Leak (lien direct)

An open database exposing records containing the sensitive data of hotel customers as well as US military personnel and officials has been disclosed by researchers. It is said the database belonged to Autoclerk, a service owned by Best Western Hotels and Resorts group. Autoclerk is a reservations management system used by resorts to manage web bookings, revenue, loyalty programs, guest …

The ISBuzz Post: This Post Comment: US Military And Government Data Included In 179GB Database Leak appeared first on Information Security Buzz.

Pirate.png 2019-10-22 13:26:44 NordVPN confirme qu\'il a été piraté (lien direct)
La société NordVPN, qui propose un service de VPN grand public très populaire, confirme aujourd\'hui avoir été victime d\'un piratage ayant eu lieu en mars 2018. D\'autres fournisseurs de VPN auraient également été affectés.
no_ico.png 2019-10-22 13:25:29 Iranian Spying Operation Russian Hijack (lien direct)

A group of Russian cyber attackers dubbed \'Turla\' have hacked another Iran-based group of cyber actors, known as \'OilRig\' to spy on multiple countries, according to advisories by published today by the UK\'s NCSC and the US\' NSA. According to reports, attacks were discovered against more than 35 countries, many of which were located in the …

The ISBuzz Post: This Post Iranian Spying Operation Russian Hijack appeared first on Information Security Buzz.

TechRepublic.png 2019-10-22 13:23:04 University center to research ways to protect electronic systems from sabotage (lien direct)

Led by the University of Cincinnati, the new center will work with government and industry to conduct research on how to defend electronics and embedded systems from sabotage, hacking, and spying.

Checkpoint.png 2019-10-22 13:15:55 Welcome to the Future of Cybersecurity with Check Point at Microsoft Ignite 2019 (lien direct)

By Jonathan Maresky, Product Marketing Manager, published October 22, 2019 Microsoft Ignite 2019 kicks off in less than two weeks at the Orange County Convention Center in Orlando from November 4-8. Ignite is Microsoft\'s biggest annual event and an exciting opportunity to: Meet and interact with Microsoft subject matter experts and executives Become more familiar…

The post Welcome to the Future of Cybersecurity with Check Point at Microsoft Ignite 2019 appeared first on Check Point Software.

TechRepublic.png 2019-10-22 13:01:11 Mass machine communication expected to be most impacted by 5G (lien direct)

Nearly all professionals are finding business cases for 5G, an Infosys report found.

securityintelligence.png 2019-10-22 13:00:38 How to Secure Wi-Fi and Improve Personal and Enterprise Security From Home (lien direct)

Technology has enabled employees to work from the office, from home and pretty much everywhere in between. Unfortunately, many employees still aren\'t connecting to secure Wi-Fi, putting data at risk.

The post How to Secure Wi-Fi and Improve Personal and Enterprise Security From Home appeared first on Security Intelligence.

SecurityAffairs.png 2019-10-22 12:32:47 Trend Micro Anti-Threat Toolkit could be used to run malware on Win PCs (lien direct)

A vulnerability in the Trend Micro Anti-Threat Toolkit (ATTK) can be exploited by attackers to run malware on targets’ Windows systems. The security expert and bug-hunter John “hyp3rlinx” Page discovered an arbitrary code execution vulnerability, tracked as CVE-2019-9491, in the Trend Micro Anti-Threat Toolkit. Trend Micro ATTK allows analyzing malware issues and clean infections. It can […]

The post Trend Micro Anti-Threat Toolkit could be used to run malware on Win PCs appeared first on Security Affairs.

Malware,Vulnerability
01net.png 2019-10-22 12:05:21 Amazon Alexa et Google Home pouvaient vous enregistrer et voler vos mots de passe (lien direct)

Les " skills " et les " actions ", ces applications tierces pour enceintes connectées, ont pu être utilisées pour espionner les utilisateurs et leur soutirer des informations sensibles.

bleepingcomputer.png 2019-10-22 12:00:53 Firefox 70 Released with In-Browser Data Breach Notifications (lien direct)

Mozilla has officially released Firefox 70 for Windows, Mac, and Linux and with it comes additional protections for user\'s privacy and passwords. This includes the new social tracking protection feature, a new Privacy protections report, and an integrated data breach notification service for your saved logins. [...]

Data Breach
TechRepublic.png 2019-10-22 12:00:08 Teradata survey says almost all companies struggle to keep up with digital disruption (lien direct)

More than 90% of survey respondents are under pressure to rethink processes amid digital disruption in their industry.

ZDNet.png 2019-10-22 12:00:08 Facebook promises action on 2020 US election fraud, wipes out fake networks from Russia, Iran (lien direct)

The company will be under more scrutiny than ever with the upcoming US 2020 elections.

WiredThreatLevel.png 2019-10-22 12:00:00 Scientists Are Literally Spinning Up Lab-Grown Meat (lien direct)

Researchers take inspiration from cotton candy to make a gelatin scaffolding, which could help realize the dream of more sustainable steaks and chicken breasts.

bleepingcomputer.png 2019-10-22 11:37:58 Retina-X Banned by FTC From Selling Their \'Stalking\' Apps (lien direct)

The U.S. Federal Trade Commission (FTC) says that a settlement has been reached with Retina-X Studios, LLC (Retina-X), the company behind three \'stalkerware\' mobile applications, that bars it from selling the apps unless they are used for legitimate purposes. [...]

securityintelligence.png 2019-10-22 11:15:21 Credential-Stuffing Attacks Are Just the Tip of the Iceberg (lien direct)

Credential-stuffing attacks are indicative of the much larger issue of account takeover. Adaptive authentication can help improve the digital experience for low-risk users.

The post Credential-Stuffing Attacks Are Just the Tip of the Iceberg appeared first on Security Intelligence.

WiredThreatLevel.png 2019-10-22 11:00:00 Neil Young\'s Adventures on the Hi-Res Frontier (lien direct)

The artist is intent on bringing real quality to streaming audio, whether you want it or not.

WiredThreatLevel.png 2019-10-22 11:00:00 Drugstores Are in the Sweet Spot for Drone Deliveries (lien direct)

UPS has a deal with CVS, and Google sibling Wing is making deliveries for Walgreens in Virginia.

WiredThreatLevel.png 2019-10-22 11:00:00 Google Pixel 4 and Pixel 4 XL Review: Almost the Best (lien direct)

For once, Google\'s latest phone falls short. Its predecessor is just as good ... and cheaper

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21

Information mise à jours le: 2019-10-23 00:08:01
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Flux RSS Twitter