What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
itsecurityguru.webp 2017-05-09 09:39:26 Tor Browser News: Three Vulnerabilities Allow Spies To Detect Tor Browsers (lien direct) Attackers may be able to find out who is using a Tor Browser because of these three issues Tor, once known only by network nerds, has now become something of a hot topic. This is thanks largely to the anonymous network’s reputation for hosting drug marketplaces like Silk Road, and other unsavoury sites. View full ...
itsecurityguru.webp 2017-05-09 09:31:08 Are Cross-Protocol Attacks The Next Big Cybersecurity Danger? (lien direct) In the digital world we live in, technologies are rapidly evolving. Cyber threats are not lagging behind. While developers build more and more complex programs, hackers find new, smarter ways to attack. New threats can break connections that were considered highly secure until recently. One specific and recent example are the so-called cross-protocol attacks. They ... ★★★★
itsecurityguru.webp 2017-05-09 09:28:16 Ultima opens £18 million state-of-the-art HQ with creation of new jobs and expansion of apprenticeship scheme (lien direct) Ultima, a leading provider of on-premise and cloud IT infrastructure and managed service solutions, has today announced it has invested £18 million to create a state-of- the-art HQ in Reading. The company will also be creating 50 new jobs in its Reading office, and doubling the number of apprentices it takes on each year from ... Guideline ★★★
itsecurityguru.webp 2017-05-09 09:23:24 (Déjà vu) Neustar Research Shows A DDoS Attack Can Cost An Organization On Average More Than $2.5 Million in Revenue (lien direct) Neustar, Inc. (NYSE: NSR), a trusted, neutral provider of real-time information services, today released the findings from its fourth annual Worldwide DDoS Attacks and Cyber Insights Research Report. The report documents the frequency and cost of attacks and what measures are being taken to counter these threats. The Neustar May 2017 Worldwide DDoS Attacks and Cyber ... ★★
itsecurityguru.webp 2017-05-09 09:18:56 Thales joins Industrial Internet Consortium (lien direct) Thales, a leader in critical information systems, cybersecurity and data security, announces its e-Security business has joined the Industrial Internet Consortium® (IIC), the world's leading organization transforming business and society by accelerating the Industrial Internet of Things (IIoT). As a member of the IIC Thales will collaborate with industry leaders on global initiatives for IIoT ... Guideline ★★★
itsecurityguru.webp 2017-05-08 16:10:50 Thousands hit by Debenhams Cyber Attack (lien direct) British high street giant Debenhams has become the latest retailer to be hit by a data breach as it was reported that thousands have been effected by card-stealing malware. Around 26,000 customers of Debenhams Flowers website personal and financial details such as payment information, names and addresses stolen during the breach, which took place between ...
itsecurityguru.webp 2017-05-08 11:14:44 Tenable Offers Intel AMT Vulnerability Detection with Nessus and PVS (INTEL-SA-00075) (lien direct) Intel recently announced an escalation of privilege vulnerability in the Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology firmware, versions 6 through 11.6. Speaking about the vulnerability Cris Thomas (AKA SpaceRogue), Strategist for Tenable Network Security said, “This vulnerability has the potential of being a proverbial big one. The vulnerability has ...
itsecurityguru.webp 2017-05-08 10:57:53 DDoS Attack On Gaming, Gambling Sites In Hong Kong Believed To Be Extortion Attempt (lien direct) In the first two weeks of April, sudden spikes of traffic started hitting gaming and gambling sites in Hong Kong. The increased rush weren't anxious gamers looking to place bets, but a DDoS attack designed to take the sites offline. View full story ORIGINAL SOURCE: IBTimes
itsecurityguru.webp 2017-05-08 10:53:16 Are Android devices really easier to hack? We asked the experts (lien direct) Android is the most widely used mobile platform on the planet. More than 1.4 billion people use an Android smartphone or tablet every single day, and the fact that it's open source and free for manufacturers to use is a big part of that popularity. But openness is a double-edged sword: It has led to ... ★★
itsecurityguru.webp 2017-05-08 10:51:20 Viral phishing scams and vulnerabilities: What to watch out for this Patch Tuesday (lien direct) This month we will also explore the dangers of phishing scams and hardware vulnerabilities. Let's also recap the Java update which was part of the Oracle CPU the week after April Patch Tuesday for those who may not have updated it yet. View full story ORIGINAL SOURCE: Help Net Security ★★
itsecurityguru.webp 2017-05-08 10:50:05 Cybersecurity expert: Macron party hacker left \'digtal fingerprints\' pointing back to Russian involvement (lien direct) A specialist in cybersecurity told the Wall Street Journal that digital fingerprints left behind by a hacker on emails and documents belonging to new French President Emmanuel Macron's En Marche party show ties to the Kremlin. View full story ORIGINAL SOURCE: Rawstory ★★★★
itsecurityguru.webp 2017-05-08 10:47:21 Europe overtakes US to become the largest perpetrator of global cybercrime (lien direct) New data released today has revealed that 50 percent more cyberattacks originated from Europe than any other global region over the last 90 days, overtaking the United States for the first time. The UK and Netherlands, in particular, have become cybercrime hubs and are seeing a huge growth in online fraud rings. The latest research ... ★★★
itsecurityguru.webp 2017-05-08 10:40:02 Could cyber concerns stall uptake of smart energy technology and low carbon schemes? – PwC research (lien direct) Cyber risks associated with energy technology are high on the agenda for UK businesses with two-thirds (65%) significantly concerned about the issue and over half (51%) worried that their client data isn't handled securely enough by their energy supplier, according to the latest PwC B2B Energy Survey. This ongoing concern comes at a time when ...
itsecurityguru.webp 2017-05-08 10:26:11 How to hire the right people in cyber security (lien direct) In the realm of cyber security, it is no secret that the world is currently suffering from a shortage of expertise, with the void between demand and supply widening at an alarming rate. In the UK, it has become a serious problem, with recruitment site Indeed highlighting the issue by publishing research that shows that ...
itsecurityguru.webp 2017-05-05 10:01:43 Criminals Drain European Bank Accounts Using SS7 Security Flaw (lien direct) A known security flaw in the Signaling System 7 (SS7) protocol, which controls the way mobiles exchange calls and text messages across the globe, has been used by cyber criminals to  crack into the  European bank accounts. According to German newspaper Süddeutsche Zeitung the vulnerability was exploited in January  and used to bypass the two-factor ...
itsecurityguru.webp 2017-05-05 09:59:49 UK Police Force Fined £150,000 After DVD Footage Of Sex Crime Interviews \'Lost In Post\' (lien direct) Greater Manchester Police (GMP) has been fined £150,000 ($194,000) by the UK’s data breach watchdog – the Information Commissioner’s Office (ICO) – after three unencrypted DVDs containing footage of interviews with victims of violent and sexual crimes were “lost in the post”. The department sent the footage in 2015 to the Serious Crime Analysis Section ...
itsecurityguru.webp 2017-05-05 09:55:11 Leaked Document Reveals UK Plans For Wider Internet Surveillance (lien direct) The UK government is planning to push greater surveillance powers that would force internet providers to monitor communications in near-realtime and install backdoor equipment to break encryption, according to a leaked document. Provisions in proposals show that the government is asking for powers to compel internet providers to turn over the realtime communications of a ... ★★★
itsecurityguru.webp 2017-05-05 09:44:59 German Spy Chief Warns Russia Cyber Attacks Aiming To Influence Elections (lien direct) Germany's domestic intelligence agency expects new cyber attacks targeting politicians and government officials ahead of federal elections. Hans-Georg Maassen, head of the BfV agency, said spies are keeping a “very close watch” on threats as the country gears up for September's vote. “We expect further attacks, and we are keeping a very close watch on ... ★★★★
itsecurityguru.webp 2017-05-05 09:33:32 Positive Technologies discovers vulnerability in ATM security software (lien direct) Positive Technologies has discovered a serious vulnerability in GMV's Checker ATM Security. The defect allows an attacker to remotely run code on a targeted ATM to increase his privileges in the system, infect it and steal money.  Checker ATM Security protects ATMs by enforcing a wide range of restrictions in software: whitelisting with Application Control ... ★★
itsecurityguru.webp 2017-05-05 09:30:37 The biggest security problems with robotics (lien direct) Robotic devices and automation platforms - which are similar in many ways - seem to be exploding in the IoT market, and for good reason. The idea behind these systems is to automate or carry out basic tasks so we have more time to do the important stuff. But a new study from authors at ... ★★★
itsecurityguru.webp 2017-05-05 09:26:23 GDPR – Get ready for it! (lien direct) The General Data Protection Regulation will come into force on the 25th of May 2018 and will require organisations to comply with a host of strict data protection rules for processing data of EU residents, or face substantial fines as a result of non-compliance. The regulation is intended to establish one single set of rules ... ★★
itsecurityguru.webp 2017-05-04 16:12:05 Sadiq Is Right: Why London Needs A Chief Digital Officer (lien direct) Dale Lovell, Chief Digital Officer and UK Managing Director (MD) at ADYOULIKE said of London Mayor Sadiq Khan recruiting for London's first ever Chief Digital Officer: “Ten years ago the job of Chief Digital Officer simply didn't exist. Even as late as 2013, there were only 500 CDOs across the globe. The 'digital' aspect of ...
itsecurityguru.webp 2017-05-04 09:54:45 Hundreds Of Privacy-invading Apps Are Using Ultrasonic Sounds To Track You (lien direct) A new privacy-busting technique that tracks consumers through the use of ultrasonic tones may have once sounded like the stuff of science fiction novels, but today it’s reality. These near-silent tones can’t be picked up by the human ear, but there are apps in your phone that are always listening for them. This technology is ... ★★★★
itsecurityguru.webp 2017-05-04 09:47:41 Emotet Banking Trojan Debuts In U.S. (lien direct) A banking trojan that was first reported in June 2014 targeting banks in Germany and Austria and later in Switzerland has made its way to these shores, according to a blog post from the Center for Internet Security (CIS). The trojan arrives in phishing emails embedded in a malicious PDF targeting federal, state, local, tribal ... ★★★
itsecurityguru.webp 2017-05-04 09:46:05 ATM Security Devs Rush Out Patch After Boffins Deliver Knockout Blow (lien direct) A firm that supplies security software for cash machines has updated its technology after researchers uncovered a number of serious shortcomings. Flaws in GMV’s Checker ATM Security technology created a means for hackers to remotely run malicious code on a targeted ATM. The CVE-2017-6968 vulnerability opened the door to all manner of mischief – including ... ★★★★★
itsecurityguru.webp 2017-05-04 09:43:12 WhatsApp Working Again After 2 Hours, Cyber Attack Suspected (lien direct) The popular messaging app, WhatsApp, went down late Wednesday as users tried in vain to send messages. Users on Twitter suspected that there could be a cyber attack targeting the service. Later on in the day, the service started working again. The app went down as of 00:20 GMT+3, which indicates that it has been ... ★★★
itsecurityguru.webp 2017-05-04 09:38:19 (ISC)2 and Learning Tree to Embed Cybersecurity Certifications within Global Public/Private Sector Training Programmes (lien direct) (ISC)2, an international non-profit membership association, and Learning Tree International (OTCQX:LTRE) today announced a global agreement to enhance development of the professional cybersecurity practice around the world. (ISC)2 certifications will now be recognised within Learning Tree's proprietary course library and provided within the commercial training frameworks it maintains for major organisations, including the NATO Communications ... ★★
itsecurityguru.webp 2017-05-04 09:35:13 The start of 2017 witnessed a 5,000-fold decrease in the world\'s largest spam botnet mailings (lien direct) According to Kaspersky Lab's “Spam and phishing in Q1 2017” report, the world’s largest spam botnet, Necurs, demonstrated a relative decline in its fraudulent mailshot traffic. In December 2016, Kaspersky Lab's spam traps detected over 35 million fraudulent mailshots but in March 2017 that number fell to almost 7,000. The Kaspersky Lab spam report also ...
itsecurityguru.webp 2017-05-04 09:33:02 Data security and privacy remain the biggest concerns about retail apps (lien direct) Concerns about security breaches have been revealed as the biggest fear among consumers when it comes to deciding whether to download a retail app, according to research. Three quarters (74%) of shoppers said they were most concerned about the security of their information. As well as being worried about the security of their data, consumers ...
itsecurityguru.webp 2017-05-03 10:33:45 NSA Continued Spying On Americans, Collecting Over 151 Million Phone Records Despite Law Change (lien direct) The National Security Agency (NSA) collected over 151 million phone records of Americans in 2016, despite a new system created by the US Congress to limit the spy agency’s ability to gather bulk data, a report released by the Office of the Director of National Intelligence (DNI) revealed on 2 May. The government report detailed ... ★★★★
itsecurityguru.webp 2017-05-03 10:31:58 Mozilla Takes A Turn Slapping Symantec\'s Certification SNAFU (lien direct) Mozilla has weighed in to the ongoing Symantec-Google certificate spat, telling Symantec it should follow the Alphabet subsidiary’s advice on how to restore trust in its certificates. Readers will recall that Symantec has repeatedly issued certs that didn’t ring true with browser-makers and at the end of April 2017 Google started a countdown, the conclusion ... ★★★★
itsecurityguru.webp 2017-05-03 10:28:57 Apple Blocks Comms-snooping Malware (lien direct) Apple has moved to thwart a malware attack that used a legitimate – probably hijacked – developer certificate, by revoking the cert. Check Point wrote up the malware last week, calling “OSX/Dok” “the first major scale malware to target OSX users via a coordinated email phishing campaign”. A hapless user who okayed all the stages ...
itsecurityguru.webp 2017-05-03 10:26:55 Lockheed Martin Bets on Blockchain For Cybersecurity (lien direct) Lockheed Martin has contracted Guardtime Federal to provide blockchain cyber security, the defense company announced in a blog post. It’s the first US defense contractor to adopt blockchain as part of its security approach and Lockheed Martin says the partnership will allow it to “realize more efficient and secure software development and supply chain risk ...
itsecurityguru.webp 2017-05-03 09:16:55 Gartner Says Organisations Are Unprepared for the 2018 European Data Protection Regulation (lien direct) The European General Data Protection Regulation (GDPR) will have a global impact when it goes into effect on 25th May, 2018, according to Gartner, Inc. Gartner predicts that by the end of 2018, more than 50 per cent of companies affected by the GDPR will not be in full compliance with its requirements. “The GDPR ...
itsecurityguru.webp 2017-05-03 09:13:23 UK office workers “too trusting” of email attachments (lien direct) Major UK businesses are leaving themselves vulnerable to the most common form of cyber-attack, research by UK-based cyber security firm Glasswall Solutions has found. 58% of office workers among 1,000 employees surveyed at mid-to-large UK businesses revealed they usually open email attachments from unknown senders, leaving businesses open to breaches from documents carrying malicious exploits ...
itsecurityguru.webp 2017-05-02 10:28:11 Election Hack? “Could\'ve Been China,” Trump Says (lien direct) It “could’ve been China,” President Trump told an interviewer who asked about the hack into the 2016 presidential election. In an interview that aired on Sunday with John Dickerson, chief Washington correspondent for CBS News and host of Face the Nation, Trump said it was “very hard” to ascribe blame into the incursions into the ... ★★★
itsecurityguru.webp 2017-05-02 10:27:00 40,000 Tinder Pics Scraped Into Big Data Service (lien direct) Amid a storm of criticism, a set of facial images built by scraping the Tinder dating service has been pulled from Kaggle. Developer Stuart Colianni had built the 40,000-strong set of “hoes” (the charming variable name* in his source code – more below in case that repo also dies) on the premise that facial datasets ... ★★★★
itsecurityguru.webp 2017-05-02 10:25:10 Pokemon Go WARNING – Millions Of Players Hit By Terrifying New Malware (lien direct) Millions of mobile gamers have been tricked into downloading game guides laced with malware. Dubbed FalseGuide, was hidden in more than 40 apps in the Google Play Store disguised as guides for hugely-popular mobile games, including Pokémon Go and FIFA Mobile. When smartphone players downloaded the fraudulent game guide to their Android phone – the ...
itsecurityguru.webp 2017-05-02 10:21:13 Facebook Rejected One Fifth Of \'Emergency Requests\' From UK Police About Its Users (lien direct) Facebook has been accused of not cooperating with British police and security services after figures showed that that it turned down one in five emergency requests about social media users. Numbers from the social media giant showed that in the second half of 2016, it received nearly 1,000 police requests in which there was grounds ... ★★
itsecurityguru.webp 2017-05-02 10:15:00 EclecticIQ simplifies threat intelligence with Fusion Center launch (lien direct) EclecticIQ, the cyber threat intelligence technology provider, has announced the launch of EclecticIQ Fusion Center, a revolutionary approach to the collection, analysis, and distribution of cyber threat intelligence. Available as a managed service, EclecticIQ Fusion Center gathers the best threat intelligence from open-, community-, and over 30+ commercial sources[1] and fuses it into optimised bundles ... ★★★
itsecurityguru.webp 2017-05-02 09:15:07 Flexible Working is the Path Forward – Maintel Study (lien direct) Maintel, the fast-growing provider of managed communications services, today announced the results of a study on flexible working preferences in the UK. The study polled 1,000 employed adults in the UK, ages 18 and over. The study revealed that today's multi-generational workforce prefers flexible working to traditional office hours and location. Flexible work policies are ... ★★★
itsecurityguru.webp 2017-05-02 09:07:12 How Service Providers Win (lien direct) Standing still is the kiss of death for any service provider. If you fail to evolve, your competition advances. Ultimately, you're either left in the dust or rendered obsolete. It's imperative for service providers to always look several steps ahead. Planning for the next technology shift or solution set that helps you optimise you network and ... ★★★★
itsecurityguru.webp 2017-04-28 09:50:36 (Déjà vu) UK Likely To Face National Cyber Emergency, says NCSC (lien direct) The UK is likely to face a level-1 cyber attack at some point in the future, according to the National Cyber Security Centre (NCSC) View full story ORIGINAL SOURCE: Computer Weekly ★★
itsecurityguru.webp 2017-04-28 09:49:09 Fraudsters Are Emptying Bank Accounts By Diverting Calls And Text Messages (lien direct) A recent This is Money investigation found that one victim from London lost £22,300 when fraudsters raided their Santander accounts using this method. Another two victims had £19,500 drained from their Santander accounts after criminals intercepted the bank’s text messages. View full story ORIGINAL SOURCE: ActionFraud ★★
itsecurityguru.webp 2017-04-28 09:47:28 Info On Home Depot Customers Exposed (But No Financial Data) (lien direct) A spread sheet listing about 8,000 customers, along with their transaction and a range of personal information, was posted for an unknown amount of time, on a Home Depot web site. View full story ORIGINAL SOURCE: AJC ★★
itsecurityguru.webp 2017-04-28 09:46:02 Facebook and Google Were Victims of $100M Payment Scam (lien direct) When the Justice Department announced the arrest last month of a man who allegedly swindled more than $100 million from two U.S. tech giants, the news came wrapped in a mystery. The agency didn't say who was robbed, and nor did it identify the Asian supplier the crook impersonated to pull off the scheme. View full story ... ★★★★
itsecurityguru.webp 2017-04-28 09:43:05 FTSE Share Prices Suffer As Cyber Attacks Cost Global Investors £42bn (lien direct) The permanent cost of a breach is equivocal to 1.8% of company value, which would cost FTSE 100 firms a loss of £120 million in market capitalisation. The study shows that investors have already lost at least £42 billion due to public domain cyber security incidents since just 2013. View full story ORIGINAL SOURCE: CBR ★★★★
itsecurityguru.webp 2017-04-28 08:26:59 Top CISOs and cyber security Directors meet in London for exclusive debates (lien direct) The third annual IT Security Analyst & CISO Forum Debates will take place this year in London on the 17th May at No 4 Hamilton Place from 2pm – 6pm.  This unique event consists of four panel debate sessions made up of some of the UK’s top CISOs from HSBC, GSK, Canon, National Grid, Publicis ... ★★
itsecurityguru.webp 2017-04-28 08:24:40 People would sacrifice photos on their phones for just £8.81, Kaspersky Lab study reveals (lien direct) While people claim to value their memories more than any other form of data stored on their digital devices, they are happy to sell them for little money, research by Kaspersky Lab shows. A survey has shown that for 49 per cent of people, private and sensitive photos of themselves are the most precious data ...
itsecurityguru.webp 2017-04-28 08:21:13 Destined for deletion: APTs harness wipers and fileless malware in targeted attacks (lien direct) The first three months of 2017 saw a sharp rise in the sophistication of nation-state backed cyber-attacks, with threat actors turning their attention to wipers, as well as financial crime. These and other trends are covered in Kaspersky Lab's first quarterly summary of its subscriber-only threat intelligence reports. The new quarterly APT Trends reports will ...
Last update at: 2024-07-22 12:07:54
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter