What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
itsecurityguru.webp 2017-06-13 10:39:21 (Déjà vu) Life Imitating Art: Artificial Intelligence technology won\'t progress unless the public\'s fears subside (lien direct) The rise of the digital assistant The world around us is becoming more automated than ever before, with many of us increasingly leaning on digital assistants such as Cortana, Echo and Siri to run our lives. Before too long it is highly likely that our cars will be driverless, fridges will restock and our homes ... ★★
itsecurityguru.webp 2017-06-13 10:35:57 Netskope Report Reveals Nearly 10 Percent of DLP Violations Come From Collaboration Cloud Services (lien direct) Netskope, the leader in cloud security, today announced the release of the June 2017 Netskope Cloud Reportâ„¢ on enterprise cloud service usage and trends. According to the report, cloud DLP policy violations in collaboration services like Slack and HipChat are on the rise, accounting for nearly 10 percent of total violations this quarter. These services ... Guideline ★★
itsecurityguru.webp 2017-06-12 09:49:04 Your Windows firewall may be useless as malware can bypass it (lien direct) Hackers may be able to use Intel’s Active Management Technology (AMT) to bypass Windows’ built-in firewall rendering it completely useless in detection of malware and ransomware. AMT allows remote access to networks or computers enabling administrators to easily install programs like an operating system on a remote computer. A hacking group known as PLATINUM has ... ★★★★
itsecurityguru.webp 2017-06-12 09:46:57 Raspberry Pi devices transformed into cryptocurrency miners by Linux malware (lien direct) The words “Linux” and “malware” don't tend to belong in the same sentence, but a new strain called Linux.MulDrop.14 is infecting Raspberry Pi devices. Infected machines are used to mine cryptocurrency for the malware’s author, and it take advantage of poor security to generate money from nothing. The good news is that the malware is ... ★★★
itsecurityguru.webp 2017-06-12 09:45:09 Malware downloader infects your PC without a mouse click (lien direct) You think you’re safe from malware since you never click suspicious-looking links, then somebody finds a way to infect your PC anyway. Security researchers have discovered that cybercriminals have recently started using a malware downloader that installs a banking Trojan to your computer even if you don’t click anything. All it takes to trigger the download is to hover ...
itsecurityguru.webp 2017-06-12 09:43:45 US army uses cyberwarfare to repulse simulated tank attack (lien direct) The US army has reportedly successfully used cyberweapons and electronic warfare (EW) to repulse a simulated tank attack during a training exercise. The cyberweapons used during the exercise, which took place at the Army National Training Centre in California, reportedly targeted radio and wireless communications systems of tankers. Soldiers reportedly used specific cyber tools to jam the tank’s communication signals and hack into ...
itsecurityguru.webp 2017-06-12 09:26:49 Flaw in Virgin Media Super Hub leaves it open to attack (lien direct) Researchers from Context Information Security have discovered a flaw in Virgin Media wireless home routers, allowing them to gain unauthorised administrative-level access to the devices. After reverse engineering software from the Super Hub 2 and Super Hub 2AC, manufactured by Netgear, Context's Jan Mitchell and Andy Monaghan discovered vulnerabilities in a feature allowing users to ... ★★
itsecurityguru.webp 2017-06-12 09:24:52 (Déjà vu) Dvmap: Android Malware with a New Technique for Controlling Devices appears on Google Play (lien direct) Kaspersky Lab experts have discovered an unusual new Trojan being distributed through the Google Play Store. The Dvmap Trojan is capable not only of obtaining root access rights on an Android smartphone, it can also take control of the device by injecting malicious code into the system library. If successful, it can then delete root ... ★★★
itsecurityguru.webp 2017-06-09 16:36:45 Synopsys Research highlights the Pervasive Use of Outdated and Insecure Third-Party (lien direct) Synopsys, Inc. have today released 'The State of Software Composition 2017' report, following their recent investigation into the security of the software supply chain- arguably one of the most significant challenges the software industry is currently facing. Using their own software composition analysis product, Protecodeâ„¢ SC,  Synopsys analysed real-world data, over a 12-month period (Jan ... ★★★★★
itsecurityguru.webp 2017-06-09 14:34:38 Sport subjected to the same type of cyber attacks – Lord Sebastian Coe (lien direct) Building strong relationships and forming key partnerships with stakeholders is the key to managing cyber security risks according to Lord Sebastian Coe, who was giving a keynote talk about Cyber, Risk & Resilence in Sport & Business during the final day of Infosecurity Europe 2017. Lord Coe stated that the world of sport is now ... ★★★★★
itsecurityguru.webp 2017-06-09 11:58:18 Lepide Sortware Auditor Suite (Review) (lien direct) Verdict: The price of compliance doesn't get much lower than this. Lepide's affordable Auditor Suite is a powerful auditing solution that delivers a wealth of information about business-critical systems and apps. Faced with ever stricter data protection regulations, businesses of all sizes must implement IT change management and security auditing to demonstrate compliance and avoid ... ★★★
itsecurityguru.webp 2017-06-09 11:30:15 Russian Voter System Tampering The Result Of Typical Weak Security (lien direct) The compromise of a highly classified report by an NSA contractor is serious enough, but the poor security measures were worse The recent disclosure of a document leak from the National Security Agency that contains details about the Russian hacking attempt on a vendor of voter registration software has the making of a spy thriller, ... ★★★
itsecurityguru.webp 2017-06-09 11:25:34 Cybersecurity workforce gap to hit 1.8 million by 2022 (lien direct) The cybersecurity workforce gap is on pace to hit 1.8 million by 2022 – a 20% increase since 2015. 68% of workers in North America believe this workforce shortage is due to a lack of qualified personnel. To help combat the growing gap, a third of hiring managers globally are planning to increase the size ... ★★
itsecurityguru.webp 2017-06-09 11:20:23 Al Jazeera hack: Qatar-based media network hit by \'systematic and continual\' hacking attempts (lien direct) Al Jazeera Media Network said it suffered a massive cyberattack targeting its systems, websites and social media platforms, the company announced on Twitter on Thursday (8 June). The Doha-based Pan-Arab satellite media network said it was combating “systematic and continual” hacking attempts on its websites and digital platforms. “These attempts are gaining intensity and taking ...
itsecurityguru.webp 2017-06-09 11:07:05 Mouse hovering malware delivery scheme spotted, called potentially very dangerous (lien direct) Cybercriminals have started using a new technique to infect computers that only requires a victim place their cursor over a malicious hyperlink for the malware to be injected. The new technique was noticed by several cybersecurity researchers – with dodgethissecurity doing an extensive analysis. The information security blog reported that an attack begins with the ... ★★
itsecurityguru.webp 2017-06-09 10:54:43 Going Beyond Regulation (lien direct) The cyber-security landscape is plagued by the fact that cyber-criminals seem to be permanently one step ahead and rather than addressing the problem, it seems that regulation is, in some cases, compounding the problem. Understandably, many organisations are opting to define security policies based on regulatory requirements, however the result is that their security postures ... ★★
itsecurityguru.webp 2017-06-09 10:44:34 CISOs, Your Cloud is 25 Times Larger than You Think (lien direct) A recent global study from Symantec (NASDAQ: SYMC), a world leader in cyber security, reveals that U.K. CISOs still fail to grasp the security risks their organisations face due to the rampant use of unsanctioned cloud applications. From popular productivity apps to free file transfer services, cloud apps are becoming increasingly popular within organisations. However, ... Guideline ★★
itsecurityguru.webp 2017-06-09 10:37:07 Could Fireball Malware Become the Next Mirai? (lien direct) This month, researchers uncovered a malware strain believed to have infected more than 250 million computers globally. It is further believed that this malware is present on 20 percent of corporate networks. Dubbed “Fireball,” the massive malware infection originated in China and has caused disastrous outbreaks in Brazil, India and Mexico. There's the potential for ...
itsecurityguru.webp 2017-06-08 12:56:38 Bruce Schneier on dangers of IoT: \'We\'re building a world-sized robot that\'s getting more powerful\' (lien direct) The queue to see Bruce Schneier snakes round the conference hall at Infosecurity Europe 2017, with many attendees clutching copies of his book “Data and Goliath” in their hands, hoping to get a mark of ink from the so-called “security guru”. Here, he needs no introduction. His gospel comes at breakneck pace, warning about the ... ★★★
itsecurityguru.webp 2017-06-08 12:47:31 Bored employees seen as biggest potential data security risk (lien direct) Employees who become distracted at work are more likely to be the cause of human error and a potential security risk, according to a snapshot poll conducted by Centrify at Infosec Europe in London this week. Of the 165 respondents, more than a third (35%) cite distraction and boredom as the main cause of human ...
itsecurityguru.webp 2017-06-08 12:41:42 Ex-SpaceX avionics tech loses safety certificate-forging wrongful dismissal lawsuit (lien direct) An avionics technician who claimed he was unlawfully fired from Elon Musk’s SpaceX after raising the alarm over alleged safety failures has lost his wrongful dismissal lawsuit. Jason Blasdell had claimed in court that he complained to the president of SpaceX in his efforts to alert his managers to what he said were forged test ...
itsecurityguru.webp 2017-06-08 12:38:13 Russian hackers used Britney Spears\' Instagram posts to control malware (lien direct) Russian hackers are singing a new tune. They have hidden the location of their command and control servers in comments left on pop star Britney Spears’ Instagram posts. The Turla espionage group, which over the years has targeted various governments, used social media to hide malware once it infected networks. View Full Story ORIGINAL SOURCE: ...
itsecurityguru.webp 2017-06-07 15:11:03 Hand in your notice – by 2022 there\'ll be 350,000 cybersecurity vacancies (lien direct) General Data Protection Regulation (GDPR) will force European organisations to expand their cyber workforce, causing demand to outstrip the supply of expertise. Two in five governments and companies will expand their cybersecurity divisions by more than 15 per cent in the next 12 months, according to a survey by the International Information System Security Certification Consortium, ...
itsecurityguru.webp 2017-06-07 11:58:39 Small businesses at risk by using freelance web developers (lien direct) Tripwire, Inc., a leading global provider of security and compliance solutions for enterprises and industrial organizations, today released findings from research investigating the dangers of turning over web development to an unqualified third party. Specifically, the research revealed that websites developed by “budget” developers, without portfolios or references, tend to be plagued with critical security ... Guideline ★★★★★
itsecurityguru.webp 2017-06-07 11:45:08 New Kaspersky Embedded Systems Security for ATMs and POS Terminals Closes Major Security and Compliance Gaps (lien direct) With the tactics of cybercriminals getting ever more sophisticated, and with regulatory pressures also mounting, financial enterprises are up against increasing hurdles when it comes to future-proofing their ATMs, Point of Sale systems and Point of Service machines. To help these organisations, Kaspersky Lab has released a new generation of its Kaspersky Embedded Systems Security. ... ★★★
itsecurityguru.webp 2017-06-07 11:34:18 (Déjà vu) Imperva Introduces New Machine Learning Algorithm to Protect Data Against Insider Threats (lien direct) Imperva, Inc. (NASDAQ: IMPV), committed to protecting business-critical data and applications in the cloud and on-premises, today announced CounterBreach 2.0 with a new algorithm to automatically place individuals and their cross-functional peers into “virtual” working groups based on interactions with enterprise files in order to identify unusual user access patterns. This new Dynamic Peer Group Analysis algorithm ... ★★★★★
itsecurityguru.webp 2017-06-07 11:27:42 RMI and NPE invest in SA\'s fintech Entersekt to supercharge global expansion (lien direct) Rand Merchant Investment Holdings (JSE:RMI) through AlphaCode, RMI's innovation hub for fintech entrepreneurs and Nedbank Private Equity (“NPE”) through its private equity investment vehicle, BoE Private Equity Investments, have each acquired minority shareholdings in Entersekt in a multi-million dollar transaction. Entersekt is a Stellenbosch-based innovator that has developed world-class push-based authentication and app security technology. ... ★★★★★
itsecurityguru.webp 2017-06-05 16:53:41 Short, Stealthy, Sub-Saturating DDoS Attacks Pose Greatest Security Threat to Businesses (lien direct) The greatest DDoS risk for organisations is the barrage of short, low volume attacks which mask more serious network intrusions, according to the latest DDoS Trends and Analysis report from Corero Network Security (LSE: CNS), a leading provider of real-time DDoS defense solutions.  According to new Corero research, which highlights DDoS attack attempts against its ... Guideline ★★
itsecurityguru.webp 2017-06-05 10:35:35 Singapore, Australia forge cyber security ties (lien direct) Singapore and Australia are forging closer ties in cyber security through joint efforts to build a secure and resilient cyber space that will contribute to the progress of both countries. In a two-year memorandum of understanding (MoU) inked by the two countries on 2 June 2017, the Cyber Security Agency of Singapore and the Australian ... ★★
itsecurityguru.webp 2017-06-05 10:23:49 London Bridge attacks: Theresa May wants to \'deprive the extremists of their safe spaces online\' (lien direct) Britain’s prime minster Theresa May called for regulating the internet in the wake of the London Bridge attack, which took the lives of seven people on Saturday. May called for new cyberspace rules that would “deprive the extremists of their safe spaces online.”  “We need to do everything we can at home to reduce the risks of extremism online,” ... ★★★
itsecurityguru.webp 2017-06-05 10:22:19 Chinese \'Fireball\' Malware Infects 250 Million Computers (lien direct) The security firm Check Point says it has found a malware infection of staggering scope and destructive potential. Originating in China, the “Fireball” malware package is believed to have infected more than 250 million computers worldwide and is present on 20% of corporate networks, with major infection centers in India, Brazil, and Mexico. Check Point calls it ... ★★★★
itsecurityguru.webp 2017-06-05 09:11:28 Number of fines for UK data privacy issues doubles and totals £3.2m (lien direct) Breaches of UK data protection laws during 2016 attracted thirty-five fines totalling £3,245,500 – almost double the 2015 total (18). Now with just under a year to go until the biggest change in privacy laws for over 20 years, UK organisations risk even larger fines if they fail to ensure compliance with the General Data ... ★★
itsecurityguru.webp 2017-06-05 09:06:21 The hunt for the best cyber security talent in Europe begins (lien direct) The hunt is on to find the UK's best cyber talent to represent the country in the prestigious European Cyber Security Challenge competition later this year. Cyber Security Challenge UK is looking for 10 candidates; aged 14-25, that have an outstanding aptitude for codebreaking, social engineering and digital forensics to compete against the best talent in Europe. And this year, the rules have changed. Young industry ... ★★★★★
itsecurityguru.webp 2017-06-05 08:59:09 ZoneFox unveils product update to assist with GDPR and other key regulatory compliance (lien direct)  ZoneFox, a world-class security platform that effectively combats the growing issue of insider threats to businesses through user behaviour analytics and machine learning, today launches its latest product version, 'ZoneFox 3.3'. It centres around a specialist feature known as ZoneFox Compliance Reporting, which has been specifically designed to assist businesses with some of the key ...
itsecurityguru.webp 2017-06-02 15:33:37 Bodies Held to Ransom – Tsar Team Hack (lien direct) This week saw thousands of private photos leaked online, following the hack of a Lithuanian cosmetic surgery clinic. The cybercriminals, who have dubbed themselves the 'Tsar Team', have leaked images they claim come directly from the Grozio Chirurgija clinic services. This follows the group holding the images, many of which were sensitive in nature, to ... APT 28
itsecurityguru.webp 2017-06-02 13:55:39 Skilled Cybersecurity Employee Shortage Tops List of Barriers to Effective Threat Detection & Management, Survey Finds (lien direct) The leading provider of Security-as-a-Service solutions, Alert Logic, has announced the results of their recent survey, revealing the latest data points and trends in cybersecurity. The survey was conducted in the UK, Benelux and Nordics, amongst 317 professionals in the security industry. Cybersecurity is all about preventing, detecting and remediating both internal and external threats ... Guideline
itsecurityguru.webp 2017-06-02 09:37:28 BA shutdown caused by contractor who switched off power, reports claim (lien direct) Airline inquiry focuses on human error amid reports that contractor at a data centre inadvertently switched off the power knocking out BA's computers An investigation into the power outage that led to chaos for British Airways over the bank holiday weekend is likely to focus on human error rather than any equipment failure. A contractor ... ★★★★★
itsecurityguru.webp 2017-06-02 09:35:00 US approves social media background checks for visa applicants (lien direct) The U.S. is buttressing its paperwork walls with new requirements for social media disclosures as part of revised visa applications. Reported by Reuters earlier today, the decision from the U.S. government's Office of Management and Budget was made over strenuous objections from education and academic groups during a public comment period. The new questionnaire will ...
itsecurityguru.webp 2017-06-02 09:27:15 Cybersecurity expert warns of escalating conflicts between states and criminal groups (lien direct) The director-general of France’s National Cybersecurity Agency has warned of a ‘permanent war’ online between states and criminal or extremist organisations. He argues different countries, not just Western nations, need to unite against hackers. View Full Story  ORIGINAL SOURCE: abc.net ★★
itsecurityguru.webp 2017-06-02 09:24:32 US military data found unprotected on Amazon web server (lien direct) More than 60,000 sensitive US military files have been found on a publicly accessible Amazon server by a security researcher. The files contained passwords for US government systems and the security credentials of a senior engineer at defence contractor Booz Allen Hamilton (BAH). They were discovered by Upguard analyst Chris Vickery. In a statement, BAH ... ★★★★
itsecurityguru.webp 2017-06-02 09:20:03 Tenable Delivers the First Vulnerability Management Platform to Unify IT and OT Security (lien direct) Tenable Network Security, Inc., a global leader in cybersecurity, today announced the latest release of its cloud-based Tenable.io platform, making it the industry's first vulnerability platform to incorporate and unify IT and OT security across the full range of traditional and modern assets. The demands of security platforms have grown and couple that with the computing ... Guideline ★★★
itsecurityguru.webp 2017-06-02 09:17:19 Are you making yourself a victim of phone fraud? (lien direct) 61% of consumers admit sharing answers to security questions on social media profiles Consumers are falling prey to the growing risk of phone fraud. A new study warns that criminals can use information found on social media profiles to answer weak security questions, posed by banks, to gain access to accounts. This highlights the security ... ★★★★
itsecurityguru.webp 2017-06-02 09:11:58 Advice for a CIO on making security an issue for everyone (lien direct) An organisation's cybersecurity is only as strong as the weakest link. This is why it is vital there is buy in from staff of all levels and that best practice is adopted across the organisation. We know attackers are looking for the easiest route into organisations so building barriers that deter them is a vital ... ★★
itsecurityguru.webp 2017-06-02 09:04:32 Health sector accounts for 43 percent of all UK data breaches, according to ICO data (lien direct) Egress Software Technologies, a leading provider of data security services, has revealed that the UK health sector suffered a disproportionate number of data breach incidents between January 2014 and December 2016. In total, healthcare organisations suffered 2,447 incidents and accounted for 43 percent of all reported incidents in the time period. By comparison, the second ... Guideline ★★
itsecurityguru.webp 2017-06-01 11:49:08 Senators ask FBI to look into FCC\'s cyberattack claims (lien direct) The FCC claimed earlier this month that the comment system by which people can weigh in on the proposal to kill net neutrality had been on the receiving end of a distributed denial-of-service attack. Today, a group of Senators asked that the FBI look into it. Brian Schatz (D-Hawai'i), Al Franken (D-Minn.), Patrick Leahy (D-Vt.), ... ★★★
itsecurityguru.webp 2017-06-01 11:45:34 Kmart Confirms Credit Card Data Breach (lien direct) The company did not say which of its locations were affected by the breach. Kmart, confirmed Wednesday that the popular retailer experienced a recent data breach, exposing customer credit card data to criminal hackers. While the company did not say which Kmart locations were affected by the breach, it said that online purchases at kmart.com ... ★★
itsecurityguru.webp 2017-06-01 11:44:31 Ever re-use your passwords? You\'re a hacker\'s dream (lien direct) With so much of life lived online, it can be hard to remember passwords for every app and platform you’re on, but re-using them is putting people at an ever-increasing risk of being hacked. The recent data breach of food and restaurant search engine Zomato saw hackers steal 17 million users’ data. The company had ... ★★★★★
itsecurityguru.webp 2017-06-01 11:41:36 [SECURITY] [DSA 3870-1] wordpress security update (lien direct) Several vulnerabilities were discovered in wordpress, a web blogging tool. They would allow remote attackers to force password resets, and perform various cross-site scripting and cross-site request forgery attacks. For the stable distribution (jessie), these problems have been fixed in version 4.1+dfsg-1+deb8u13. View full story ORIGINAL SOURCE: Seclist ★★★★
itsecurityguru.webp 2017-06-01 11:32:58 \'Cash for hacking tools\' sparks debate (lien direct) Security researchers are considering buying undetected software security vulnerabilities from a notorious group of hackers. The Shadow Brokers group has previously leaked exploits allegedly stolen from the US National Security Agency (NSA), and is offering more for sale. Some researchers want to buy the next batch of hacking tools, and help fix them before cyber-criminals ... ★★
itsecurityguru.webp 2017-06-01 10:04:00 Security Teams Overwhelmed by Rising Volume of Attacks (lien direct) Splunk Inc. , provider of the leading software platform for real-time Operational Intelligence, today announced the results of new research from IDC that shows organizations are constantly under attack and struggling to keep up. The research finds most organizations run time-consuming security investigations and often fail to effectively protect themselves. Read the full IDC InfoBrief, “Investigation ... Guideline
Last update at: 2024-07-22 10:07:31
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter