What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
itsecurityguru.webp 2018-08-29 10:11:02 (Déjà vu) Wales awarded first cybersecurity centre of excellence (lien direct) Cardiff University has been named as an “academic centre of excellence” in cybersecurity research by the UK's National Cyber Security Centre (NCSC), becoming the first institution in Wales to be given this status. View full story ORIGINAL SOURCE: Software Testing News
itsecurityguru.webp 2018-08-29 10:10:02 GDPR hasn\'t sparked rise in spam – so far (lien direct) The arrival of the http://www.itpro.co.uk/it-legislation/27814/what-is-gdpr-everything-you-need-to-know has not caused spam to increase, despite experts predicting otherwise following the introduction of the EU law, research by Recorded Future has revealed. View full story ORIGINAL SOURCE: IT PRO Spam
itsecurityguru.webp 2018-08-29 10:09:03 Suffer a data breach; lose up to one third of your customers (lien direct) Findings from RSA's recent survey in the UK showed that 28% of customers have elected to boycott companies that have been shown to mishandle personal data. “South African businesses should be prepared for similar consumer trends in the near future,” believes Anton Jacobsz, MD of Networks Unlimited Africa, which delivers the full range of RSA ...
itsecurityguru.webp 2018-08-29 10:08:04 Unprotected MongoDB Account Exposes 200K Files (lien direct) A security researcher has discovered yet another misconfigured MongoDB installation online, this time exposing over 200,000 highly sensitive corporate documents. View full story ORIGINAL SOURCE: Infosecurity Magazine
itsecurityguru.webp 2018-08-29 10:07:05 (Déjà vu) Beware of Fake “Shipping Docs” Malspam Pushing the DarkComet RAT (lien direct) A new malspam campaign is underway that pretends to be shipping documents and contains an attachment that installs the DarkComet remote access Trojan. When DarkComet is installed, the malware has the ability to log your keystrokes, application usage, take screenshots, and more. View full story ORIGINAL SOURCE: Bleeping Computer Malware
itsecurityguru.webp 2018-08-29 10:06:00 Google Launches New Tools To Help U.S. Veterans Find Jobs And Promote Businesses (lien direct) Google Data Scientist and former U.S. Army Staff Sergeant Sean O'Keefe pointed out that there are more than 2.5 million businesses in the U.S. that are majority-owned by veterans. This amounts to 9% of all businesses in the U.S. To help veterans find jobs and promote their businesses, Google has launched some useful new tools. View ...
itsecurityguru.webp 2018-08-29 10:05:02 Free Cybersecurity Services Offer a First Step to Securing US Elections (lien direct) Some key security vendors – including Microsoft, Google, Cloudflare – are offering pro bono services and tools for election jurisdictions and campaigns this election season. View full story ORIGINAL SOURCE: Dark Reading
itsecurityguru.webp 2018-08-29 10:02:02 NIST issues guidance for protecting medical IoT devices (lien direct) The incredible advancements that have turned what were once standalone pieces of medical equipment into IoT devices do enable better care for patients, but at the same time open these devices up to cyberattacks, warned the National Institute of Standards and Technology (NIST), working with the National Cybersecurity Center of Excellence (NCCoE), in a new ...
itsecurityguru.webp 2018-08-29 09:55:00 Facebook \'founder\' claims social media site has caused \'countless deaths\' by failing to protect users (lien direct) The founder of the original ‘Facebook’ has claimed that the social media platform has caused “countless deaths” by failing to protect users. View full story ORIGINAL SOURCE: Daily Telegraph
itsecurityguru.webp 2018-08-28 13:51:00 New McAfee Survey Finds Parents Ignore their own Concerns of Sharing Images of their Children Online (lien direct) McAfee, the device-to-cloud cybersecurity company, announces findings from its new study, The Age of Consent. The study discovered that 20% of UK parents share at least one video or photo of their children on social media a day, resulting in approximately 1.3 billion images of children under the age of 16 floating around on social ... ★★
itsecurityguru.webp 2018-08-28 13:49:02 Global Survey Shows Companies Are Using More Automation in Cybersecurity, But Still Have Work to Do (lien direct) Skybox® Security, a global leader in cybersecurity management, has released the results of a global survey conducted by Osterman Research, Understanding Security Processes and the Need to Automate. The survey, which includes responses from 465 senior security leaders at large enterprises in the U.S., EMEA and APAC,* reveals trends in the use of security automation, as ... Guideline ★★★★★
itsecurityguru.webp 2018-08-28 13:47:04 Midyear Security Roundup combines expansive Trend Micro data to offer business insights on growing threats (lien direct) Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cybersecurity solutions, today released its Midyear Security Roundup 2018, revealing that cybercriminals are moving away from attention-grabbing ransomware attacks to more covert methods intended to steal money and valuable computing resources. Crypto-jacking attempts are making the biggest impact so far this year. Trend Micro ... Ransomware Guideline ★★★★★
itsecurityguru.webp 2018-08-28 13:46:04 The dangers of a false sense of security (lien direct) Matt Ellard, EMEA Managing Director, Tanium Consumers trust and expect businesses to keep their personal data safe. They take it for granted that organisations, especially large ones, have the resources to deliver business resilience; with the right protection and safety measures in place to stop their data from being stolen. However, government data released in 2017 showed ...
itsecurityguru.webp 2018-08-28 13:45:01 AT Command Hitch Leaves Android Phones Open to Attack (lien direct) Researchers used AT commands to rewrite device firmware, bypass Android security mechanisms, exfiltrate sensitive device information, and unlock screens. Attackers can use AT commands to launch several malicious functions on an array of Android devices, including extracting data, rewriting the smartphone firmware and bypassing Android security measures. All they need, according to researchers who developed ...
itsecurityguru.webp 2018-08-28 13:44:02 WhatsApp is storing unencrypted backup data on Google Drive (lien direct) Facebook-owned instant messenger WhatsApp has admitted that it’s storing unencrypted backup data on Google Drive. The reveal comes after a deal signed on 16 August that allowed users to store backed up data to the Google Drive service without eating into their storage allowance. Previously, the backup had come out of an allowance of 15GB across data, Gmail and ...
itsecurityguru.webp 2018-08-28 13:43:04 AI image recognition systems can be tricked by copying and pasting random objects (lien direct) You don't always need to build fancy algorithms to tamper with image recognition systems – adding objects in random places will do the trick. In most cases, adversarial models are used to change a few pixels here and there to distort images so objects are incorrectly recognized. A few examples have included stickers that turn images ...
itsecurityguru.webp 2018-08-28 13:42:04 Booz Allen Hamilton Researchers Detail New RtPOS Point-of-Sale Malware (lien direct) Security researchers from Booz Allen Hamilton have spotted a previously unseen and undocumented malware strain that targets point-of-sale (POS) systems. The malware, which they named RtPOS, appears to be Russian in origin, according to an initial technical analysis published last week. Overall, this new malware strain is nowhere near as sophisticated as other fellow POS malware strains, ... Malware
itsecurityguru.webp 2018-08-28 13:41:05 Exploit Published for Unpatched Flaw in Windows Task Scheduler (lien direct) A security researcher has published on Twitter details about a vulnerability in the Windows OS. The vulnerability is a “local privilege escalation” issue that allows an attacker to elevate the access of malicious code from a limited USER role to an all-access SYSTEM account. Will Dormann, an engineer of CERT/CC, has confirmed the vulnerability and has issued ... Vulnerability
itsecurityguru.webp 2018-08-20 10:59:01 Tech giants warn Coalition bill opens customers up to cyber attack (lien direct) The peak body representing tech giants Facebook, Google, Twitter and Amazon has blasted a Coalition bill that would force them to assist law enforcement agencies in decrypting private communications. View Full Story ORIGINAL SOURCE: The Guardian
itsecurityguru.webp 2018-08-20 10:58:01 Hacking prosecutions fall for a further year despite the threat of cyber crime (lien direct) The number of computer hacking prosecutions fell for the second successive year in 2017, despite the ever-increasing threat to businesses and individuals, says RPC, the City-headquartered law firm. View Full Story ORIGINAL SOURCE: London Loves Business Threat
itsecurityguru.webp 2018-08-17 10:53:03 FCA lays out new rules for banks on reporting operational and security incidents to customers (lien direct) On Wednesday 15th August, the Financial Conduct Authority (FCA) enforced new rules requiring providers of personal and business accounts to publish information that will help current customers to compare bank accounts from different providers. Banks will have to report major operational and security incidents that have taken place and disclose whether 24-hour customer helplines are available. The ... ★★★★
itsecurityguru.webp 2018-08-17 10:49:04 Chatbots Say Plenty About New Threats to Data (lien direct) By Amina Bashir and Mike Mimoso, Flashpoint Chatbots are becoming a useful customer interaction and support tool for businesses. These bots are powered by an artificial intelligence that allows customers to ask simple questions, pay bills, or resolve conflicts over transactions; they're cheaper than hiring more call centre personnel, and they're popping up everywhere. As ... Tool ★★★★★
itsecurityguru.webp 2018-08-17 10:47:05 32,000 smart homes and businesses at risk of leaking data (lien direct) New research from Avast (LSE: AVST), the global leader in cybersecurity products, found more than 49,000 Message Queuing Telemetry Transport (MQTT) servers publicly visible on the internet due to a misconfigured MQTT protocol. This includes more than 32,000 servers with no password protection, putting them at risk of leaking data. The MQTT protocol is used ... Guideline ★★★
itsecurityguru.webp 2018-08-17 10:43:01 Ajit Pai Knew FCC Cyberattack Was Fake for Seven Months but Kept Quiet (lien direct) Asked only once at a Senate hearing Thursday about the fake security incident that's needled his agency for more than a year, the chairman of the Federal Communications Commission, Ajit Pai, acknowledged for the first time knowing secretly for several months that his office likely fed U.S. lawmakers false information. View full story ORIGINAL SOURCE: ... ★★★
itsecurityguru.webp 2018-08-17 10:36:02 U.S. states demand better access to secrets about election cyber threats (lien direct) U.S. state election officials are demanding better access to sometimes classified federal government information about hacking threats to voting systems. View full story ORIGINAL SOURCE: Reuters ★★★★★
itsecurityguru.webp 2018-08-17 10:35:03 Trump reportedly reverses Obama-era rules for US cyber operations (lien direct) The Trump administration has reportedly reversed an Obama-era framework for how and when the US can use cyber attacks against foes. President Trump undid Presidential Policy Directive 20 yesterday according to the Wall Street Journal’s sources, and with it reversed a classified framework detailing a multi-agency process that must be followed before carrying out an attack. View full ...
itsecurityguru.webp 2018-08-17 10:34:00 Necurs Botnet Pushing New Marap Malware (lien direct) Security researchers from Proofpoint have discovered a new malware strain that they named Marap and which is currently distributed via massive waves of spam emails carrying malicious attachments (malspam). View full story ORIGINAL SOURCE: Bleeping Computer Spam Malware
itsecurityguru.webp 2018-08-17 10:33:01 Google employees criticise \'censored China search engine\' (lien direct) Hundreds of Google employees have written to the company to protest against plans to launch a “censored search engine” in China. They said the project raised “urgent moral and ethical questions” and urged the firm to be more transparent. View full story ORIGINAL SOURCE: BBC
itsecurityguru.webp 2018-08-17 10:32:02 Juno this ain\'t right! Chinese hackers target Alaska (lien direct) An attack on US government facilities in Alaska has been traced back to China’s Tsinghua University and a larger hacking effort. Researchers with security house Recorded Future say [PDF] that the attack, initially focused on seperatist activity in Tibet, grew to to target US government operations in the Pacific including bases in Alaska. View full story ORIGINAL ...
itsecurityguru.webp 2018-08-17 10:30:05 Apple files stored by teen in \'hacky hack hack\' folder (lien direct) A teenage boy from Australia has pleaded guilty to hacking into Apple’s network and downloading internal files, according to reports. The 16-year-old accessed 90 gigabytes worth of files, breaking into the system many times over the course of a year from his suburban home in Melbourne, reports The Age newspaper. View full story ORIGINAL SOURCE: BBC Hack Guideline
itsecurityguru.webp 2018-08-10 09:15:05 Phantom menace: mobile banking Trojan modifications reach all-time high (lien direct) Mobile banking Trojans hit the list of cyber-headaches in Q2 2018. The number of installation packages for mobile banking – modifications which help attackers avoid detection by security solutions and to expand their arsenal – peaked at over 61,000. This represents a historic high; more than a three-fold growth when compared with Q1 2018, and ...
itsecurityguru.webp 2018-08-10 09:14:03 The Need for Effective Third-Party Risk Management in Financial Services (lien direct) In the last few years we have seen the frequency and severity of third-party cyberattacks against global financial institutions continue to increase. One of the biggest reported attacks against financial organisations occurred in early 2016, when $81 million was taken from accounts at Bangladesh Bank. Unknown hackers used SWIFT credentials of Bangladesh Central Bank employees ...
itsecurityguru.webp 2018-08-10 09:09:02 (Déjà vu) Iron Rain: What Defines a Cyber Insurgency? (lien direct) “A fool pulls the leaves. A brute chops the trunk. A sage digs the roots.” – Pierce Brown   The western world is currently grappling with a cyber insurgency.  The widespread adoption of the “kill-chain” coupled with the use of memory resident malware has fueled the cyber-attack wild fire.  The security architectures mandated by regulators and ... Malware
itsecurityguru.webp 2018-08-10 09:02:02 Education secretary urges tech industry to transform classrooms (lien direct) Education secretary Damian Hinds has called upon large technology firms to use tech to tackle some of the biggest issues in schools Damian Hinds, the UK's education secretary, has urged the technology industry to help schools overcome common issues in the classroom. Although schools, universities and colleges choose the technology tools best suited to their ...
itsecurityguru.webp 2018-08-10 09:00:02 Under half of firms use vulnerability assessments (lien direct) Less than half of organisations base their cyber defences on strategic vulnerability assessments, and a third of these do the bare minimum to meet compliance requirements, a study shows A study of 2,100 organisations reveals a global divide in how organisations assess cyber risk, with less than half using strategicvulnerability assessments. View Full Story ORIGINAL ... Vulnerability ★★★★
itsecurityguru.webp 2018-08-10 08:59:01 AWS does a guff in a bucket and exposes GoDaddy\'s dirty laundry (lien direct) GODADDY CUSTOMERS have been the victim of another big data leak, this time from the big-enough-to-know-better Amazon Web Services (AWS). Engadget reports that a new discovery from security analysts UpGuard shows that during June, 31,000 GoDaddy systems were left in multiple versions in a completely unsecured AWS S3 bucket. View Full Story ORIGINAL SOURCE: The Inquirer ★★★★
itsecurityguru.webp 2018-08-10 08:57:03 Crims hacked accounts, got phones, resold them – and the Feds reckon they\'ve nabbed \'em (lien direct) A dozen people have been indicted in America for allegedly fencing more than $1m in smartphones and other kit obtained via hacking and fraud. Geoffrey Berman, the US Attorney for the Southern District of New York, and Angel Melendez, the Special Agent in charge of the New York Office of the US Immigration and Customs ... ★★★
itsecurityguru.webp 2018-08-10 08:56:03 This Guy Hacked Hundreds Of Planes From The Ground (lien direct) Throughout November and December last year, Ruben Santamarta was sat in front of his computer peeking inside the technical bowels of hundreds of aircraft flying thousands of meters above him. That included commercial aircraft operated by some of the biggest airlines in the world. He believes it may’ve been the first time anyone had hacked ... ★★
itsecurityguru.webp 2018-08-10 08:54:00 DanaBot Malware Spear Phishes Enterprise Players Through FTP Links (lien direct) The phishing emails masquerade as invoices in order to appear legitimate. Researchers have warned enterprise players of a new digital threat: Danabot, malware at the heart of a new phishing campaign specifically targeting SMBs. Enterprise players, from the largest and most well-known companies to SMBs, are under constant threat of cyberattack. The valuable corporate and ... Malware Threat
itsecurityguru.webp 2018-08-09 09:49:00 Accenture mid-year Threatscape report identifies five global cybersecurity threats (lien direct) For immediate release – Organisations and critical infrastructure will likely experience a greater number of, and more-destructive cyberattacks, including physical damage perpetrated by highly funded rogue nation states and cybercriminals looking to disrupt business operations, make money or spy on targets, according to a new report from Accenture (NYSE: ACN). Specifically, the report predicts an ... ★★★★
itsecurityguru.webp 2018-08-09 09:45:04 Cybercriminals Targeting Popular Job Recruitment Portals About More Than PII (lien direct) Job listing and recruitment portals have been an attraction for cybercriminals given the volume of personal information uploaded to those sites in the form of resumes, cover letters and other data specific to individuals.   But there's more to criminals' interest than just stealing personally identifiable information. Security shortcomings on some of these sites can ... ★★★★★
itsecurityguru.webp 2018-08-09 09:41:05 98% of leading apps do not comply with GDPR according to Crownpeak study (lien direct) Only one in every fifty apps is compliant with the General Data Protection Regulation (GDPR) according to a study carried out by Crownpeak, a global leader in digital governance management. In a study of the top 50 Android apps and top 50 Apple apps conducted by Crownpeak in July 1018, 98% did not comply with GDPR. ... Guideline ★★
itsecurityguru.webp 2018-08-09 09:40:03 Data Privacy is hard, but finding the right DPO is harder (lien direct) Data is driving massive innovation and growth in today's economy, forcing data privacy and security into its rightful place in the spotlight. But data privacy is hard, with only the best leaders capable of navigating its treacherous waters. After Cambridge Analytica and the rollout of GDPR, many of the biggest companies are now scrambling to ... Guideline ★★★★★
itsecurityguru.webp 2018-08-09 09:31:02 Emotet Trojan Uses Complex Modules to Evade Standard Protection (lien direct) Security researchers have discovered that the Emotet Trojan is still active and becoming more sophisticated and successful in how it spreads through corporate systems. Security researchers from Check Point reported on July 24 that the Emotet Trojan, which was first discovered in 2014, is still active. Unlike other bots and malware that make headlines for ... Malware
itsecurityguru.webp 2018-08-09 09:30:02 \'Hidden Bee\' miner uses malvertising to lure victims (lien direct) Researchers at Malwarebytes discovered a malware that targets a vulnerability in Flash Player. The attackers resort to malvertising in adult sites to lure victims, whom they suspect are from Asian countries based on the advertisements used, to the exploit kit landing page. Behind the supposedly online dating service is a malicious iframe that spreads the malware. The ... Malware Vulnerability
itsecurityguru.webp 2018-08-08 10:27:04 (Déjà vu) Over half of UK consumers to activate GDPR rights within a year (lien direct) The UK consumer response to the General Data Protection Regulation (GDPR) is shifting. SAS research, GDPR: The right to remain private, reveals that more people are activating their new personal data rights, and faster, than expected. At the same time, the Facebook/Cambridge Analytica data scandal has made the majority of consumers either activate their rights, or at ...
itsecurityguru.webp 2018-08-08 10:24:05 Legacy skills shortages are opening the door to mainframe security risks, warns TmaxSoft (lien direct) Although the mainframe has historically been one of the most secure platforms available to businesses, changes in the technology landscape and shortages in legacy skills have opened the door to new risks. This is according to software innovator TmaxSoft, who argues that this is a blind spot for many mainframe-dependent businesses who have a false ...
itsecurityguru.webp 2018-08-08 10:23:04 The real-life consequences of cryptocurrency hoarding (lien direct) Ever since the Bitcoin boom, cryptocurrency has become a global phenomenon, and it's here to stay. Unlike fiat currencies, cryptocurrency isn’t regulated by a central bank or government. Consequently, anyone with a digital wallet can process payments without a middleman involved. It is for this exact reason that the payment system holds major appeal for ...
itsecurityguru.webp 2018-08-08 10:14:05 Americans value their personal data above their wallets (lien direct) When asked which items would concern them most if stolen, 55 percent of Americans responding to a new survey named personal data, compared to 23 percent their wallet, 10 percent their car, and just six percent each their phone or house keys. The study by cyber security and application delivery company Radware  surveyed over 3,000 US ...
itsecurityguru.webp 2018-08-08 10:13:01 Github will raise a red alert if your password has been exposed elsewhere (lien direct) Github has revamped its security systems to issue warnings to users when their passwords have been exposed online through other services. The code repository has recently partnered with Have I Been Pwned, a search engine operated by security expert Troy Hunt to give the general public a way to quickly discover whether or not their online accounts and ...
Last update at: 2024-07-17 12:08:02
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter