What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
itsecurityguru.webp 2017-08-14 10:39:13 Daily Stormer Hacked (lien direct) Anonymous have taken over the world's most notorious Nazi website, following clashes with white nationalists over the weekend that left one anti-fascist protestor dead. A post on the site attributed to the hacking group said that the site was now under its control and that it would stop it posting “putrid hate”. It also suggested ...
itsecurityguru.webp 2017-08-14 10:37:54 #OpDomesticTerrorism: Anonymous shuts down Charlottesville city website with DDoS attack (lien direct) The hacktivist collective Anonymous has reportedly claimed responsibility for shutting down the Charlottesville city website. The hacker group reportedly launched a distributed denial-of-service (DDoS) attack, shortly after a hit and run incident in the city, that claimed the life of 32-year-old Heather Heyer and injured at least 19 others. The DDoS attack, launched under a new banner, dubbed #OpDomesticTerrorism, ...
itsecurityguru.webp 2017-08-14 10:35:39 Cyber attacks on online retailers double in a year as hackers try to steal shoppers\' details (lien direct) The numbers of online shops hit by serious losses of customer data has doubled in the past year as hackers try to plunder retails sites for valuable personal details, a law firm has warned. Customers are increasingly at risk as retailers amass ever growing collections of their shoppers' personal information. Online shopping, digital marketing and ...
itsecurityguru.webp 2017-08-14 10:33:02 Synopsys Fuzzing Report Identifies IoT and Industrial Control Systems Software as Most Vulnerable to Exploits (lien direct) In the latest fuzzing report by Synopsys, Inc. it was found the overall average time to first failure (TTFF) - the first instance when a protocol crash is recorded - was 1.4 hours. In the case of more mature protocols, the length of time is in hours. But with less mature protocols, that time could ... ★★★★
itsecurityguru.webp 2017-08-14 09:44:37 Everton FC tackles data security in the cloud with Netskope Active Platform (lien direct) Netskope, the leader in cloud security, today announced a deal with Everton FC to implement software which protects the Premier League club's confidential data in the cloud.   The Netskope Active Platform analyses all cloud services – sanctioned and unsanctioned – for all employees (whether on premises or remote) to provide complete visibility into what ... Guideline
itsecurityguru.webp 2017-08-11 15:12:32 Lastline\'s Market Momentum Dramatically Accelerates During Q2 2017 (lien direct) Lastline has announced explosive growth and market momentum throughout the first half of the year. In Q2 alone, the company saw its highest ever quarterly sales performance, signed partnerships with IBM and Forcepoint, completed a $28.5M Series C round of fundraising, and announced Lastline Breach Defenderâ„¢, which provides unparalleled insight into network breaches. The company's 50 ... ★★★
itsecurityguru.webp 2017-08-11 09:48:17 One Identity Safeguard Introduces Frictionless Security for Privileged Accounts to Aid in Organizations\' Digital Transformation (lien direct) One Identity, a proven leader in helping organizations get identity and access management (IAM) right, today announced a new version of its One Identity Safeguard privileged access management solution. The new solution, called One Identity Safeguard 2.0, includes new features that enable user flexibility and add redundancy while aiding the security of today's hybrid infrastructures, ... Guideline ★★★★★
itsecurityguru.webp 2017-08-11 09:31:12 Skills gap could delay IoT innovation in the energy sector, finds Inmarsat (lien direct)   If energy companies are to successfully deploy Internet of Things (IoT) technology to drive innovation, efficiency, and increased productivity, they must upskill current employees and/or embark on recruitment drives. This is according to independent research commissioned by Inmarsat (LSE:ISAT.L), which found that while the vast majority of energy companies have their sights set on ... ★★★
itsecurityguru.webp 2017-08-11 09:25:59 Attacking critical infrastructure – the evolution of kinetic warfare (lien direct) I said earlier in 2017 I believed it was quite possible that in 2017 a major cyberattack will occur in either the United States, the United Kingdom, or another friendly country that will require a response equivalent to a kinetic attack. In other words, a cyberattack will occur that will be looked on as an ...
itsecurityguru.webp 2017-08-11 09:22:09 Phishing tops list of most prevalent security threats facing organisations globally (lien direct) Results of SANS Institute 2017 Threat Landscape survey paints users and endpoints as primary targets, and part of the solution Security professionals rated phishing (72%), spyware (50%) and ransomware (49%) as top threats  37% of security professionals indicated that calls to the help desk enabled them to discover their most impactful threats   According to ...
itsecurityguru.webp 2017-08-11 09:12:02 Android app stores flooded with 1,000 spyware apps (lien direct) Hackers have flooded Android app stores, including the official Google Play store, with over 1,000 spyware apps, which have the capability to monitor almost every action on an infected device. Dubbed SonicSpy, the malware can silently record calls and audio, take photos, make calls, send text messages to numbers specified by the attackers, and monitor ...
itsecurityguru.webp 2017-08-11 09:04:09 Biological malware: Scientists use DNA to hack a computer (lien direct) Scientists at the University of Washington in Seattle, have successfully been able to code a malware program into a DNA sample and use it to hack into a computer that was studying it. By doing this, they have exposed a weakness in systems that could lead to hackers taking control of computers in research centres, ... Guideline ★★★
itsecurityguru.webp 2017-08-11 09:02:35 Kaspersky Lab patches up relationship with Microsoft as antitrust complaint dropped (lien direct) Russian cybersecurity firm Kaspersky Lab has dropped an antitrust legal complaint against Microsoft after the US technology giant agreed to give anti-virus vendors greater control over how their software will be compatible with future versions of its Windows OS. In June 2017, Kaspersky Lab filed legal cases against Microsoft in both the European Commission and ... ★★★★
itsecurityguru.webp 2017-08-11 09:00:00 TalkTalk fined £100k for exposing personal sensitive info (lien direct) Blighty’s Information Commissioner's Office has whacked TalkTalk with a £100,000 fine after the data of the records of 21,000 people were exposed to fraudsters in an Indian call centre. The breach came to light in September 2014 when TalkTalk started getting complaints from customers that they were receiving scam calls. Typically, the scammers pretended they ...
itsecurityguru.webp 2017-08-10 09:09:37 Microsoft bins unloved Chinese cert shops (lien direct) Microsoft’s decided not to support digital certificates issued by Chinese outfits WoSign and StartCom, but the first-mentioned CA disputes the decision. Google, Apple and Mozilla binned WoSign certs in 2016. Microsoft says it has now “… concluded that the Chinese Certificate Authorities (CAs) WoSign and StartCom have failed to maintain the standards required by our ... ★★★★★
itsecurityguru.webp 2017-08-10 09:02:48 Amber Rudd falls for hoax email prankster who also fooled Trump administration officials (lien direct) The email hoaxer who previously duped Trump administration officials, as well as the governor of Bank of England, has tricked yet another high profile individual into engaging in an email exchange. UK home secretary Amber Rudd is reportedly the latest victim of the email prankster who goes by the pseudonym Sinon Reborn. The prankster reportedly ... ★★
itsecurityguru.webp 2017-08-10 08:57:48 \'Cyber alarm\' will help businesses meet tough new data rules (lien direct) A new 'cyber alarm' system which sounds a warning when a website or IT network comes under attack allows businesses to detect security breaches as soon as they occur. Foregenix is the first cyber security firm in the UK to offer Canary, which sits on a company's website and 'chirps' loudly when there is an attempted 'break ... ★★★
itsecurityguru.webp 2017-08-10 08:53:31 Petya, WannaCry and Mirai- 4 steps to protect yourself from the new normal (lien direct) In the past year alone, cybercriminals have upped their game when it comes to high-profile global attacks, with Mirai, WannaCry and Petya all occurring one after the other. The effects have been devastating to some of the world's largest economies and industries. However, despite the attention in the media, this is not a new phenomenon. ... Wannacry
itsecurityguru.webp 2017-08-10 08:50:01 (Déjà vu) Nobody said Threat Intelligence Would be Easy (lien direct) A new report by the Information Security Forum (ISF) entitled Threat Intelligence: React and Prepare made headlines last month with its main finding that only 25% of companies surveyed felt that threat intelligence is delivering on its promise. While the findings in the report are all valid, pointing to threat intelligence and crying foul is ...
itsecurityguru.webp 2017-08-09 12:06:51 An Interview with 2016 Cloud Security Superhero Andrew Hardie (lien direct)   At last year's Security Serious Unsung Heroes Awards, Andrew Hardie, Chair of the BCS DevSecOps Group, was awarded the title of Cloud Security Superhero. I chased him up to see what his overview thoughts on the event were and ask why is it important to support and encourage people to take part. What is the significance ... ★★★★
itsecurityguru.webp 2017-08-09 09:42:33 A ghost story – The haunting presence of an ex-employee (lien direct) From recruiting the most talented employees, to ensuring accounts are in order and providing staff with the latest technological innovations, businesses across the globe work tirelessly every day to strive for success. Lurking behind every policy, best practice and guideline, however, is a world that often gets neglected. What happens when someone leaves the company? ... ★★
itsecurityguru.webp 2017-08-09 09:37:32 From zero-day exploits to rampant \'ransomware\': how advanced targeted attacks evolved in Q2, 2017 (lien direct) The second quarter of 2017 saw sophisticated threat actors unleash a wealth of new and enhanced malicious tools, including three zero-day exploits and two unprecedented attacks: WannaCry and ExPetr. Expert analysis of the last two suggests the code may have escaped into the wild before it was fully ready, an unusual situation for well-resourced attackers. ... Wannacry ★★★★★
itsecurityguru.webp 2017-08-09 09:35:16 Business Risk Profile: The Oil and Natural Gas Sector (lien direct) Few threats expose the true interdependency of cyber and physical security more than those targeting the oil and natural gas (ONG) sector. After all, oil and natural gas together account for 53 percent of the world's energy consumption and remain integral determinants of both global trade and the economy. Safeguarding these resources and the systems on which ... ★★★★★
itsecurityguru.webp 2017-08-09 09:11:37 NotBeingPetya: UK critical infrastructure firms face huge fines for lax security (lien direct) The UK government has announced that businesses providing essential services like energy and transport could be fined as much as £17m or 4 per cent of global turnover for failing to have effective cyber security measures in place. The proposals from the Department for Digital, Culture, Media & Sport satisfy requirements under the EU Network ...
itsecurityguru.webp 2017-08-09 09:09:50 More pseudo-ransomware attacks are probably on the way (lien direct) In a new report examining cybersecurity trends for the quarter, it sounds like “ransomware” - emphasis on the air quotes - will remain very much in vogue through 2017. The last few months saw some major malware moments, most notably the WannaCry and NotPetya (a.k.a. ExPetr/Nyetya/Petya) attacks. Kaspersky Labs' quarterly report suggests that the trend ... NotPetya Wannacry
itsecurityguru.webp 2017-08-09 09:08:31 Disney Faces Lawsuit Over Apps That Allegedly Spy On Kids (lien direct) A slew of Disney-branded mobile applications, including some Star Wars, Moana and Disney Princess apps, are allegedly spying on children across the United States. A class-action suit filed in California claims that The Walt Disney Co is commercially exploiting minors, including kids under the age of 13, by secretly tracking them using high-end behavioral analytics ... ★★★★
itsecurityguru.webp 2017-08-09 09:06:11 WannaCry hero malware trial postponed (lien direct) The US court appearance of British WannaCry hero on charges of writing and distributing malware has been postponed. US authorities have postponed the court appearance of Briton Marcus Hutchins, who is under charges of helping to develop and maintain the password-stealing malware Kronos between July 2014 and July 2015. View Full Story  ORIGINAL SOURCE: Computer ... Wannacry ★★★
itsecurityguru.webp 2017-08-09 09:04:02 Ukraine\'s national postal service networks disrupted by two-day DDoS cyberattack (lien direct) The computer networks of Ukrposhta, the national postal service in Ukraine, have reportedly been disrupted by a two-day distributed-denial-of-service (DDoS) cyberattack. According to the Interfax news agency, the computer systems targeted by the unknown hackers are linked to the tracking of customer parcels. It is believed that the attack started on the morning of Monday ... ★★★★
itsecurityguru.webp 2017-08-08 12:33:04 Vodafone Joins prpl Foundation to Spur Open-Source Innovation in the Digital Home and Smart Gateways (lien direct) The prpl Foundation, an open-source, community-driven consortium with a focus on enabling the security and interoperability of embedded devices for the smart society of the future, today announced Vodafone Group has joined the Foundation. As a leading multi-national telecommunications provider and Europe's fastest-growing fixed broadband provider, Vodafone joins prpl with the intent to accelerate the ... Guideline
itsecurityguru.webp 2017-08-08 09:55:47 (Déjà vu) GDPR compliance: six steps to make it happen (lien direct) The deadline for GDPR compliance is now less than a year away. The regulation has become a major business concern for many companies, with good reason – one of the most publicised parts of the legislation is the threat of non-compliance fines up to 4 per cent of global revenues. That's without mentioning the inestimable reputational ...
itsecurityguru.webp 2017-08-08 09:51:45 The CIO will report to the CISO (lien direct) J.J. Guy, Senior Director of Cloud Engineering, Carbon Black Several years ago, security leaders in many organisations were promoted from a mid-tier manager to the CISO.  In the early org chart iterations, security was considered as “just one more job” of the IT department, so the manager who owns security took the CISO title but ... Guideline
itsecurityguru.webp 2017-08-08 09:46:31 Ireland\'s state-owned electricity provider EirGrid hit by \'state-sponsored\' hackers (lien direct) EirGrid, an electricity provider that manages power across Ireland and Northern Ireland, was allegedly compromised by ‘state-sponsored’ hackers in April 2017. The culprits hacked the state-owned operator after infiltrating a Vodafone network used by the company. They installed malicious software to intercept all unencrypted communications flowing through its web routers in Wales and Northern Ireland, ...
itsecurityguru.webp 2017-08-08 09:42:02 Firms face £17m fine if they fail to protect against hackers (lien direct) Firms could face fines of up to £17m or 4% of global turnover if they fail to protect themselves from cyber-attacks, the government has warned. The crackdown is aimed at making sure essential services such as water, energy, transport and health firms are safeguarded against hacking attempts. Firms will also be required to show they ... ★★★★
itsecurityguru.webp 2017-08-08 09:39:31 Red Cross Blood Service data breach that affected 550,000 donors caused by \'one-off human error\' (lien direct) The massive data breach that hit the Australian Red Cross Blood Service last year was caused by a “one-off human error”, the Office of the Australian Information Commissioner said on Monday (7 August). Regulators concluded their investigation into the data breach that affected over half a million blood donors in Australia saying it was caused ... ★★★
itsecurityguru.webp 2017-08-08 09:36:23 Hackers could exploit solar power equipment flaws to cripple green grids, claims researcher (lien direct) A Dutch researcher says he found a way to cause mischief on power grids by exploiting software bugs in solar power systems. Specifically, Willem Westerhof, a cybersecurity researcher at ITsec, said he uncovered worrying flaws within power inverters – the electrical gear turns direct current from solar panels into alternating current that can be fed ...
itsecurityguru.webp 2017-08-07 09:27:11 (Déjà vu) The risks of not being GDPR compliant (lien direct) There has been loads written and talked about surrounding General Data Protection Regulation (GDPR). The new regulation is arguably the most significant change in global privacy law in twenty-two years and businesses must shore up their cybersecurity processes and procedures to avoid facing financial penalties. GDPR is due to be implemented on May 25th 2018 ... ★★★
itsecurityguru.webp 2017-08-07 09:17:27 Cuscal behind Woolworths duplicate payment bungle (lien direct) Woolworths has apologised to customers on Monday following reports that some experienced a second batch of payments withdrawn from their bank accounts. A Woolworths spokesperson told ZDNet it received confirmation from Cuscal, one of its payment processors that services financial institutions, that due to an error at its datacentre, Woolworths customers may have received incorrect ... ★★★
itsecurityguru.webp 2017-08-07 09:14:51 Forget sexy zero-days. Siemens medical scanners can be pwned by two-year-old-days (lien direct) Hackers can exploit trivial flaws in network-connected Siemens’ medical scanners to run arbitrary malicious code on the equipment. These remotely accessible vulnerabilities lurk in all of Siemens’ positron emission tomography and computed tomography (PET-CT) scanners running Microsoft Windows 7. These are the molecular imaging gizmos used to detect tumors, look for signs of brain disease, ... ★★★
itsecurityguru.webp 2017-08-07 09:12:15 China\'s web users fear losing tools to bypass \'Great Firewall\' (lien direct) Enterprising internet users in China fear the tools they use to tunnel through the country’s “Great Firewall” may soon disappear, as Beijing tightens its grip on the web. Tens of millions of people are estimated to use Virtual Private Networks (VPNs) to bypass Chinese internet restrictions — getting access to blocked websites such as Facebook ... ★★★
itsecurityguru.webp 2017-08-07 09:09:52 Cisco accidentally loses customer data due to Meraki cloud configuration error (lien direct) Cisco has admitted to losing some customers’ data last week due to a Meraki cloud configuration data. The company revealed in an update on Friday that its engineering team made a configuration change on the North American object storage service that led to some of its customer data being deleted in the process. Meraki is ... ★★★★★
itsecurityguru.webp 2017-08-07 09:07:19 Ariana Grande\'s Instagram Account Hacked (lien direct) This time, hackers managed to take control of Ariana Grande's Instagram account, and the attackers started posting racist and homophobic messages, while also threatening other American stars to breach their accounts. While no hacking group or individual claimed the attack, the Instagram account is believed to have been breached by a fan of Selena Gomez ... ★★
itsecurityguru.webp 2017-08-07 09:03:17 Does the cloud really live up to its security expectations? (lien direct) Having worked in the data management industry for nearly two decades, I have noticed that “the new data culture” promised by the introduction of cloud technologies hasn't quite taken off to the level promised to the enterprise market. As the cloud model has matured from basic hosting all the way up to full services, a ... ★★★★
itsecurityguru.webp 2017-08-04 09:11:32 NHS cyber-defender Marcus Hutchins to appear in US court (lien direct) British cyber-security researcher Marcus Hutchins will appear in court in Las Vegas later charged in a US cyber-crime case. The 23-year-old has been accused of involvement with Kronos – a piece of malware used to steal banking logins from victims’ computers. Mr Hutchins, from Ilfracombe in Devon, came to prominence after he stalled the WannaCry ... Wannacry ★★
itsecurityguru.webp 2017-08-04 09:10:17 South Korea spy agency admits trying to rig 2012 presidential election (lien direct) National Intelligence Service says it mobilised cyberwarfare experts to ensure Park Geun-hye beat rival and now president Moon Jae-in South Korea's spy agency has admitted it conducted an illicit campaign to influence the country's 2012 presidential election, mobilising teams of experts in psychological warfare to ensure that the conservative candidate, Park Geun-hye, beat her liberal ... ★★★
itsecurityguru.webp 2017-08-04 09:05:44 Ransomware can cost firms over $700,000; cloud computing may provide the protection they need (lien direct) High-profile cybercrime such as data theft, ransomware and computer hacks seem to be occurring more frequently and with higher costs, but cloud computing may provide the security that companies are searching for, experts suggest. “Cloud computing improves IT security and security professionals need as much help as possible,” said Nick McQuire, vice president of enterprise ... ★★★
itsecurityguru.webp 2017-08-04 08:42:28 Mitigating ransomware in the healthcare sector (lien direct) The healthcare sector is now a prime target for cyber criminals who are keen to capitalise on this sector's need to run an always-on operation and malware infections are the biggest information security concern amongst healthcare providers, as revealed by KPMG.   A recent Freedom of Information (FoI) request revealed that 88 NHS trusts out ...
itsecurityguru.webp 2017-08-04 08:40:20 Why advanced threat protections are the key to outsmarting the next ransomware attack (lien direct) The most prevalent cybersecurity concern in 2017 is undeniably ransomware, this year has seen it reassert itself into the public eye in a big way. The WannaCry attack in May was one of the largest ransomware attacks ever, affecting more than 300,000 computers running Microsoft Windows worldwide. What's more the attack hit a huge range ... Wannacry
itsecurityguru.webp 2017-08-03 09:11:22 Pentagon tests tablet access to secret classified documents (lien direct) The Pentagon has expanded a pilot program to allow some top officials to access documents with a 'secret' classification using 8-inch tablets. The move follows a similar program that gave some officials access to both 'secret' and 'top secret' classified documents on smartphones. With this program, the government hopes to make it easier for these ... ★★★★★
itsecurityguru.webp 2017-08-03 09:09:51 US DOJ publishes guidelines for setting up a vulnerability disclosure program (lien direct) Instituting a vulnerability disclosure program (aka bug bounty program) that won't blow up in the organization's face can be a daunting task. Some will prefer to enlist outside experts to advise them on how to do it, and others will want to rely on their own IT or security department. For the latter, here's some ... ★★★★
itsecurityguru.webp 2017-08-03 09:08:37 Wait? What? The IBM cloud\'s APIs use insecure TLS1 crypto? (lien direct) An e-mail has gone out from IBM about its Bluemix cloud: after next Tuesday, the SoftLayer APIs will no longer accept connections encrypted with the ancient TLS 1.0. It’s not quite a surprise that the 1990s-era protocol was still accepted: a great many services are still midway through their deprecation plans. View Full Story ORIGINAL ... ★★★★★
Last update at: 2024-08-01 18:18:47
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter