What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
WiredThreatLevel.png 2019-01-19 01:26:04 Tesla Investors Suing Musk Can Subpoena Azealia Banks and Grimes (lien direct)

Shareholders are suing Elon Musk over that "taking Tesla private" tweet, and just got the right to subpoena Banks and Grimes.

ZDNet.png 2019-01-19 00:27:03 DNC says Russia tried to hack its servers again in November 2018 (lien direct)

Democrats say the spear-phishing attack, which was attributed to Russian group Cozy Bear, was unsuccessful.

WiredThreatLevel.png 2019-01-19 00:06:00 Gadget Lab Podcast: A Deep Dive Into Nike\'s Adapt BB Smart Sneakers (lien direct)

WIRED\'s Peter Rubin joins the Gadget Lab podcast to talk about his experience wearing Nike\'s newest self-adjusting sneakers. Plus: Nitasha Tiku weighs in on mandatory arbitration at tech companies.

SecurityAffairs.png 2019-01-18 23:22:01 Fallout Exploit Kit now includes exploit for CVE-2018-15982 Flash zero-day (lien direct)

Experts at Malwarebytes have reported that the code for the recently discovered Flash zero-day flaw was added to the Fallout Exploit kit. Experts at Malwarebytes observed a new version of the Fallout Exploit kit that include the code to exploit a recently discovered Flash zero-day vulnerability. The Fallout Exploit kit was discovered at the end […]

The post Fallout Exploit Kit now includes exploit for CVE-2018-15982 Flash zero-day appeared first on Security Affairs.

WiredThreatLevel.png 2019-01-18 22:46:05 Tesla Lays Off 3,000 Workers in Cost-Cutting Effort (lien direct)

CEO Elon Musk says the layoffs will help the electric car maker as it leans into the tough job of building mass-market cars.

WiredThreatLevel.png 2019-01-18 22:39:03 Microsoft Wants Cortana to Play Nicely With Amazon and Google (lien direct)

Microsoft CEO Satya Nadella says the company\'s Cortana digital assistant should be available on smart speakers made by rivals like Amazon and Google.

WiredThreatLevel.png 2019-01-18 22:34:03 Analysis Finds Oracle Paid Women $13,000 Less Than Men (lien direct)

An economist studying pay records as part of an ongoing lawsuit found the software company paid women 14 percent less annually than men doing similar jobs.

ZDNet.png 2019-01-18 21:26:04 WiFi firmware bug affects laptops, smartphones, routers, gaming devices (lien direct)

List of impacted devices includes PS4, Xbox One, Samsung Chromebooks, and Microsoft Surface devices.

Kaspersky.png 2019-01-18 21:00:04 Google Play Removes Malicious Malware-Ridden Apps (lien direct)

Two apps on Google Play were infecting devices with the Anubis mobile banking trojan.

no_ico.png 2019-01-18 20:50:05 Mitigating Breach Costs (lien direct)

The average cost of a cyber breach for companies now exceeds one-million dollars according to a new report by Radware. Justin Jett, Director of Audit and Compliance at Plixer: “The numbers reflect the reality that breaches are inevitable and expensive. However, both sides of that equation can be mitigated if companies can locate forensic data …

The ISBuzz Post: This Post Mitigating Breach Costs appeared first on Information Security Buzz.

SecureMac.png 2019-01-18 20:42:04 Checklist 121: On Checklist, TV Watches You! (lien direct)

On this week\'s Checklist by SecureMac we talk about TVs that are too smart for your own good, putting a lock on individual iOS Apps and some security resolutions.

The post Checklist 121: On Checklist, TV Watches You! appeared first on SecureMac.

Kaspersky.png 2019-01-18 19:58:01 Fallout EK Retools for a Fresh New 2019 Look (lien direct)

The Fallout EK has added the latest Flash vulnerability to its bad of tricks, among other tune-ups.

Blog.png 2019-01-18 19:42:04 GUEST ESSAY: Why the hack of South Korea\'s weapons, munitions systems was so predictable (lien direct)

The disclosure that malicious intruders hacked the computer systems of the South Korean government agency that oversees weapons and munitions acquisitions for the country’s military forces is not much of a surprise. The breach of some 30 computers of South Korea’s Defense Acquisition Program Administration (DAPA), which is part of the Ministry of National Defense, […]

grahamcluley.png 2019-01-18 19:26:02 Ingenious! The Android malware which only triggers if you\'re moving (lien direct)
Ingenious! The Android malware which only activates if you're moving

Android malware in the Google Play Store could tell whether it was likely to be running on a genuine victim\'s device or being analysed by a security team.

SecurityWeek.png 2019-01-18 19:22:03 Hackers Actively Scanning for ThinkPHP Vulnerability, Akamai Says (lien direct)

There is widespread scanning for a recently disclosed remote code execution vulnerability in the ThinkPHP framework, Akamai reveals. 

read more

TechWorm.png 2019-01-18 18:47:03 Facebook open sources Spectrum for efficient uploading of images (lien direct)

Facebook launches open-sourced Spectrum for better mobile image production Facebook has officially released an open source tool to the developer community to make the process of uploading images more efficient. Dubbed as “Spectrum”, this tool is a cross-platform image transcoding library that can easily be integrated into an Android or iOS project to efficiently perform […]

The post Facebook open sources Spectrum for efficient uploading of images appeared first on TechWorm.

SecurityAffairs.png 2019-01-18 18:37:02 Android apps use the motion sensor to evade detection and deliver Anubis malware (lien direct)

Security experts from Trend Micro have recently spotted two Android apps that use the motion sensor to evade detection and spread the Anubis banking Trojan. Malware authors continue to improve their malicious apps to avoid detection and infect the largest number of users. Security experts from Trend Micro have recently spotted two Android apps in […]

The post Android apps use the motion sensor to evade detection and deliver Anubis malware appeared first on Security Affairs.

MalwarebytesLabs.png 2019-01-18 18:33:04 Collection 1 data breach: what you need to know (lien direct) In what\'s being dubbed one of the largest data dumps in history, Collection 1 contains the data of over 770 million people. But is it really as bad as it sounds? We take a closer look and let users know what to do if their info is caught up in the mix.

Categories:

101 How-tos

Tags:

(Read more...)

The post Collection 1 data breach: what you need to know appeared first on Malwarebytes Labs.

ZDNet.png 2019-01-18 18:32:04 Verizon to roll out free robocoll spam protection to all customers (lien direct)

Call Filter service to be made available to all wireless and wired customers with compatible phones in March 2019.

SecurityWeek.png 2019-01-18 18:00:05 Xbash Malware Uninstalls Cloud Security Products (lien direct)

Recent samples of the destructive Xbash Linux malware can uninstall cloud security protection products from infected servers, Palo Alto Networks reports. 

read more

Kaspersky.png 2019-01-18 17:58:01 Threatpost News Wrap Podcast For Jan. 18 (lien direct)

Threatpost editors break down the top headlines from the week ended Jan. 18.

SecurityWeek.png 2019-01-18 17:43:01 Marco Rubio Proposes New Federal Data Privacy Bill (lien direct)

U.S. Senator Marco Rubio (R-Fla.) introduced a bill on Wednesday designed to provide privacy legislation for the entire nation -- that is, federal law. It is based on the Privacy Act of 1974, which was introduced post-Watergate to protect people from government storage and retrieval of personal data.

read more

Kaspersky.png 2019-01-18 17:30:04 Critical, Unpatched Cisco Flaw Leaves Small Business Networks Wide Open (lien direct)

A default configuration allows full admin access to unauthenticated attackers.

TechRepublic.png 2019-01-18 17:17:02 Bug bounty programs: Everything you thought you knew is wrong (lien direct)

One common criticism of bug bounty programs is that very few hackers actually make money. Not only is this untrue, but it misses the point.

SecurityWeek.png 2019-01-18 17:15:01 Barracuda Adds Incident Response to Email Security Offering (lien direct)

Barracuda Networks this week announced automated incident response capabilities are now available for customers using its Total Email Protection solution. 

read more

bleepingcomputer.png 2019-01-18 16:57:02 The Week in Ransomware - January 18th 2019 - Devs Back from Vacation (lien direct)

The ransomware developers must be back from vacation as there were a lot of new releases this week. In addition to new variants of existing ransomware such as Dharma, Scarab, Matrix, and more, we also had a few new variants pop up. [...]

TechRepublic.png 2019-01-18 16:50:02 Open source has a problem with monetization, not AWS (lien direct)

Open sourcerors keep wrongly trying to blame AWS for their inability to effectively monetize open source software.

WiredThreatLevel.png 2019-01-18 16:45:01 If Trump Told Cohen to Lie, Impeachment Is Coming (lien direct)

An explosive new report from Buzzfeed News makes the impeachment of Donald Trump not just possible, but likely.

SecurityWeek.png 2019-01-18 16:38:05 PCI SSC Releases New Security Standards for Payment Software (lien direct)

The Payment Card Industry Security Standards Council (PCI SSC) this week announced new security standards for the design, development and maintenance of payment software.

read more

MalwarebytesLabs.png 2019-01-18 16:00:00 Hosting malicious sites on legitimate servers: How do threat actors get away with it? (lien direct) Is money all hosting providers care about when it comes to allowing malicious sites on their servers? Or is there more at play? We embark on an investigation to discover their motives.

Categories:

Cybercrime Malware

Tags:

(Read more...)

The post Hosting malicious sites on legitimate servers: How do threat actors get away with it? appeared first on Malwarebytes Labs.

WiredThreatLevel.png 2019-01-18 16:00:00 Pharma Spending on Doctors Is Correlated With Opioid Deaths (lien direct)

A new study shows that doctors wrote more prescriptions, and more people overdosed on opioids, in counties where drug companies spent more money.

no_ico.png 2019-01-18 15:37:00 Do You Know Your Customers? (lien direct)

Every third Thursday of each quarter, \'Know Your Customer\' Day is held. The day transcends all industries, aimed at businesses and designed to serve as a reminder of how important it is to take the time to understand your customer. In the cybersecurity industry, it is equally important. When it comes to knowing the \'customers\', …

The ISBuzz Post: This Post Do You Know Your Customers? appeared first on Information Security Buzz.

TechRepublic.png 2019-01-18 15:06:04 How to troubleshoot remotely with the Vuforia Chalk augmented reality app (lien direct)

Solve problems faster--without travel--with this mobile, video-based augmented reality solution.

WiredThreatLevel.png 2019-01-18 15:00:00 Photo Gallery: Meet the Workers Who Build an Entire City of Ice Every Year (lien direct)

Photographer Kevin Frayer goes behind the scenes at the massive Harbin International Ice and Snow Festival in China\'s Heilongjiang Province.

onapsis.png 2019-01-18 14:52:01 First Oracle CPU of the Year: First Patches for E-Business Suite 12.2.8 (lien direct)

Our quarterly analysis of the Oracle CPU, in which we discuss the first release of the year, January 2019.

Oracle, Oracle EBS, Oracle CPU, Oracle Security, researchOracle SecurityCristian Peque, Sebastian Bortnik
01/16/2019
no_ico.png 2019-01-18 14:49:01 Who Goes There? How Blockchain Could Transform Identity And Access Management (lien direct)

Marc Vanmaele, CEO of TrustBuilder considers whether blockchain will become an IAM game changer From a niche cryptocurrency discussed only in the most technical and computing-focused circles, to an imagination-capturing marketplace featured in the mainstream press, bitcoin has undergone a transformative journey over the past decade. As part of this evolution, bitcoin\'s public transaction ledger has gone …

The ISBuzz Post: This Post Who Goes There? How Blockchain Could Transform Identity And Access Management appeared first on Information Security Buzz.

no_ico.png 2019-01-18 14:49:00 US Carriers Promise Again To Stop Selling Customer Location Data (lien direct)

Everyone knows that major mobile service providers such as AT&T, T-Mobile, and Sprint are actively collecting their customers’ location data, but not many know that they’re also selling it to the highest bidder.As discovered by Motherboard’sJoseph Cox, you can locate anyone as long as you know their phone number and, of course, if you are …

The ISBuzz Post: This Post US Carriers Promise Again To Stop Selling Customer Location Data appeared first on Information Security Buzz.

Kaspersky.png 2019-01-18 14:42:01 Twitter Android Glitch Exposed Private Tweets for Years (lien direct)

Twitter has fixed the issue, which has been ongoing since 2014.

bleepingcomputer.png 2019-01-18 14:39:04 Fallout Exploit Kit is Back with New Vulnerabilities and Payloads (lien direct)

The Fallout exploit kit is back in business after a short downtime, with new tools under its belt: a new Flash exploit for CVE-2018-15982, HTTPS support, a new landing page format, and the capability to deliver payloads using Powershell [...]

no_ico.png 2019-01-18 14:32:05 South Korean Defense Agency Breached (lien direct)

ZDNet is reporting that hackers breached the computer systems of a South Korean government agency that oversees weapons and munitions acquisitions for the country’s military forces. Local press reported that hackers breached 30 computers and stole internal documents from at least ten computers in October 2018.It’s believed that the stolen documents contain information about arms procurement …

The ISBuzz Post: This Post South Korean Defense Agency Breached appeared first on Information Security Buzz.

TechRepublic.png 2019-01-18 14:28:04 87% of companies will add workers this year, despite rise of robots (lien direct)

Some 84% of employers plan to upskill their workforce by 2020 due to the rise in digitization, according to a ManpowerGroup report.

TechRepublic.png 2019-01-18 14:27:00 Rock Pi 4 review: Is this the Raspberry Pi challenger you\'ve been looking for? (lien direct)

Benchmarks and hands-on review for the Rock Pi 4, the latest rival to Raspberry Pi for the low-cost computing crown.

TechRepublic.png 2019-01-18 14:19:02 5 blockchain trends to expect in 2019 (lien direct)

Blockchain may finally be ready to move from hype to reality, with continued IoT integrations and tokenization, according to KPMG.

SecurityWeek.png 2019-01-18 14:16:03 Rate of Cybersecurity Venture Funding Not Sustainable, Investors Say (lien direct)

Venture capital firm Strategic Cyber Ventures (SCV) considers itself a part of the overall security industry. "First and foremost we are cyber operators," it states on its website. "We advance cybersecurity through expert investment in synergistic teams and technology solving the world\'s security problems."

read more

TechRepublic.png 2019-01-18 14:01:01 Why risk-taking is vital for women to become leaders in the workplace (lien direct)

Nearly half of women said risk-taking helped them feel more confident in their abilities, according to a KPMG report.

Checkpoint.png 2019-01-18 14:00:05 Check Point Forensic Files: GandCrab Returns with Friends (Trojans) (lien direct)

Following our previous post about GandCrab, in this post we show how another variant of this well-known ransomware is observed by Check Point\'s SandBlast Agent (SBA) Behavioral Guard and analyzed through the lens of a SBA Forensics report. In addition, we review how this new variant comes loaded with Trojan malware too, and yet even…

The post Check Point Forensic Files: GandCrab Returns with Friends (Trojans) appeared first on Check Point Software Blog.

securityintelligence.png 2019-01-18 14:00:01 Succeed in Your Cloud Migration With a Secure Hybrid Cloud Strategy (lien direct)

>In the rush to digital transformation, treating cloud security services as an afterthought to hybrid cloud adoption is an increasingly risky mistake.

The post Succeed in Your Cloud Migration With a Secure Hybrid Cloud Strategy appeared first on Security Intelligence.

AlienVault.png 2019-01-18 14:00:00 Things I Hearted This Week, 18 Jan 2019 (lien direct)

London saw a few flakes of snow drop this week, and social media nearly broke with everyone sharing photos of the white pixie dust falling from the sky. Fortunately, I have few friends, and even fewer social media platforms that I use, so was saved from most of the insanity… well, except for my daughter singing “let it snow”.

TheCurious Case of the Raspberry Pi in the Network Closet

What would you do if you found a Raspberry Pi plugged into the network closet? Sounds like something from your worst nightmare, especially if you hadn’t commissioned any red team testing.

But that’s exactly what one team found, and this is the story of how they tracked down (almost) the suspect. If Scooby Doo has taught me anything, it was the janitor!

Ad Company Serves Magecard Code

To quote Miss IG Geek, when your supply chain is so long you don’t even know who’s got their fingers in your website, you cannot manage your risk.

Yeah, go ahead, ask me to disable my ad-blocker.

Hunting the Con Queen of Hollywood: Who's the "Crazy Evil Genius" Behind a Global Racket?

This is a story from last July, but only saw it this week, and wow. This is a masterclass in social engineering, and the work of someone who genuinely seems to enjoy tormenting her victims.

The DDoS Attacker Rescued by a Disney Cruise Ship is Sentenced to Over 10 Years in Prison

A 34-year old man has been sentenced to more than 10 years in prison, after being found guilty of launching a massive denial-of-service attack against Boston Children’s Hospital.

The sentencing of Martin Gottesfeld, from Somerville, Massachusetts, comes almost three years after he attempted to escape to Cuba – a plan that failed after his speedboat broke down in the choppy sea, and he was picked up by a Disney cruise liner.

Facebook Cybersecurity Exec Victim of Swatting Call

A Facebook cybersecurity exec had his home swatted by Palo Alto police after a prank call claimed he shot his wife, tied up his kids, and placed pipe bombs around the house.

A SWAT squad arrived in force at the exec's home, a two-bedroom house in Palo Alto, ordered him to ste

WiredThreatLevel.png 2019-01-18 14:00:00 An \'Assassin\'s Creed\' DLC Controversy Leads the Week\'s Game News (lien direct)

Also: hey, why do Star Wars games keep getting canceled?

WiredThreatLevel.png 2019-01-18 14:00:00 Breville Smart Oven Pizzaiolo Review: Love at First Slice (lien direct)

Breville\'s smart oven makes a foolproof, restaurant-quality Neapolitan-style pizza, and sits on your countertop.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21

Information mise à jours le: 2019-01-19 06:03:28
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Flux RSS Twitter