Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2018-11-09 09:37:00 |
US Air Force invites white hats to find hackable flaws, again (lien direct) |
This is the third time that the air force wants ethical hackers to uncover chinks in its digital armor
|
|
|
|
|
2018-11-08 12:41:03 |
The cyber insurance question (lien direct) |
Prevention is the best option but people continue to search for the easiest way out
|
|
|
|
|
2018-11-07 14:42:00 |
New Chrome version aims to remove all ads from abusive sites (lien direct) |
The move is part of Google's continued clampdown on adverts that are intended to hoodwink users
|
|
|
|
|
2018-11-06 13:42:00 |
Supply-chain attack on cryptocurrency exchange gate.io (lien direct) |
>Latest ESET research shows just how far attackers will go in order to steal bitcoin from customers of one specific virtual currency exchange
|
|
|
|
|
2018-11-05 15:07:02 |
Malware of the 1980s: Looking back at the Brain Virus and the Morris Worm (lien direct) |
>This instalment in our series of articles to mark Antimalware Day tells the stories behind two creations that are representative of the 1980s: a virus viewed as the first-ever PC virus and a worm that caused the greatest damage ever wrought by a piece of malware up to that point
|
Malware
|
|
|
|
2018-11-02 13:07:04 |
Antimalware Day and the evolution of malicious code (lien direct) |
>Celebrated annually on November 3, Antimalware Day is an opportunity to recognize the work of cybersecurity professionals
|
|
|
|
|
2018-10-31 12:47:05 |
Growing pains: Skills gap meets expanding threat surface (lien direct) |
The need to defend a growing threat surface highlights the widening cybersecurity skills gap
|
Threat
|
|
|
|
2018-10-31 11:07:00 |
Five ways to make Halloween less cyber-scary for kids (lien direct) |
>How can we help kids avoid security horrors and stay safe from rogue online “neighbors” at Halloween and thereafter?
|
|
|
|
|
2018-10-29 12:58:04 |
Ransomware and the enterprise: A new white paper (lien direct) |
>Ransomware remains a serious threat and this new white paper explains what enterprises need to know, and do, to reduce risk
|
Threat
Ransomware
|
|
|
|
2018-10-29 10:56:02 |
Nothing exceeds like excess; or, a lack of privacy in the digital age (lien direct) |
>What has the internet brought us? And how does privacy stay anchored in the data deluge of the digital age? Here's a brief reflection to celebrate today's Internet Day
|
|
|
|
|
2018-10-26 10:58:05 |
IoT: A roomful of conundrums (lien direct) |
How can you stay safe in a world where “smart” is the new default?
|
|
|
|
|
2018-10-26 08:54:05 |
Cathay Pacific breach exposes data of 9.4 million passengers (lien direct) |
The data breach at the Hong Kong flag carrier is the third such incident to hit the aviation industry in two months
|
Data Breach
|
|
|
|
2018-10-25 08:57:05 |
ESET releases new decryptor for Syrian victims of GandCrab ransomware (lien direct) |
>ESET experts have created a new decryption tool that can be used by Syrian victims of the GandCrab ransomware. It is based on a set of keys recently released by the malware operators
|
Ransomware
Malware
Tool
|
|
|
|
2018-10-24 12:57:03 |
Banking Trojans continue to surface on Google Play (lien direct) |
>The malicious apps have all been removed from the official Android store but not before the apps were installed by almost 30,000 users
|
|
|
|
|
2018-10-24 10:03:00 |
LuminosityLink RAT author sentenced to 2.5 years in jail (lien direct) |
>As part of his plea agreement, the author of the malware also forfeited the proceeds from his crimes – 114 Bitcoin worth $725,000
|
Malware
|
|
|
|
2018-10-22 12:20:00 |
Strict password policy could prevent credential reuse, paper suggests (lien direct) |
The solution to password recycling may be easier to implement than previously thought, according to a recent paper
|
|
|
|
|
2018-10-19 10:19:02 |
Scams and flaws: Why we get duped (lien direct) |
What are the emotional triggers and errors in judgment that make you fall for an online scam?
|
|
|
|
|
2018-10-18 11:16:02 |
Tumblr patches bug that could have exposed user data (lien direct) |
>The microblogging platform is assuring its users that has found no evidence that any data was actually stolen
|
|
|
|
|
2018-10-18 08:54:00 |
VestaCP compromised in a new supply chain attack (lien direct) |
Customer see their admin credentials stolen & their servers infected with Linux/ChachaDDoS
|
|
|
|
|
2018-10-17 09:55:03 |
GreyEnergy: Updated arsenal of one of the most dangerous threat actors (lien direct) |
>ESET research reveals a successor to the infamous BlackEnergy APT group targeting critical infrastructure, quite possibly in preparation for damaging attacks
|
Threat
|
|
|
|
2018-10-16 12:01:02 |
Phishers are after something unusual in ploy targeting book publishers (lien direct) |
In a new twist on the theme, the scammers have their sights set on book manuscripts, among other things
|
|
|
|
|
2018-10-15 14:46:00 |
Facebook downgrades victim count, details data accessed in breach (lien direct) |
>While the number of victims is lower than previously thought, the data accessed for millions of them is more sensitive than originally believed
|
|
|
|
|
2018-10-15 13:23:05 |
The Occasional Orator Part 3 (lien direct) |
>Proper preparation can make all the difference when it comes to speaking at conferences
|
|
|
|
|
2018-10-12 11:26:04 |
Tips for minding the digital skills gap (lien direct) |
>The times they are a-changin', so how do you build and sharpen the skills that you need to avoid being left behind by the digital revolution?
|
|
|
|
|
2018-10-11 11:57:01 |
New TeleBots backdoor: First evidence linking Industroyer to NotPetya (lien direct) |
>ESET's analysis of a recent backdoor used by TeleBots – the group behind the massive NotPetya ransomware outbreak – uncovers strong code similarities to the Industroyer main backdoor, revealing a rumored connection that was not previously proven
|
Ransomware
|
NotPetya
|
|
|
2018-10-11 09:56:00 |
Send in the clones: Facebook cloning revisited (lien direct) |
As another confusing message spreads, we look at Facebook privacy, cloning, and hacking
|
|
|
|
|
2018-10-10 12:54:04 |
California outlaws poor default passwords in connected devices (lien direct) |
>The law is intended to help curb attacks that rely on weak, non-existent or publicly disclosed passwords that far too often ship with web-connected gadgets
|
|
|
|
|
2018-10-10 08:57:00 |
Google+ to shut down due to lack of adoption and privacy bug (lien direct) |
>Google has found no evidence of misuse of user information courtesy of a security glitch in the social platform's API
|
|
|
|
|
2018-10-09 12:00:03 |
Blockchain: What is it, how it works and how it is being used in the market (lien direct) |
A closer look at the technology that is rapidly growing in popularity
|
|
|
|
|
2018-10-08 12:34:05 |
Most routers full of firmware flaws that leave users at risk (lien direct) |
If you own a Wi-Fi router, it may well be riddled with security holes that expose you to a host of threats
|
|
|
|
|
2018-10-05 12:13:01 |
Virus Bulletin 2018: Supply chain hacking grows up (lien direct) |
Striking the balance between supply, demand and safety is a major concern
|
|
|
|
|
2018-10-05 10:12:05 |
Make it a cyber-habit: Five simple steps to staying safe online (lien direct) |
What are some essential steps you can take to increase your online safety – now and in the long run?
|
|
|
|
|
2018-10-04 12:02:01 |
Why ask the public about cybercrime and cybersecurity? (lien direct) |
Answers could help raise awareness of situations that people fear
|
|
|
|
|
2018-10-04 10:27:03 |
Virus Bulletin 2018: Attack velocity ramps up (lien direct) |
Some tips for helping to keep your data more secure from the floor of VB 2018
|
|
|
|
|
2018-10-03 13:13:00 |
Facebook: No evidence attackers used stolen access tokens on third-party sites (lien direct) |
>The social networking behemoth is expected to face a formal investigation by Ireland's Data Protection Commission in what could be the “acid test” of GDPR since the law became effective in May
|
|
|
|
|
2018-10-03 10:23:02 |
IT forensic tools: How to find the right one for each incident (lien direct) |
Some online resources that will help you find the most suitable IT forensic tools for each case
|
|
|
|
|
2018-10-02 12:12:00 |
Why keeping your cyber-wits about you matters (lien direct) |
>WeLiveSecurity is happy to support the European Cyber Security Month (ECSM) with its own “two cents”, split into four articles over the course of October that will be dedicated to promoting the campaign's goals
|
|
|
|
|
2018-10-01 13:33:05 |
50 million Facebook users affected in breach (lien direct) |
>It has yet to be determined whether the accounts were misused or what information was accessed. In the meantime, you can improve your account security with a few easy steps
|
|
|
|
|
2018-10-01 09:47:03 |
Top tips for protecting your Smart TV (lien direct) |
>The final few months of 2018 will likely be a busy time of year for people and cybercriminals will be no different as they continue to look for weak spots in networks
|
|
|
|
|
2018-09-28 11:34:00 |
Who\'s behind DDoS attacks at UK universities? (lien direct) |
>The timing of the attacks suggests that many attempts to take the networks offline may not necessarily be perpetrated by organized cybercriminal gangs
|
|
|
|
|
2018-09-27 09:57:03 |
LoJax: First UEFI rootkit found in the wild, courtesy of the Sednit group (lien direct) |
>ESET researchers have shown that the Sednit operators used different components of the LoJax malware to target a few government organizations in the Balkans as well as in Central and Eastern Europe
|
Malware
|
APT 28
|
|
|
2018-09-26 13:30:02 |
Twitter patches bug that may have spilled users\' private messages (lien direct) |
The flaw affected one of the platform's APIs between May 2017 and September 10 of this year, when it was patched “within hours”
|
|
|
|
|
2018-09-26 11:59:02 |
Defending your company from cyberattack (lien direct) |
>ESET CTO Juraj Malcho outlines some of the ways in which organizations can reduce their cybersecurity risk
|
|
|
|
|
2018-09-25 12:16:02 |
How to improve hiring practices in cybersecurity (lien direct) |
>Should schools and businesses do more to combat the shortfall of cybersecurity professionals by changing the hiring process for those interested in having a career in the industry?
|
|
|
|
|
2018-09-24 11:56:03 |
The Occasional Orator Part 2 (lien direct) |
>Public speaking and presenting at conferences can be daunting for the majority of people but by including some subtle tricks, the speaker can deliver a stronger message
|
|
|
|
|
2018-09-21 13:02:05 |
Attackers crack Newegg\'s defenses, slurp customers\' credit card data (lien direct) |
>The skimmer, injected into the store's payment page, harvested credit-card details from the store's online customers for more than a month
|
|
|
|
|
2018-09-21 09:58:01 |
DanaBot shifts its targeting to Europe, adds new features (lien direct) |
ESET researchers have discovered new DanaBot campaigns targeting a number of European countries
|
|
|
|
|
2018-09-20 14:05:04 |
Mirai\'s architects avoid prison thanks to work for FBI (lien direct) |
>Instead, the three men will cooperate with law enforcement and the broader research community – an area in which, it turns out, they already have quite some experience
|
|
|
|
|
2018-09-19 12:58:00 |
Fake finance apps on Google Play target users from around the world (lien direct) |
Cybercrooks use bogus apps to phish six online banks and cryptocurrency exchange
|
|
|
|
|
2018-09-18 11:58:02 |
The Occasional Orator Part 1 (lien direct) |
>Speaking at conferences can be daunting for presenters but often it is about striking the right balance between content and delivery
|
|
|
|