What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
itsecurityguru.webp 2018-07-12 11:14:04 Newly Found Spectre Variants Bring New Concerns (lien direct) The plague that is Spectre continues to evolve and adapt, showing up in two new variants this week dubbed Spectre 1.1 and Spectre 1.2 that follow the original Spectre’s playbook while expanding on the ways they can do damage. View Full Story ORIGINAL SOURCE: Dark Reading
itsecurityguru.webp 2018-07-12 11:11:01 Bitcoin scammers posing as Elon Musk exploit Thai Cave rescue efforts (lien direct) Crypto scammers looking to profit off of the rescue of 12 young soccer players and their coach from a Thai cave posed as Elon Musk in order to steal Bitcoin from unsuspecting users. View Full Story ORIGINAL SOURCE: SC Magazine
itsecurityguru.webp 2018-07-12 11:09:05 Ticketmaster Breach Part of Global Digital Skimming Campaign (lien direct) The Ticketmaster UK 'breach' is far more extensive than at first thought - part of a single operation by a threat group affecting over 800 e-commerce sites around the globe, according to new intelligence. View Full Story ORIGINAL SOURCE: Infosecurity Magazine Threat
itsecurityguru.webp 2018-07-12 11:07:02 Emma\'s Diary faces fine for selling new mums\' data to Labour (lien direct) A company that offers pregnant women and new parents health advice and gifts, faces a fine for illegally sharing more than a million people’s personal data with the Labour Party. View Full Story ORIGINAL SOURCE: BBC
itsecurityguru.webp 2018-07-12 10:51:03 Privileged access management is the next great step for businesses to take in cybersecurity, says EACS (lien direct) Insider threats represent a significant danger to organisations trying to guard sensitive data from breaches, especially as businesses are tasked with protecting ever-growing amounts of data in the GDPR era. To tackle this, managed services provider EACS believes that privileged access management (PAM) needs to become a fixture of any cybersecurity strategy, and has demonstrated this commitment ...
itsecurityguru.webp 2018-07-12 10:48:01 Stronger and more frequent brute force attacks are now the norm (lien direct) The number and intensity of brute force attacks – such as those which targeted the UK and Scottish Parliaments last year – has increased dramatically over the first half of this year, according to new research from leading cyber security specialist Foregenix. Its analysis of data from more than 500 websites globally show that, apart from a dip in ... Guideline
itsecurityguru.webp 2018-07-12 10:44:01 RiskIQ maps the anatomy of a corporate attack surface (lien direct) RiskIQ, the global leader in digital threat management, today released a report mining the company's massive repository of internet data. The report maps the global internet attack surface over a two-week period, and in the process, reveals the true extent of the modern corporate attack surface. The report, 'The anatomy of an attack surface: Five ... Threat Guideline
itsecurityguru.webp 2018-07-11 10:42:03 100 percent of corporate networks highly vulnerable to insider attacks (lien direct) During penetration testing performed as an internal attacker, Positive Technologies researchers were able to obtain full control of infrastructure on all corporate networks they attempted to compromise. On only seven percent of systems could the difficulty of accessing critical resources be considered “moderate”. Penetrating the network perimeter has also become easier over time; the difficulty ...
itsecurityguru.webp 2018-07-11 10:41:03 UK Firms Are Too Confident About Their Cybersecurity (lien direct) Despite the growth in data breaches, senior executives at UK firms think their cybersecurity protection is top-notch, according to a new survey conducted by research and consultancy firm Ovum for Silicon Valley analytics firm FICO. Three out of four executives from UK firms said their firm was better prepared than their competitors, and 43 percent ... ★★
itsecurityguru.webp 2018-07-11 10:40:03 Employees suffering high levels of \'cyber stress\' in the workplace (lien direct) A Kaspersky Lab study revealed that news of data breaches and pressures to manage multiple online accounts are causing German employees increased levels of stress. The study revealed that 69 per cent of people admit to being stressed by news of data breaches 73 per cent of people reveal the number of passwords they have ...
itsecurityguru.webp 2018-07-11 10:38:03 Waking up to Critical Infrastructure Threats (lien direct) By Anthony Perridge, VP International, ThreatQuotient “Without change, something sleeps inside us, and seldom awakens. The sleeper must awaken.” This quote from Dune is a favourite of mine because it speaks to a phenomenon we see around cyberattacks, particularly those targeting critical infrastructure. In many instances, the industrial control systems (ICS) and supervisory control and data ...
itsecurityguru.webp 2018-07-11 10:36:03 A desperate hacker tried selling US military files for $150 - only to find no one wanted them (lien direct) A hacker who got ahold of sensitive US military documents tried to sell them on a dark-web forum - only to find there were no buyers. The hacker was forced to lower his price to $150. View full story ORIGINAL SOURCE: Business Insider
itsecurityguru.webp 2018-07-11 10:35:05 That Weekend-Long DDoS Attack On Blizzard Is Over (lien direct) Blizzard Entertainment customer service announced early this morning that the denial-of-service attacks that had been plaguing its games since the weekend were finally over.The attacks have been running off and on since Sunday, causing severe lag for some players and preventing others from logging in at all. The problem affected players of Overwatch, Heroes of the Storm, ...
itsecurityguru.webp 2018-07-11 10:34:01 Infosec defenders\' supply chain is inferior to black hats, says Carbon Black CEO (lien direct) The security industry's supply chain is currently inferior to that of its attackers, says Carbon Black CEO Patrick Morley, but he thinks the industry is finding ways to fight back. View full story ORIGINAL SOURCE: The Register
itsecurityguru.webp 2018-07-11 10:33:03 (Déjà vu) Internet Transit Providers Disconnect Infamous “BGP Hijack Factory” (lien direct) Several Internet transit providers -companies that route global Internet traffic between local ISPs, end users, and data centers- have banded together to ban a fellow transit provider that has carried out at least 130 Internet route (BGP) hijacks in the past few years, most of which, experts say, were with malicious intent. View full story ...
itsecurityguru.webp 2018-07-11 10:32:04 Asian Countries Frequent Targets of APT Attacks (lien direct) In a live webinar today, Kaspersky Lab experts presented their review of Q2 2018 advanced persistent threat (APT) activity. In addition to charting the latest campaigns, tools and techniques deployed by established threat actors, Vicente Diaz and Costin Raiu, security researchers in Kaspersky Lab's global research and analysis team, also discussed the reawakening of previously quiet groups, revealing ... Threat
itsecurityguru.webp 2018-07-10 11:05:05 EU court asks Jehovah\'s Witnesses to protect personal data (lien direct) Jehovah’s Witnesses must respect EU laws on the protection of personal data when they gather information in their door-to-door preaching activities, the European Court of Justice ruled on Tuesday. Examining a case brought by the Finnish data protection authority, the judges ruled that the group was responsible for organising with the purpose of preaching, and therefore ...
itsecurityguru.webp 2018-07-10 11:05:00 Argos text scam tricks customers through fake refund message (lien direct) Cyber criminals are sending text messages that appear to come from Argos in an attempt to fool customers of the retail giant into sharing their personal information, including their payment details. View full story ORIGINAL SOURCE: Independent
itsecurityguru.webp 2018-07-10 11:04:00 Malware-slinging scum copied D-Link\'s code-signing certificates to dress up PC nasties (lien direct) Security researchers have warned that someone’s obtained copies of code-signing certificates from two Taiwanese companies – and is using them to sign malware. View full story ORIGINAL SOURCE: The Register
itsecurityguru.webp 2018-07-10 11:02:00 Pair convicted in trading scheme that leveraged press releases stolen by hackers (lien direct) Two men charged with engaging in illegal financial trading using insider information found in corporate press releases stolen by hackers were both found guilty last Friday in a Brooklyn federal courtroom. View full story ORIGINAL SOURCE: SC Magazine
itsecurityguru.webp 2018-07-10 11:01:01 Proposed Changes to New Zealand\'s Privacy Act (lien direct) A new bill to repeal and replace the 1993 Privacy Act of New Zealand is awaiting approval. If the changes are accepted, the bill would mandate that public and private sector agencies notify affected individuals and the Privacy Commissioner when they experience a data breach that poses a risk of harm. View full story ORIGINAL SOURCE: Infosecurity ... Data Breach
itsecurityguru.webp 2018-07-10 10:51:05 BAE Systems: \'Cyber attacks should be treated like airline accidents\' (lien direct) Cyber attacks should be treated like airline accidents or failures on the operating theatre, BAE Systems has said. View full story ORIGINAL SOURCE: The Telegraph
itsecurityguru.webp 2018-07-10 10:51:00 Compensation sought for Australians caught up in Facebook privacy breach (lien direct) Lawyers have lodged a mass complaint to Australian privacy authorities on behalf of Facebook users caught up in the Cambridge Analytica scandal. View full story ORIGINAL SOURCE: The Guardian
itsecurityguru.webp 2018-07-10 10:50:01 Twitter \'shuts down millions of fake accounts\' (lien direct) Twitter has shut down up to 70 million fake and suspicious accounts since May, according to the Washington Post. The suspensions and shutdowns were part of a concerted effort by Twitter to clear up the platform, said the paper. View full story ORIGINAL SOURCE: BBC
itsecurityguru.webp 2018-07-10 10:35:00 Passwordless and Multifactor Authentication motivate companies to shift their approach to customer logins (lien direct) Auth0, a global leader in Identity-as-a-Service (IDaaS), today announced key findings on how companies are approaching the Customer Login Experience as new technologies like Passwordless, Multifactor Authentication, and social login options become more prevalent. According to anonymized data collected in May from a large sampling of Auth0 customers across all verticals, including financial services, media, ... Guideline ★★
itsecurityguru.webp 2018-07-10 10:32:02 Netmetix: Tall, dark and… ransom (lien direct) Greig Schofield, Technical Director at Netmetix, explores the murky world of ransomware attacks and shows how organisations can protect themselves against this growing problem. Call me a romantic but I've never believed that the stereotypical tall, dark stranger was limited to the world of fairytale.  For businesses in the digital age, a modern-day version is ... Ransomware
itsecurityguru.webp 2018-07-10 10:29:05 RiskIQ finds Ticketmaster breach part of massive credit card skimming campaign affecting over 800 e-commerce sites (lien direct) RiskIQ, the leader in digital threat management, today revealed that its researchers have discovered that the recent breach of Ticketmaster was not a one-off event as initially reported, but part of a massive digital credit card-skimming campaign by the threat group Magecart affecting over 800 e-commerce sites around the world. The report highlights how Magecart ... Threat Guideline
itsecurityguru.webp 2018-07-10 10:20:03 Acquisition Expands Mimecast to Offer Cybersecurity Awareness Capabilities with Leading Training Content, Risk Scoring and Real-World Simulation Attack Scenarios (lien direct) Mimecast Limited (NASDAQ:MIME), a leading email and data security company, today announced it has acquired Ataata, Inc. Ataata is a cyber security training and awareness platform designed to reduce human error in the workplace and help enable organizations to become more secure by changing the security culture of their employees. The acquisition will allow customers to measure ... Guideline
itsecurityguru.webp 2018-07-06 12:32:00 Business Use Of Voice Technology To Triple In Next 12 months According To Pindrop\'s Latest Survey (lien direct) 85 percent of businesses we surveyed will use voice technology – such as Amazon's Alexa or Microsoft's Cortana voice-activated assistants – to communicate with customers within the next year according to research from Pindrop, the pioneer in voice security and authentication. Currently only 28 percent of businesses do so, reflecting great ambitions within industry to ...
itsecurityguru.webp 2018-07-06 10:34:03 Putin The Boot In The UK (lien direct) UK on brink of Russian cyber attack with fears Putin will hit Britain as soon as World Cup ends. Intelligence sources say the Kremlin will launch another crippling attack on British infrastructure - or even order another assassination attempt - after the World Cup ends on 15 July. View Full Story ORIGINAL SOURCE: The Sun ★★★
itsecurityguru.webp 2018-07-06 10:33:00 Ex-employee of Israeli cyber firm charged with trying to sell stolen tech on the dark web (lien direct) A former employee of an Israel-based cybersecurity firm that sells advanced smartphone surveillance software has been charged in Israel with stealing sensitive technology and trying to peddle it on the dark web for $50 million. View Full Story ORIGINAL SOURCE: The Hill ★★★
itsecurityguru.webp 2018-07-06 10:28:05 UK regulators join forces on cyber attacks and IT failures (lien direct) The UK's top financial regulators are stepping up their efforts to quiz banks and other financial institutions on avoiding IT crashes and cyber attacks, following systems meltdowns at retail bank TSB and card giant Visa in recent months. View Full Story ORIGINAL SOURCE: Financial News ★★
itsecurityguru.webp 2018-07-06 10:22:04 (Déjà vu) CISO Chat – Jason Hart, CTO, Data Protection at Gemalto (lien direct) On the back of what was a fantastic first round of questioning with insightful responses from leading figures in the IT security industry, the CISO Chat segment on the IT Security Guru has returned for the second round of questioning. We have caught up with a host of CISO's and senior security experts to get ... Guideline
itsecurityguru.webp 2018-07-05 14:43:04 88% of SMEs Looking To Robotic Process Automation To Improve GDPR Compliance (lien direct) According to OnePoll research for Ultima, a modern infrastructure and automation services provider, 88 per cent of SMEs are considering using robotic process automation (RPA) to improve their IT security and data compliance. Robotic process automation is the use of software robots to automate business processes, for example, in back-office functions or other core areas. ... ★★★★
itsecurityguru.webp 2018-07-05 14:42:05 Gartner Identifies the Top Six Security and Risk Management Trends (lien direct) Business leaders are becoming increasingly conscious of the impact cybersecurity can have on business outcomes. Gartner, Inc. said that security leaders should harness this increased support and take advantage of six emerging trends, to improve their organisation’s resilience while elevating their own standing. Trend No. 1: Senior Business Executives Are Finally Becoming Aware That Cybersecurity ... Guideline ★★★★
itsecurityguru.webp 2018-07-05 14:35:02 Is the Bitcoin Hype Over? Cryptocurrencies a Fad? Top Crypto Experts Give their Insight (lien direct) With recent news reporting that over 800 cryptocurrencies are now considered dead, is the end of Bitcoin upon us? Are cryptocurrencies a fad that will be obsolete within 5 years? Cryptocurrency Experts give their insight into whether the death of crypto is upon us. Max Kortrakul Founder and CEO of social crypto trading platform Carboneum, ... ★★★
itsecurityguru.webp 2018-07-05 14:11:04 Kaspersky Lab discovers Rakhni Trojan\'s ability to choose between being a miner or cryptor when infecting a victim (lien direct) Kaspersky Lab products have detected new malicious samples related to the infamous Trojan family Trojan-Ransom.Win32.Rakhni. The main feature of the malware is that it can choose how to infect its victims – either with a cryptor or with a miner. According to our researchers, the malware primarily targets companies rather than ordinary users, and is ... Malware
itsecurityguru.webp 2018-07-05 13:55:01 Harvey Norman apologises to customers for data breach (lien direct) Home and lifestyle retailer Harvey Norman has apologised to customers after suffering a data breach through the systems of a third-party website service provider. Harvey Norman operates 13 outlets in the Republic and two stores in Northern Ireland. Its 13th store in the Republic was opened last year after it acquired a 60,000sq ft facility in Tallaght's ... Data Breach ★★
itsecurityguru.webp 2018-07-05 13:53:02 Phone apps aren\'t secretly listening to your calls: But what they do is still \'alarming\' (lien direct) For years people have suspected apps on their phone are listening to what they say after suddenly seeing ads for things they only spoke of but never searched for. But, as Gizmodo reports, researchers from Northeastern University who analyzed over 17,000 popular Android appsfound that none of them activates the microphone and sends out audio without a ... ★★★★★
itsecurityguru.webp 2018-07-05 13:52:03 How connected and secure is the modern workplace? (lien direct) In collaboration with Microsoft, Ingram Micro Cloud UK commissioned market research firm YouGov to survey 1,000 workers employed by small and mid-size businesses with 50 to 250 employees in the UK, to understand what they want from the modern workplace and how well-placed businesses are to satisfying their requirements. View full story ORIGINAL SOURCE: Help ... ★★★
itsecurityguru.webp 2018-07-05 13:51:04 This password-stealing malware just added a new way to infect your PC (lien direct) A powerful form of malware which can be used to distribute threats including Trojans, ransomware and malicious cryptocurrency mining software has been updated with a new technique which has rarely been seen in the wild. View full story ORIGINAL SOURCE: ZDNet Malware ★★★★★
itsecurityguru.webp 2018-07-05 13:49:01 Machine Learning, Cloud, Compliance and Business Awareness Drive Cybersecurity (lien direct) According to its Top Six Security and Risk Management Trends, Gartner said that “business leaders are becoming increasingly conscious of the impact cybersecurity can have on business outcomes” and encouraged security leaders to harness this increased support and take advantage of its six emerging trends “to improve their organization's resilience while elevating their own standing.” View full story ... Guideline
itsecurityguru.webp 2018-07-05 13:48:02 Brit cops admit facial recognition trial resulted in, er, zero arrests (lien direct) Scotland Yard has admitted that a trial of facial recognition tech in London resulted in precisely, er, zero arrests. The one-day pilot, carried out in Stratford, London, was to determine whether the controversial mug-identifying tech could be used as a method of identifying wanted violent criminals and cracking down on attacks. View full story ORIGINAL SOURCE: The Inquirer
itsecurityguru.webp 2018-07-05 13:47:02 Gentoo hack caused by three rookie mistakes (lien direct) The developers of Gentoo Linux have revealed how it was possible for its GitHub repository to be hacked: someone deduced an admin's password and perhaps that admin ought not to have had access to the repos anyway. View full story ORIGINAL SOURCE: The Register Hack
itsecurityguru.webp 2018-07-04 14:21:05 Malware Authors Seem Intent on Weaponizing Windows SettingContent-ms Files (lien direct) Malware authors are frantically trying to weaponize a new infection vector that was revealed at the start of June. The trick relies on using Windows Settings (.SettingContent-ms) shortcut files in order to achieve code execution on Windows 10 PCs. View Full Story ORIGINAL SOURCE: Bleeping Computer Malware ★★★★
itsecurityguru.webp 2018-07-04 14:18:02 A cybersecurity fund has returned more than 30 percent since the Equifax data breach (lien direct) As the rest of the stock market has struggled on heightened trade rhetoric and many big technology companies have faced regulatory scrutiny over data privacy issues, one subsector of that industry has been on fire: cybersecurity. Companies in the fund include Palo Alto Networks, Fortinet, FireEye, Juniper Networks, CyberArk Software, Symantec and Cisco. Gartner recently ... Data Breach Equifax ★★
itsecurityguru.webp 2018-07-04 14:16:05 Is your sector taking cyber security seriously? (lien direct) The frequency and severity of cyber attacks and data breaches has risen significantly in the last few years, as attacks increase in volume and variety. This exponential growth of the cyber threat is confirmed by figures from Business Continuity Institute (BCI), which have revealed that 53% of UK firms now consider a cyber attack as ... Threat ★★
itsecurityguru.webp 2018-07-04 14:15:04 DNS Poisoning or BGP Hijacking Suspected Behind Trezor Wallet Phishing Incident (lien direct) The team behind the Trezor multi-cryptocurrency wallet service has discovered a phishing attack against some of its users that took place over the weekend. The Trezor team says “signs point toward DNS poisoning or BGP hijacking” as the means attackers hijacked legitimate traffic meant for the official wallet.trezor.io domain but redirected these users to a ... ★★★★★
itsecurityguru.webp 2018-07-04 14:08:04 Millions of websites using HTTP may be labelled “Not Secure” with July Google Chrome update (lien direct) DigiCert Inc., the leading global provider of SSL/TLS certificates and other PKI solutions for securing web traffic and the Internet of Things (IoT), is providing industry guidance that millions of websites are not encrypted by default and may receive security warnings for visitors using Google Chrome browsers once Chrome 68 stable updates go live on ... Guideline
itsecurityguru.webp 2018-07-04 14:04:01 Data Requests Under GDPR to Push Cost to Public Sector Past £30 million (lien direct) New research released today shows that public sector organisations face increased financial pressure as a result of the recently implemented General Data Protection Regulation (GDPR), to the tune of £30million per year. The NHS is expected to be hit hardest by the influx in data requests, given that before the introduction it cost the NHS ...
Last update at: 2024-07-22 04:07:47
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter