What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
itsecurityguru.webp 2019-02-22 14:10:04 Critical vulnerabilities in Bigscreen VR app. (lien direct) A vulnerability in both the Bigscreen virtual reality app and the Unity game development platform on which it’s built makes it possible for hackers to listen to conversations and access user computers, according to researchers at the University of New Haven. “Our research shows hackers are able to monitor people day in and day out […] Vulnerability
itsecurityguru.webp 2019-02-22 14:09:04 Labour reports former MP Joan Ryan to the Information Commissioner\'s Office. (lien direct) Labour Party claims MP contacted its supporters after quitting for the Independent Group. Labour has reported its former MP Joan Ryan to the Information Commissioner's Office, though she strongly denies accessing party systems to contact members after resigning from the party on Tuesday to join the breakaway Independent Group. It is understood the party has informed the commissioner about […]
itsecurityguru.webp 2019-02-22 11:55:02 Capgemini Announces The Closing Of The Acquisition Of Leidos Cyber, The Commercial Cybersecurity Division Of Leidos. (lien direct) Capgemini announced today, following the fulfillment of all regulatory requirements, the closing of the acquisition of Leidos Cyber, the commercial cybersecurity arm of the FORTUNE 500® companyLeidos, announced in June 2018. The team of almost 500 elite cybersecurity professionals, located mainly in North America, will join the Group to address its increasing client demand for […] ★★★
itsecurityguru.webp 2019-02-22 11:54:03 Aquilai Launches Ajax Intelligence Phishing Solution. (lien direct) Aquilai has launched their cloud based Ajax Intelligence solution to combat all forms of email phishing prevalent on Microsoft Exchange, Office 365 and G Suite emails. Shaped in collaboration with GCHQ and National Cyber Security Centre staff, Ajax Intelligence is the most effective solution against email phishing available on the market. The architecture is optimised […]
itsecurityguru.webp 2019-02-22 11:54:00 New Kaspersky CyberTrace Streamlines Threat Intelligence Flows For Better Initial Response To Cyberthreats. (lien direct) With the number of available threat intelligence sources continuing to grow, a third of CISOs feel under pressure as they cannot consume cybercrime intelligence easily or effectively. To help large companies overcome this challenge, Kaspersky Lab has launched Kaspersky CyberTrace – a free threat intelligence fusion and analysis tool. It aggregates and evaluates disconnected data […] Threat
itsecurityguru.webp 2019-02-22 11:53:04 ISC)² Invests In The Professional Development Of Global Cybersecurity Workforce. (lien direct) (ISC)² – the world's largest non-profit membership association of certified cybersecurity professionals – today announced the founding of its Professional Development Institute (PDI) to combat one of the largest challenges facing the cybersecurity community today – a global shortage of skilled and trained professionals to defend organizations against the evolving onslaught of cyber threats. Provided […]
itsecurityguru.webp 2019-02-22 11:53:02 CylancePROTECT Now Available On AWS Marketplace. (lien direct) Cylance Inc., the leading provider of AI-driven, prevention-first security solutions, today announced the availability of its award-winning endpoint protection offering, CylancePROTECT® on AWS Marketplace. Cylance has built the largest AI platform in the industry, enabling it to offer a portfolio of solutions ranging from enterprise endpoint protection, detection, and response, to Smartantivirus for consumers, to […] Guideline
itsecurityguru.webp 2019-02-21 12:18:04 (Déjà vu) Mozilla Firefox 67 to Warn About Breached Sites. (lien direct) Firefox Monitor is a Mozilla service that has partnered with Have I been Pwned to alert users when their email address has been discovered in a data breach. In the past, Firefox Monitor was a standalone service, but starting in Firefox 67 it will now be included as an extension. As part of a test in November 2018, […]
itsecurityguru.webp 2019-02-21 12:18:00 Hackers \'scramble\' patient files in Melbourne. (lien direct) Federal agencies investigating breach, reported to be a ransom demand. Hackers have “scrambled” patient files at a Melbourne heart specialist clinic in what was reportedly a ransom attempt. The Australian Cyber Security Centre has confirmed it's providing advice and assistance to the Melbourne Heart Group, which leases practice space from the Cabrini hospital in Malvern. […] ★★★★
itsecurityguru.webp 2019-02-21 12:16:05 Hackers Based in Iran Blamed for Cyberattack on Australia\'s Parliament. (lien direct) Attack is compatible with the activity of an Iranian state actor, U.S. cyber research company alleges. Hackers based in Iran and implicated in attacks on the U.S. and Western allies were behind a computer breach of Australia's Parliament and political parties, a U.S. cyber research company alleged. Source: Wall Street Journal
itsecurityguru.webp 2019-02-21 12:16:01 Toyota Australia confirms cyber attack. (lien direct) The company has confirmed the attempted attack that took out its e-mail system, forcing employees to turn to other forms of communication to continue working. Toyota's Australian subsidiary has been hit by a cyber attack, leaving employees without access to their e-mail messages for days, according to local media reports. In a statement today, Toyota […]
itsecurityguru.webp 2019-02-21 12:15:03 (Déjà vu) Microsoft publishes security alert on IIS bug. (lien direct) Microsoft releases updates to fix bug that froze systems when IIS handled malformed HTTP/2 requests. The Microsoft Security Response Center published yesterday a security advisory about a denial of service (DOS) issue impacting IIS (Internet Information Services), Microsoft’s web server technology. According to Microsoft, IIS servers shipped with Windows 10 and Windows Server 2016 are […]
itsecurityguru.webp 2019-02-20 16:01:01 Servers, Endpoints And Networks Under Control With Baramundi And Paessler. (lien direct) baramundi software AG and Paessler AG have released a new interface as part of their partnership enabling the efficient connection of the Paessler PRTG Monitoring Software and the baramundi Management Suite. “In recent years, the number of endpoints to be managed in corporate networks has risen massively,” says baramundi CEO, Uwe Beikirch. “This trend is […]
itsecurityguru.webp 2019-02-20 15:53:03 forghetti™: Forget your passwords. Forever. (lien direct) forghetti™ gives you access to all your accounts with a simple and unique doodle. forghetti™ doesn't store your passwords but instead generates them when you need them. Only your unique doodle can trigger the generation of your passwords! First 1,000 users to download forghetti™ receive 6 months' free access to Premium. Unimaginably secure, forghetti™, the […]
itsecurityguru.webp 2019-02-20 11:08:00 iPhone Group Calls Still Not Working Properly. (lien direct) Group FaceTime calls on the iPhone and other Apple products are still not working properly, after the company rushed to fix a major bug. Earlier this month, it emerged that it was possible to listen in on people through their iPhone by exploiting a bug in FaceTime, the app used to make audio and video calls […]
itsecurityguru.webp 2019-02-20 11:07:01 Epic GDPR battle against Google, adtech giants. (lien direct) Privacy warriors have filed fresh evidence in their ongoing battle against real-time web ad exchange systems, which campaigners claim trample over Europe’s data protection laws. The new filings – submitted today to regulators in the UK, Ireland, and Poland – allege that Google and industry body the Interactive Advertising Bureau (IAB) are well aware that their advertising […]
itsecurityguru.webp 2019-02-20 11:06:04 Majority of vulnerabilities in 2018 associated with network vulnerabilities reports claims. (lien direct) The majority of vulnerabilities in 2018 were associated with network vulnerabilities, while less than 20% were associated with web applications and APIs, according to the fourth annual Vulnerability Stats Report from edgescan. When it comes to breaches, though, web application security remains the area of greatest risk. “The percentage of high and critical risks combined, compared to […]
itsecurityguru.webp 2019-02-20 11:06:00 Microsoft expands its cyber security services in Europe. (lien direct) Microsoft has expanded the reach of its cyber security service for political organisations in Europe, after detecting a fresh wave of attacks from Russian hackers. The firm’s vice president for customer security and trust Tom Burt said Microsoft’s Threat Intelligence Centre (MSTIC) had discovered attacks on employees of the German Council of Foreign Relations, and European […] Threat
itsecurityguru.webp 2019-02-20 11:05:00 Cyber-thieves hijacking payment data. (lien direct) Thousands of websites are being hit by cyber-thieves who implant code to scoop up payment card numbers, research suggests. Security giant Symantec found more than 4,800 websites were being hit by these “form-jacking” attacks every month. High-profile victims of these attacks include airline BA and Ticketmaster. Online crime groups had turned to the attacks as […]
itsecurityguru.webp 2019-02-18 12:06:02 Six Countries with the Best Cyber Security Measures. (lien direct) Organisations and governments are progressively putting resources into enhancing their cyber security conventions as the recurrence of attacks rises. Actually, every one of them is attempting to remain on track against the most recent cyber-attacks, yet there are a few nations committing most to cyber security. Source: Analytics Insight
itsecurityguru.webp 2019-02-18 12:05:04 Employees are still the weakest link in security. (lien direct) A third of workers used own email for work, and 24% shared files with family and friends. Employees are still the weak link in the security system, with poor habits that potentially put organisations at risk of critical data and intellectual property loss, and severe legal and reputational repercussions, new research from Microsoft has found. Source: Irish […]
itsecurityguru.webp 2019-02-18 12:05:01 \'Relatively benign\' data leak – LandMark White says. (lien direct) LandMark White has claimed that the data inadvertently leaked by the property valuation firm and subsequently posted on a 'darkweb' forum is “relatively benign”. Earlier this month the ASX-listed company revealed details of a data breach. It subsequently entered a trading halt to assess the impact on its business, after major banks paused their use of its services. […]
itsecurityguru.webp 2019-02-18 12:04:04 Australia\'s government targeted by \'sophisticated state actor\'. (lien direct) Australia's major political parties have been targeted by a “sophisticated state actor”, according to Scott Morrison, as part of a breach of the Parliament House computer network. The head of the Australian Cyber Security Centre, Alistair MacGibbon, says agencies were unsure what material had been taken in the incident because the rapid remediation efforts had removed […]
itsecurityguru.webp 2019-02-18 12:04:01 UK cyber-security chiefs claim Huawei risk can be managed. (lien direct) Any risk posed by involving the Chinese technology giant Huawei in UK telecoms projects can be managed, cyber-security chiefs have determined. The UK’s National Cyber Security Centre’s decision undermines US efforts to persuade its allies to ban the firm from 5G communications networks. The Chinese government is accused of using Huawei as a proxy so […]
itsecurityguru.webp 2019-02-14 16:22:00 New Platform Aims To Transform Cybersecurity. (lien direct) A new software platform aims to transform cybersecurity by allowing managers to monitor the whole of their cybersecurity from one single screen. ThreatAware is unique in bringing together cybersecurity tools and company-wide compliance procedures on one easy-to-use dashboard, which alerts users to threats, makes clear what actions need to be taken by whom and ensures […]
itsecurityguru.webp 2019-02-14 10:24:00 More FBI arrests: Apophis Squad hacker in the US. (lien direct) The FBI arrested yesterday a hacker part of a hacking team known as Apophis Squad. This is the second arrest of an Apophis Squad member after UK cops arrested a teenager in August 2018.The two, US and UK citizens, respectively, have been charged in an indictment unsealed by the US Department of Justice yesterday. Source: […]
itsecurityguru.webp 2019-02-14 10:23:03 QNAP acknowledges mystery malware in NAS but there\'s no patch. (lien direct) Taiwanese NAS maker QNAP has admitted its devices are affected by mysterious malware that alters hosts files on infected boxen following The Register’s report.In a security advisory published yesterday, QNAP told its customers: “A recently reported malware is known to affect QNAP NAS devices. We are currently analyzing the malware and will provide the solution […] Malware
itsecurityguru.webp 2019-02-14 10:22:05 Beware of the Windows Executable that Masks Mac Malware. (lien direct) A new strain of MacOS malware disguises itself as a Windows executable file to evade detection and embed itself on a system. But the malware authors aren’t exactly in the cross-platform avant-garde: the .EXE file that carries the MacOS malware will not, in fact, execute on a Windows machine. Source: Dark Reading Malware
itsecurityguru.webp 2019-02-14 10:22:01 GreyEnergy malware – tricks to evade detection. (lien direct) An analysis of the malware linked with the 2015 cyber-attacks on the Ukrainian power grid reveals that hackers added a large amount of junk code to their malware in a bid to evade detection and to confuse security researchers. Source: Computing Malware
itsecurityguru.webp 2019-02-14 10:21:03 Pentagon\'s new AI strategy and what it means for cybersecurity. (lien direct) The new Pentagon artificial intelligence strategy serves as a roadmap for how the American military will embrace machine learning in future cyber operations, which could be a boon for companies who invest in the technology.Released Feb 12, the Pentagon's strategy shows how the American military will rely on artificial intelligence as a defensive tool. Source: […]
itsecurityguru.webp 2019-02-13 09:01:03 Nearly Half Of Consumers Concerned About Cyber Risks. (lien direct) Europ Assistance's Cyber Barometer, conducted by LEXIS, exploring consumer sentiment on Cyber Security across 9 countries has found that 46% of consumers are worried about cybercrime. This number rises to 49 percent for respondents with elderly parents and 54 percent for those with children. Nearly one third of respondents (31%) feel exposed to cyber security […]
itsecurityguru.webp 2019-02-12 17:10:03 DigiCert And Utimaco Work On Securing The Future Of IoT From Quantum Computing Threats Through Collaboration With Microsoft. (lien direct) Today, DigiCert, Inc., the world's leading provider of TLS/SSL, IoT and PKI solutions; Utimaco, one of the world's top three Hardware Security Module providers; and Microsoft Research, a leader in quantum-safe cryptography, announced a successful test implementation of the “Picnic” algorithm, with digital certificates used to encrypt, authenticate and provide integrity for connected devices commonly […] Guideline
itsecurityguru.webp 2019-02-12 17:09:02 TrustArc Named Winner In The 15th Annual Info Security PG\'s 2019 Global Excellence Awards®. (lien direct) TrustArc, the leading data privacy management company, today announced that Info Security Products Guide, the industry’s leading information security research and advisory guide, has named the TrustArc Privacy Platform a winner in the 15th Annual 2019 Info Security PG's Global Excellence Awards® in the Best Compliance category. These prestigious global awards recognisze cybersecurity and information […] Guideline
itsecurityguru.webp 2019-02-12 10:54:02 NCSC warn that stereotyping hackers exacerbates UK\'s cyber security skills shortage. (lien direct) Negative stereotypes about computer hackers are contributing to a skills shortage in the cyber security sector, according to industry experts.High-profile cyber specialists today warned the industry's hackneyed reputation as a breeding ground for reclusive computer geeks is misleading and is putting promising students off a career in the profession. Source: CityAM Guideline
itsecurityguru.webp 2019-02-12 10:53:04 OkCupid account hijackings. (lien direct) Users of popular dating site OkCupid have been complaining of hackers taking over their account, locking them out by changing the associated email address and password, and using information gleaned from the account to harass them. Source: Help Net Security
itsecurityguru.webp 2019-02-12 10:53:01 (Déjà vu) Project Furnace could solve DX issues combining serverless computing and GitOps. (lien direct) Assuring the privacy and security of sensitive data, and then actually monetizing that data, - ethically and efficiently - has turned out to be the defining challenge of digital transformation.Today a very interesting effort to address this complex dilemma is arising from the ferment, out of the UK. It's called Project Furnace, an all-new open […]
itsecurityguru.webp 2019-02-12 10:52:03 Some iPhones affected by iOS 12.1.4. (lien direct) Apple's iOS 12.1.4 comes to resolve several bugs in the operating, including the already infamous FaceTime bug that allows some users to see and hear others without them even answering calls. Source: Softpedia
itsecurityguru.webp 2019-02-12 10:51:04 ICO Helps Ban Mobile Spam Bosses. (lien direct) The directors of two UK companies have received several-year bans after allowing their respective firms to make hundreds of thousands of nuisance calls and texts.Aaron Frederick Stalberg, (27), from Exmouth, was director of market research and polling business The Lead Experts, which made 115,000 illegal automated marketing calls to members of the public. Source: Infosecurity […] Spam Guideline
itsecurityguru.webp 2019-02-11 15:40:02 Tip-Off means Fake MetaMask Crypto Malware Pulled From Google Play. (lien direct) Decentralized app (DApp) MetaMask is facing fresh problems from cryptocurrency scammers after malware impersonating the tool appeared on Google Play, cybersecurity company Eset reported Feb. 8. The malware, which replaces computer clipboard information in an attempt to steal cryptocurrency, was removed by Google at the beginning of the month after a tip-off from Eset researchers. […] Malware Tool
itsecurityguru.webp 2019-02-11 15:38:02 Fraudsters scamming teenage \'money mules\' on Social Media. (lien direct) Fraudsters are able to operate with impunity on social media networks like Instagram and Snapchat, scamming users and running little risk of being caught, a Sky News investigation has found. Police and anti-fraud groups are also warning that a too-trusting Instagram generation is falling victim to get-rich-quick scams, worth many millions of pounds a year […]
itsecurityguru.webp 2019-02-11 15:37:01 Cyberattacks in Top Three Threats. (lien direct) Climate change increasingly ranks as the world's most pressing security threat, with terrorism and cyberattacks also topping the list, according to a new survey by the Washington-based Pew Research Center. In a poll of 26 countries, 13 considered the warming planet the number one concern. This was followed by the threat of Islamic State in […] Threat
itsecurityguru.webp 2019-02-11 15:36:02 Cybersecurity Workers Struggle After Shutdown. (lien direct) Two Weeks Out from the longest government shutdown in United States history-and with the possibility of another still looming-government employees are still scrambling to mitigate impacts on federal cybersecurity defenses. And the stakes are high. Furloughed cybersecurity employees returned to expired software licenses and web encryption certificates, colleagues burned out from working on skeleton crews, […]
itsecurityguru.webp 2019-02-11 15:35:00 Check your hosts file for suspect anti-antivirus entries if you use QNAP NAS. (lien direct) Network attached storage maker QNAP’s customers have reported being hit by a mystery strain of old-school malware that disables software updates by hijacking entries in host machines’ hosts file. The malware’s full effects are, as yet, unknown – but users have reported that the most visible symptom is that some 700 entries are added to […] Malware
itsecurityguru.webp 2019-02-11 12:38:04 From Geeky Tech To Popular Payment Method: Kaspersky Lab Finds One-In-Ten People Now Use Cryptocurrency. (lien direct) Cryptocurrency, often associated with 'geeks' or those looking to raise cash quickly, has turned into a popular payment method. According to a recent report from Kaspersky Lab, one-in-ten people (13%) have now used it to make a purchase. However, cybercriminals are also embracing this trend by targeting cryptocurrency exchanges and modifying old threats to attack […]
itsecurityguru.webp 2019-02-08 10:21:05 Business email compromise attacks increased five-fold in the last year. (lien direct) Business email compromised (BEC) attacks have seen an explosive 476% growth between Q4 2017 and Q4 2018, while the number of email fraud attempts against companies increased 226% QoQ. BEC attacks use social engineering to target specific company employees, regularly from the firm's Finance department, and try to persuade them into wiring large sums of […]
itsecurityguru.webp 2019-02-08 10:21:01 New TrickBot banking trojan hits North American banking customers. (lien direct) A spam-based phishing campaign recently targeted North American banking customers with malicious Excel documents designed to infect victims with a new variant of the information-stealing TrickBot banking trojan, researchers reported earlier this week. The scam dates back to at least Jan. 27 and peaked in volume on Jan. 30, according a new blog post from […]
itsecurityguru.webp 2019-02-08 10:20:04 EE customer stalked by ex-partner following data breach. (lien direct) An EE customer has said she was stalked by an ex-partner who worked at the firm, after he accessed her personal data without permission. Francesca Bonafede’s number was switched to a new handset and her address and bank details were accessed. She said the company failed to take the data breach seriously and she had […] Data Breach
itsecurityguru.webp 2019-02-08 10:20:01 Mumsnet suffers data breach. (lien direct) Parent gabfest platform Mumsnet has reported a data security breach that it claimed happened amid a “software change” en route to migrating services to the cloud. A user sounded the alarm yesterday evening that they were able to log into and view details of another user’s account. This security screw-up, likely some kind of caching […]
itsecurityguru.webp 2019-02-08 10:19:03 Banking Trojan use increases as ransomware experiences decline. (lien direct) Ransomware accounted for one tenth of 1% of all malicious email content in Q4, according to a new threat report from Proofpoint. It's Q4 threat report found that banking trojans accounted for 56% of all malicious payloads in email in Q4, while remote access trojans (RATs) accounted for 8.4%. Proofpoint claimed that this marked a […] Ransomware Threat
itsecurityguru.webp 2019-02-07 10:32:00 Looking To The State Of Cybersecurity For The Year Ahead. (lien direct) By Tim Brown, VP of Security, SolarWinds MSP 2018 was a prolific year within the cybersecurity and wider tech landscape. Data breaches have consistently made headlines, and as a result, we have seen the public mood sour toward many well-known companies whose brands have been quite damaged-potentially irreversibly. The rate of high-profile cyber-attacks and data […]
Last update at: 2024-07-22 06:08:12
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter