What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
itsecurityguru.webp 2017-08-02 10:25:41 Longer, Expanding, Demanding: Botnet DDoS Attacks Highlighted in Kaspersky Lab Quarterly Report (lien direct) The second quarter of 2017 was proof that long-lasting DDoS attacks are back in business. The longest attack in the quarter was active for 277 hours (more than 11 days) – which is a 131 per cent increase compared to Q1. This is so far a record for the year, says the Q2 2017 botnet ...
itsecurityguru.webp 2017-08-02 10:23:41 Attacks on contracting banks: Cobalt\'s new approach (lien direct) Phishing emails are still useful when it comes to penetrating a bank’s information infrastructure. Intruders used to fake a sender address, but now they have a new game plan: they attack suppliers and partners and use hacked accounts of real employees to continue an attack against financial organizations. Moreover, intruders send malware files under the ...
itsecurityguru.webp 2017-08-02 10:21:12 Ontrack publishes Top 10 DIY Data Recovery Fails (lien direct) The data recovery experts at Kroll Ontrack are seeing an increase in do-it-yourself (DIY) data recovery attempts on media shipped to their labs.   “DIY data recovery techniques and videos found on the Internet are encouraging individuals to attempt to recover their own data when a loss occurs”, says Robin England, Senior Research and Development ...
itsecurityguru.webp 2017-08-01 10:43:49 Bitdefender discovers vulnerability in NeoCoolcam IoT cameras (lien direct) Bitdefender has discovered a security vulnerability in IoT connected cameras, that is estimated to affect over 175,000 devices worldwide. The vulnerability was found in two camera models, the iDoorbell and the NIP-22. Both of the cameras are manufactured by Shenzhen Neo Electronics: a Chinese company that offers surveillance and security solutions in the form of sensors, ...
itsecurityguru.webp 2017-08-01 10:38:59 Convenience and security concerns drive three-quarters of Brits to abandon online purchases (lien direct) Visa Inc. research launched today has shed light on the online “basket anxiety” sweeping the nation. The study, which looked at the spending habits of 1,000 UK online shoppers, reveals nearly three quarters (72%) of British online shoppers have abandoned their shopping baskets on retailer websites and apps due to finding the payment process tedious ...
itsecurityguru.webp 2017-08-01 10:36:42 Nearly a third of cyber security professionals admit to \'squatting\' on their competitors\' domains (lien direct)  DomainTools, the leader in domain name and DNS-based cyber threat intelligence, today announced the results of a survey which found that nearly a third (28%) of cyber security professionals have bought domain names to deflect business away from competitors. Cybersquatting, like most cybercrime, is done for profit and is designed to steal legitimate internet traffic ... Guideline
itsecurityguru.webp 2017-08-01 10:31:55 \'Application DDOS\' that target expensive APIs worry Netflix (lien direct) Attackers can look legit while hitting APIs that make the most work for an app Netflix has identified denial of service threat to microservices architectures that it’s labelled “application DDOS”. Traditional DDOS attacks flood networks with bogus traffic so that infrastructure runs out of resources to serve legitimate users. Netflix characterises an application DDOS attack ...
itsecurityguru.webp 2017-08-01 10:29:22 Ukraine finally battens down its leaky cyber hatches after attacks (lien direct) When the chief of Microsoft Ukraine switched jobs to work for President Petro Poroshenko, he found that everyone in the office used the same login password. It wasn’t the only symptom of lax IT security in a country suffering crippling cyber attacks. Sometimes pressing the spacebar was enough to open a PC, according to Dmytro ... ★★★
itsecurityguru.webp 2017-08-01 10:27:38 SMBs exhibit false confidence when it comes to cyber threats (lien direct) Whether it is underestimating cyber threats or overestimating employees’ ability to cope with an attack, almost all SMBs exhibit more confidence than they should do A survey of 600 SMBs worldwide (200 each in the UK, USA and Australia) has shown that, globally, fewer than 30 per cent consider themselves completely ready to manage IT ...
itsecurityguru.webp 2017-08-01 10:26:28 HBO hacked, attackers leak GoT script and some episodes (lien direct) HBO has become hackers' latest entertainment industry target: attackers have breached the company's servers, and they claim to have syphoned from them 1.5 terabytes of data. The breach has been confirmed by HBO, who said that proprietary information, including some of their programming, was compromised as a result of the “cyber incident,” but did not ...
itsecurityguru.webp 2017-07-31 09:37:37 Hackers scour voting machines for election bugs (lien direct) Hackers attending this weekend’s Def Con hacking convention in Las Vegas were invited to break into voting machines and voter databases in a bid to uncover vulnerabilities that could be exploited to sway election results. The 25-year-old conference’s first “hacker voting village” opened on Friday as part of an effort to raise awareness about the ...
itsecurityguru.webp 2017-07-31 09:35:06 SSD Advisory – McAfee Security Scan Plus Remote Command Execution (lien direct) The following advisory describes a Remote Code Execution found in McAfee Security Scan Plus. An active network attacker could launch a man-in-the-middle attack on a plaintext-HTTP response to a client to run any residing executables with privileges of a logged in user. View Full Story ORIGINAL SOURCE: Securiteam
itsecurityguru.webp 2017-07-31 09:31:02 Zillow: Machine learning and data disrupt real estate (lien direct) Learn how big data and the Zillow Zestimate changed and disrupted real estate. It’s an important case study on the power of machine learning models and digital innovation. Anyone buying or selling a house knows about Zillow. In 2006, the company introduced the Zillow Estimate, or Zestimate for short, which uses a variety of data ...
itsecurityguru.webp 2017-07-31 09:30:04 Microsoft won\'t patch SMBv1 flaw that only an idiot would expose (lien direct) ‘SlowLoris’ flaw could see a mouse of a machine take down an elephant of a server An SMBv1 bug described late last week at DEF CON won’t be patched, because Redmond says it only needs a suitable block on connections coming from the Internet. The 20-year-old bug was discovered by two RiskSense researchers combing code ...
itsecurityguru.webp 2017-07-31 09:28:44 For 20 Years, This Man Has Survived Entirely by Hacking Online Games (lien direct) A hacker says he turned finding and exploiting flaws in popular MMO video games into a lucrative, full-time, job. Manfred’s character is standing still in the virtual world of the 2014 sci-fi online multiplayer game WildStar Online. Manfred, the real life person behind the character, is typing commands into a debugger. In a few seconds ...
itsecurityguru.webp 2017-07-31 09:13:50 As many as 875,000 UK SMEs suffer cyber security breach in the last 12 months (lien direct) Results from the latest Zurich SME Risk Index have revealed that almost one in six (16%) SMEs have fallen victim to a cyber-attack in the last 12 months, equating to more than 875,000 nationwide.* Businesses in London are the worst affected with almost a quarter (23%) reporting that they have suffered a breach within this ...
itsecurityguru.webp 2017-07-31 09:12:02 Malwarebytes international ransomware study reveals UK most likely to pay the ransom (lien direct) Malwarebytes™, the leading advanced malware prevention, and remediation solution released its “Second Annual State of Ransomware Report” today, conducted by Osterman Research. The multi-country study surveyed 1,054 companies across the United States, France, U.K., Germany, Australia, and Singapore and revealed that almost half (49 per cent) of UK businesses believe the ransom demanded should be paid ... Guideline
itsecurityguru.webp 2017-07-28 09:32:36 Mimecast Report: 45 Million Emails Passed by Incumbent Email Security Systems, Nearly 25% are “Unsafe” (lien direct) Mimecast Limited (NASDAQ: MIME), a leading email and data security company, today announced the results of its third quarterly Email Security Risk Assessment (ESRA), a report of the results of tests which measure the effectiveness of incumbent email security systems. This quarter's assessment noted a continued challenge of securing organizations from malicious attachments, dangerous files ... Guideline ★★★★
itsecurityguru.webp 2017-07-28 09:30:09 What are universities doing to defend their cyberspace? (lien direct) Hacking is a growing problem globally and attacks on all organisations, UK universities included, continue to increase. So, what is the higher education sector doing to combat the problem? A new survey* indicates that universities' cyber security budgets are increasing rapidly, but investment alone is not enough to tackle the problem. Raising awareness of threats, ... ★★★
itsecurityguru.webp 2017-07-28 09:27:14 Most Companies Worldwide Failing to Measure Cybersecurity Effectiveness and Performance (lien direct) Thycotic, a provider of privileged account management (PAM) and endpoint privilege management solutions for more than 7,500 organizations worldwide, today announced the release of its first annual 2017 State of Cybersecurity Metrics Report which analyzes key findings from a Security Measurement Index (SMI) benchmark Survey of more than 400 global business and security executives around ...
itsecurityguru.webp 2017-07-28 09:21:25 Police chief Hamilton\'s Twitter may have been hacked (lien direct) The PSNI has said that Chief Constable George Hamilton’s Twitter account may have been “maliciously hacked”. The incident happened yesterday, with a number of other Twitter users asking why a tweet had been removed from his account. It is unclear what it referred to, but other tweets indicated it included a series of numbers. Detective ...
itsecurityguru.webp 2017-07-28 09:18:42 (Déjà vu) Security Flaws In “Smart” Car Wash Can Be Exploited to Cause Physical Injuries (lien direct) Two US security researchers have found vulnerabilities in smart car wash solutions sold by PDQ, a US-based vendor of Internet-connected car wash equipment and software. According to the research team, the security flaws could be exploited to cause damages to cars or physical harm to passengers or car wash employees. The vulnerabilities were discovered back ...
itsecurityguru.webp 2017-07-28 09:17:12 Virgin America Hacked, Employee Passwords and Personal Information Compromised (lien direct) Virgin America has confirmed in a letter sent to employees that its network was compromised by hackers, with data belonging to thousands of workers compromised and possibly stolen by the attackers. While an investigation is already under way, the airline did not provide any specifics about the hackers, saying instead that it's working with law ...
itsecurityguru.webp 2017-07-28 09:15:52 WikiLeaks new dump Imperial exposes 3 CIA hacking tools targeting Macs and Linux (lien direct) WikiLeaks has published three new alleged CIA hacking tools as part of its new Vault 7 dump. The alleged CIA project dubbed “Imperial” includes three hacking tools named Achilles, Aeris and SeaPea that target Mac and Linux operating systems (OS). While Achilles and SeaPea target Mac OS, Aeris targets Linux.According to WikiLeaks’ documents, Achilles allows CIA’s agents to “trojan an ...
itsecurityguru.webp 2017-07-27 09:47:10 Over 28,000 devices decrypted and 100+ global partners – No More Ransom celebrates its first year (lien direct) One year ago, on 25 July 2016, the No More Ransom initiative was launched by the Dutch National Police, Europol, McAfee and Kaspersky Lab. Today there are more than 100 partners, as major ransomware attacks continue to dominate the news, hitting businesses, governments and individuals all over the world. The threat of ransomware is escalating ... ★★★★
itsecurityguru.webp 2017-07-27 09:40:31 Cyber awareness training within the legal industry must be the first-line of defence against online scammers, warns Databarracks (lien direct) For the legal industry to effectively address the rising threat of online scams, cyber awareness training amongst staff must act as its first-line of defence, according to business continuity and disaster recovery service provider Databarracks. This follows recent findings from the Law Society, which revealed that more than a quarter of law firms in England ...
itsecurityguru.webp 2017-07-27 09:37:44 Ransomware on the rise: how to prevent an attack (lien direct) If the last few months have taught us anything, it's that enterprises clearly need to take a long hard look at the cyber security they have in place.  One thing is clear – cyber threats now present a bigger risk to organisations than ever before.  Considering the huge growth in the number of new ransomware ...
itsecurityguru.webp 2017-07-27 09:33:17 Google Detects Android Spyware in Play Store, Removes It Before It\'s Too Late (lien direct) Android malware reaching the Google Play Store is not really something new, as infected apps are being detected on a regular basis, but search giant Google highlights one particular case that it managed to deal with thanks to the recently-released Google Play Protect security feature. Specifically, Google says it came across a new form of ...
itsecurityguru.webp 2017-07-27 09:29:33 Ransomware \'here to stay\', warns Google study (lien direct) Cyber-thieves have made at least $25m (£19m) from ransomware in the last two years, suggests research by Google. The search giant created thousands of virtual victims of ransomware to expose the payment ecosystem surrounding the malware type. Most of the money was made in 2016 as gangs realised how lucrative it was, revealed a talk ... ★★★★
itsecurityguru.webp 2017-07-27 09:27:20 Facebook will spend over $500,000 to help Harvard fight election hacking (lien direct) Facebook will reportedly help Harvard fight election hacking. The social media giant will reportedly spend $500,000 (£380,000) , as initial funding to a non-profit organisation that aims at protecting political parties and voting systems from hacking and propaganda attacks. The project, dubbed Defending Digital Democracy is also a bipartisan initiative and will reportedly be based ... ★★
itsecurityguru.webp 2017-07-27 09:26:07 Hackers can now spy and track locations of phones using flaw in 3G and 4G LTE networks (lien direct) New vulnerabilities recently found in 3G and 4G networks can reportedly allow hackers to spy, monitor and track locations of phones. Security researchers also reportedly believe that the flaw could pave the way for next-gen low-cost stingray devices. According to security experts Ravishankar Borgaonkar and Lucca Hirschi, who discussed their research at the BlackHat event ...
itsecurityguru.webp 2017-07-26 14:28:29 IT Security Professionals Foresee an Escalation in DDoS Attacks Throughout the Rest of 2017 (lien direct) IT security professionals have predicted that DDoS attacks will become more frequent and devastating in the year ahead, with many already preparing for attacks that could disrupt the UK’s Brexit negotiations and cause outages worldwide, according to new research from Corero Network Security, a leading provider of real-time DDoS defence solutions. More than half (57%) of ... Guideline
itsecurityguru.webp 2017-07-26 09:57:12 Thales strengthens its multi-cloud data security portfolio (lien direct) Thales, a leader in critical information systems, cybersecurity and data security, is making it easier for organisations to manage and secure their data in multi-cloud environments. Its advanced data security solutions integrate with the leading cloud service provider platforms from Amazon Web Services (AWS), Google, Microsoft and Salesforce, allowing users to establish strong safeguards around ... Guideline ★★★
itsecurityguru.webp 2017-07-26 09:49:12 NETSCOUT enters the advanced threat Market (lien direct) NETSCOUT, a provider of business assurance – combining service assurance, cybersecurity and business intelligence – today announced integration between the company's next-generation, real-time information platform, ISNG, and network threat analysis solution, Arbor Networks Spectrum. This solution brings NETSCOUT's patented smart data technology to advanced threat detection, delivering pervasive visibility for the entire enterprise. Using a ... ★★★★★
itsecurityguru.webp 2017-07-26 09:43:24 The 2017 Fappening: Victoria Justice Hacked, Attacker Says He\'ll Leak Nude Pics (lien direct) A new day, a new celebrity becoming a victim of hackers. This time, Victoria Justice got her Twitter account compromised, with the hacker threatening to release nude photos and videos showing the 24-year-old actress performing oral sex. While it's not known whether the hacker indeed holds such content that could be posted online, screenshots published ...
itsecurityguru.webp 2017-07-26 09:40:09 (Déjà vu) Shoddy data-stripping exposes firms to hack attacks (lien direct) Large firms are vulnerable to targeted hack attacks because they do little to strip data from files on their websites, suggests research. The data gets added as employees create documents, images and other files as they maintain and update websites. The research found user names, employee IDs, software versions and unique IDs for internal computers ...
itsecurityguru.webp 2017-07-26 09:38:42 Sweden\'s massive data leak was \'a complete failure\' says PM Stefan Lofven (lien direct) Sweden’s government has confirmed the massive data leak that is now considered to be the largest of its kind in history. The incident involved the Swedish government’s transportation agency accidentally leaking vast amounts of data, exposing personal and sensitive information of nearly every citizen. Sweden’s Prime Minister Stefan Löfven sees the cybersecurity slip-up as “a ...
itsecurityguru.webp 2017-07-26 09:36:36 Is the CEO to blame for a Data Breach? Infosec professionals have spoken! (lien direct) The past year has seen attacks like Wannacry and Petya cause worldwide disruption, with countless data breaches harming household names. The damage to reputation, and increased public scrutiny, coupled with the average cost of a data breach now estimated at $3.62 million globally, can severely cripple a business to the brink of bankruptcy. So, if ... Wannacry ★★★
itsecurityguru.webp 2017-07-24 09:49:44 Businesses must be savvy to mobile security threats as app adoption spikes, says DOGFI.SH Mobile (lien direct) The continued proliferation of mobile applications can only be maintained if security considerations make up a key part of the design and implementation process. This is according to DOGFI.SH Mobile who suggests that as the mobile app market continues to mature, any flaws in an app's security architecture will become clearer, with users becoming increasingly ... ★★★
itsecurityguru.webp 2017-07-24 09:47:01 Five years later: Have you changed your LinkedIn password yet? (lien direct) The fallout of data breaches has long lasting effects – as we've seen from the continued impact of the 2012 data breach at LinkedIn. Although the attack happened five years ago, the ripple effects continue to this day. Recent reports of credentials stolen from U.K. officials are a good demonstration of this. Email addresses and ... ★★★★★
itsecurityguru.webp 2017-07-24 09:41:55 Wells Fargo data leak: Over 50,000 clients\' confidential details accidentally leaked in mailing error (lien direct) Wells Fargo accidentally leaked thousands of sensitive documents of 50,000 clients to a former financial adviser who subpoenaed the bank as part of a defamation lawsuit against a bank employee. The New York Times reported on Friday (21 July) that Wells Fargo’s lawyer inadvertently sent 1.4GB worth of files to former Wells Fargo employee Gary ...
itsecurityguru.webp 2017-07-24 09:39:01 32M employees offered biochip hand implants for work monitoring, payments (lien direct) Three Square Market (32M) is offering implanted chips to employees interested in being biohacked.The new scheme, which 32M emphasized as being voluntary, begins on 1 August. According to the firm, the RFID chip will be implanted into their hand to “make purchases in their break room micro market, open doors, login to computers, use the ...
itsecurityguru.webp 2017-07-24 09:37:36 UK Students Urged To Enrol In £20m Cyber Security Programme (lien direct) UK government targets 14-18 year old's to tackle security skills gapStudents across the UK are being encouraged to consider taking part in a £20 million cyber security schools programme being rolled out across the country in an attempt to tackle a growing skills shortage.The Department for Digital, Culture, Media and Sport (DCMS)'s Cyber Schools Programme ... ★★★★
itsecurityguru.webp 2017-07-24 09:32:49 \'Keys to kingdom\' leaked by Sweden exposing millions\' data, military secrets and EU secure intranet (lien direct) Sweden’s government has exposed sensitive and personal data of millions, along with the nation’s military secrets, in what is now considered to be one of the worst government IT disasters ever. The leak, which occurred in 2015, saw the names, photos and home addresses of millions exposed. Those affected include fighter pilots of Swedish air ... ★★★
itsecurityguru.webp 2017-07-21 15:52:12 Lastline Unveils Unprecedented Breach Protection Capabilities (lien direct) Malware protection firm Lastline has introduced Lastline Breach Defenderâ„¢, the industry's only solution that provides a dynamic blueprint of a breach as it unfolds and moves laterally across a network. Informed by unprecedented understanding of malware behaviours, Lastline Breach Defender provides the visibility, context, threat intelligence, and integration enterprise security teams need to remediate breaches ...
itsecurityguru.webp 2017-07-21 09:48:47 UK uni warns students of phishers trying to nick their tuition fees (lien direct) Foreign students looking to experience the stochastic joys of a year at Newcastle University in England are being warned that phishers are after their cash – using an unusually well-crafted attack. The raiders set up a very realistic-looking fake website proclaiming itself to be Newcastle International University, complete with pages of well-laid-out information. The URL isn’t that ... ★★
itsecurityguru.webp 2017-07-21 09:45:30 BEC Attacks Far More Lucrative than Ransomware over Past 3 Years (lien direct) Despite all the recent attention paid to ransomware, cybercriminals walked away with $5.3 billion from business email compromise (BEC) attacks compared with $1 billion for ransomware over a three-year stretch, according to Cisco’s 2017 Midyear Cybersecurity Report released today. Cybercriminals are increasingly taking a practical approach to their pilfering, going for the fastest method that they ... ★★★★
itsecurityguru.webp 2017-07-21 09:42:51 Donald Trump in talks with Russia over \'creating cyber security group\' (lien direct) Moscow and Washington are in talks to create a joint cyber security working group, a Russian news agency has reported. In its report, RIA news agency cited Russia's special envoy on cyber security, Andrey Krutskikh. “Different proposals are being exchanged and are being studied, nobody is avoiding the need for negotiations and contacts,” Mr Krutskikh said, according to ...
itsecurityguru.webp 2017-07-21 09:39:01 DarkHotel hackers are going after political targets instead of CEOs with new Inexsmar malware (lien direct) A highly sophisticated cyberespionage group called DarkHotel, which has been around for decades, is back in business.The hacker group is known for going after targets in the business sector, using luxury hotel’s Wi-Fi to hack and spy on victims. However, DarkHotel hackers have now changed their strategy and are targeting political figures instead of CEO’s, according to ...
itsecurityguru.webp 2017-07-21 09:14:31 Employees regarded as an organisation\'s greatest asset but also one of the biggest data security risks (lien direct) IT professionals believe that compliance and regulation and the unpredictable behaviour of employees will have the biggest impact on data security according to a new Concensus survey* commissioned by independent global data security specialist, HANDD Business Solutions (HANDD).   The findings are launched alongside HANDD's new Advisory Paper – 'Securing the Journey of Your Data' ... ★★
Last update at: 2024-07-17 12:08:02
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter