What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
itsecurityguru.webp 2018-05-24 11:01:01 (Déjà vu) CISO Chat – Shaan Mulchandani, Chief Global Security Strategy Officer at Aricent (lien direct) Ever wondered what the role of a Chief Information Security Officer (CISO) encompasses? To put it simply, they are the guardians and protectors of everything information security related to a business. However, the tasks are far from simple as their teams work around the clock to respond to incidences that directly affect the safety of ...
itsecurityguru.webp 2018-05-23 15:39:05 For enterprise cyber defence, there should be more than one solution (lien direct) Enterprises face a dilemma when it comes to defence against today's modern DDoS attacks: do they trust the surgical precision of an on-premise DDoS protection solution or go with a DDoS cloud scrubbing solution? It's a tough decision for IT managers to make, as whichever option chosen will be the companies way of protecting themselves ...
itsecurityguru.webp 2018-05-23 15:36:04 The Final GDPR Checks You Mustn\'t Forget (lien direct) We are now less than 48 hours away from the Europe’s General Data Protection Regulation (GDPR) becoming enforceable on 25 May. And unless you've been living under a rock for the last two years, you don't need me to tell you that this new regulation promises to put power back into the hands of consumers, giving them ...
itsecurityguru.webp 2018-05-23 15:35:02 Okta Eliminates Passwords, Backed by New Okta ThreatInsight (lien direct) Okta, Inc., the leading independent provider of identity for the enterprise, today announced that organisations can replace passwords with stronger authentication for employees, partners, and customers with the launch of Okta's new contextual access management features. By combining signals such as device, location, and network context, with threat intel from across Okta's ecosystem through Okta's ... Guideline
itsecurityguru.webp 2018-05-23 14:50:00 (Déjà vu) Android shopping apps found with serious flaws (lien direct) It has been reported that 84% of Android shopping apps have high-level vulnerabilities. The security assessment was carried out across 50 mobile shopping apps and revealed over 270 vulnerabilities. View Full Story ORIGINAL SOURCE: Help Net Security
itsecurityguru.webp 2018-05-23 14:46:03 (Déjà vu) More security added to Firefox accounts (lien direct) Mozilla is rolling out support for a two-step authentication process for Firefox Accounts, the credentials system that protects bookmarks, passwords, open tabs and other data synchronized between devices via the Firefox Sync feature. View Full Story ORIGINAL SOURCE: Bleeping Computer
itsecurityguru.webp 2018-05-23 14:41:05 GDPR: Organisations ready; employees not (lien direct) The GDPR (General Data Protection Regulation) comes into forces this week – on May 25 – but 57 percent of employees still don’t know what they are supposed to do to protect personal data, according to a OnePoll survey of 1,000 employees undertaken for London-based Egress Software Technologies. View Full Story ORIGINAL SOURCE: ZDNet
itsecurityguru.webp 2018-05-23 14:40:02 Cyber hack warning issued to Congress for 2018 elections (lien direct) Senior Trump administration officials warned Congress on Tuesday of ongoing efforts by Russia to interfere in the 2018 midterm congressional elections as the federal government prepares to hand out $380 million in election security funding to states. View Full Story ORIGINAL SOURCE: Reuters
itsecurityguru.webp 2018-05-23 14:37:05 BMW Cars found with mile long vulnerabilities (lien direct) A security audit conducted by Tencent’s Keen Security Lab on BMW cars has given the luxury automaker a handy crop of bugs to fix – including a backdoor in infotainment units fitted since 2012. View Full Story ORIGINAL SOURCE: The Register
itsecurityguru.webp 2018-05-22 14:51:04 Pen testers find weaknesses in banks\' cyber security (lien direct) Banks have formidable barriers to external cyber attacks, but some are still vulnerable to internal attacks using social engineering, vulnerabilities in web applications and the help of insiders, a report reveals. As soon as attackers access the internal network, they find friendly terrain that is secured no better than companies in other industries, according to ...
itsecurityguru.webp 2018-05-22 14:47:04 Google Chrome users beware: Malicious software can STEAL your credit card details, passwords and files (lien direct) If you use Google Chrome, you may want to think twice about storing your credit card details on the browser. A new malicious software called 'Vega Stealer' has been discovered that can steal any credit card details, passwords or files you have stored on either the Google Chrome or Mozilla Firefox browsers. And Proofpoint , ...
itsecurityguru.webp 2018-05-22 14:46:05 Summoners of web tsunamis have moved to layer 7, says Cloudflare (lien direct) Attackers have noticed that the world is getting better at fending off massive distributed denial-of-service attacks, and are trying to overwhelm application processes instead. So says DDoS-deflector Cloudflare, which reckons it’s seen a spike in cyber-assaults trying to exhaust high-level server resources, such as per-process CPU time, disk space, and memory allocations, as opposed to ...
itsecurityguru.webp 2018-05-21 08:38:05 IT teams\' security fears should resonate strongly with the C-suite (lien direct) Despite recurring headlines reporting high-level cyber attacks on organisations of various sizes, businesses are failing to protect themselves from escalating threats. The latest industry survey by ManageEngine, exploring UK-based IT professionals’ outlook on cyber security and cloud adoption, has revealed startling levels of disregard towards IT security, with almost half of the respondents reporting that ...
itsecurityguru.webp 2018-05-21 08:36:04 CensorNet research: almost half of UK employees put companies at risk through online activities (lien direct) CensorNet has announced its research into the application and internet habits of 1000 UK adults, through personal data and insights platform CitizenMe. The survey found that 46 percent were guilty of at least one of the following bad practices, that could potentially put company data or the work network at great risk:   22 percent have ...
itsecurityguru.webp 2018-05-21 08:33:02 Is there a patch for my users? (lien direct) Attackers love exploiting the naivety of users because it's so easy. All it takes is one successful phishing email to persuade just one user to hand over their organizations login details. Once that hacker gains entry to your systems, you're not going to find out until it's too late - your anti-virus and perimeter systems ...
itsecurityguru.webp 2018-05-18 09:42:02 New Phishing Attack Will Drain Your Bank Account (lien direct) Cryptocurrency is one of those things that most of us have heard about and maybe even discussed, even if we don’t truly understand it. But for those who have a good grasp of it, opportunity awaits. Though there is not a centralized bank for cryptocurrency, it is not immune from people trying to rob it. ...
itsecurityguru.webp 2018-05-18 09:39:04 \'ZipperDown\' Flaw Might Expose Up To 100 Million Apple iPhones (lien direct) Apple iPhone users take note: A vulnerability that might affect tens of millions of users leaves devices open to dangerous attacks, China-based researchers have warned. The flaw, dubbed ZipperDown, resides in 15,978 iOS apps that have been downloaded 100 million times, according to famous iPhone jailbreakers Pangu Team. View Full Story ORIGINAL SOURCE: Forbes
itsecurityguru.webp 2018-05-18 09:37:05 Tesla confirms autopilot involved in Utah crash but seeks to blame driver (lien direct) A Tesla car was driving in “autopilot” mode when it crashed into a stopped firetruck in Utah, the company said in a report to police that repeatedly cast blame on the driver, not its semi-autonomous driving system. View Full Story ORIGINAL SOURCE: The Guardian Tesla
itsecurityguru.webp 2018-05-18 09:35:03 Google offers free DDoS protection services in the name of free democracy (lien direct) Google has rolled out a free DDoS protection platform called Project Shield to protect news sites and free expression to defend the democratic process. View Full Story ORIGINAL SOURCE: SC Magazine
itsecurityguru.webp 2018-05-18 09:32:05 The Satori Botnet Is Mass-Scanning for Exposed Ethereum Mining Rigs (lien direct) The operators of the Satori botnet are mass-scanning the Internet for exposed Ethereum mining rigs, according to three sources in the infosec community who’ve observed the malicious behavior -SANS ISC, Qihoo 360 Netlab, and GreyNoise Intelligence. View Full Story ORIGINAL SOURCE: Bleeping Computer Satori
itsecurityguru.webp 2018-05-18 08:50:00 \'Bring your own device\' linked with cybersecurity risk for six in 10 UK SMEs – a week before GDPR (lien direct) With a week until GDPR hits, new research from Paymentsense  (https://www.paymentsense.co.uk) reveals a correlation between 'bring your own device' (BYOD) schemes and increased cybersecurity risk in small businesses. Six in 10 (61%) SMEs have experienced a cybersecurity incident since introducing a BYOD policy, according to the study from the merchant services provider*.   Increasingly popular, ...
itsecurityguru.webp 2018-05-18 08:47:05 Beware the Black Axe Gang: Business Email Compromise Campaigns Observed in 2017 (lien direct) Over the past 12 months, CrowdStrike, the leader in cloud-delivered endpoint protection, has typically observed two different types of Business Email Compromise (BEC) scams: Wire transfer attempts and compromises that have led to follow-on spam campaigns. Regarding fraudulent wire transfers, the criminals typically get caught on the initial attempt, or they get caught on the ... Guideline
itsecurityguru.webp 2018-05-18 08:44:01 Why Health Care Gets Such Flak for Its Cybersecurity (lien direct) The health care industry is consistently under attack thanks to cybercriminals who eagerly attempt to snatch valuable data, costing organizations substantial financial and reputational damage. People often weigh in and wonder why the overall industry can't sufficiently beef up its cybersecurity strategies. However, the headlines they see that alert the public about breaches and other ...
itsecurityguru.webp 2018-05-17 15:49:03 Airports are ill-equipped to deal with a major cyber attack (lien direct) PA Consulting Group's latest research found that airports are ill-equipped to deal with a major cyber attack. The report, 'Overcome the Silent Threat', says that the emergence of a hyper-connected model – where passengers in airports want fast internet and digital engagement with airlines and retailers – is increasing the opportunities for cyber criminals to ...
itsecurityguru.webp 2018-05-17 15:40:04 Rising Nation Cyber Attacks from Lebanon & the Netherlands (lien direct) Optiv Security, the world's leading security solutions integrator, has published its 2018 Cyber Threat Intelligence Estimate (CTIE) which details the current state of the cyber-threat landscape and uses estimative intelligence to predict how that landscape stands to change in the future. This report is generated to provide Optiv's clients with a global view of security ... Guideline
itsecurityguru.webp 2018-05-17 15:34:00 RiskIQ implicates Ethereum-stealing phishing ATS in infamous Amazon hijack (lien direct) RiskIQ, the global leader in digital threat management, today released a report profiling a phishing automated transfer system (ATS) dubbed MEWKit, which targets users of the Ethereum exchange MyEtherWallet and is now proven to be complicit in the infamous April 24, 2018, hijack of Amazon DNS servers. The report, named “MEWKit: Cryptotheft's Newest Weapon,” reveals ... Guideline
itsecurityguru.webp 2018-05-17 15:31:04 Attacks leveraging exploits for Microsoft Office grew fourfold in early 2018 (lien direct) Exploits – software that takes advantage of a bug or vulnerability – for Microsoft Office in-the-wild hit the list of cyber headaches in Q1 2018. Overall, the number of users attacked with malicious Office documents rose more than four times compared with Q1 2017. In just three months, its share of exploits used in attacks ...
itsecurityguru.webp 2018-05-17 15:24:04 Royal Mail Braces for Hit as Data Laws to Reduce Letter Volumes (lien direct) Royal Mail Plc, Britain's 500-year-old postal service, said it expects rules designed to rein in the abuse of personal data to weigh on letter volumes as companies are forced to scrap targeted marketing campaigns. View full story ORIGINAL SOURCE: Bloomberg
itsecurityguru.webp 2018-05-17 15:17:02 Cryptojacking Incidence Doubles in Q1 2018, Fortinet Study Shows (lien direct) A new study by cybersecurity solutions provider Fortinet has shown that the attack methods of cybercriminals are evolving to deliver improved success rates and speed up infections. While ransomware remains a “destructive” tool, there is a tendency among online criminals to turn to hijacking systems for the purpose of mining cryptocurrencies. The number of companies affected by ...
itsecurityguru.webp 2018-05-17 15:16:03 Russian malware harvesting Telegram Desktop creds, chats (lien direct) Already under attack by Russia’s telecommunications regulator, a new source of woe has emerged for crypto-chat app Telegram: malware. In news that won’t surprise anybody at all, researchers from Cisco Talos say the malware attacking Telegram’s desktop app was written by a Russian speaker. View full story ORIGINAL SOURCE: The Register
itsecurityguru.webp 2018-05-17 15:15:01 (Déjà vu) Two years\' detention for UK teenager who \'cyberterrorised\' US officials (lien direct) A teenager who rocked the US intelligence community when he tricked his way into top officials' accounts in a campaign of “cyberterrorism” has been locked up for two years. View full story ORIGINAL SOURCE: The Guardian
itsecurityguru.webp 2018-05-17 15:12:01 UK Tech Sector Booms to £184 Billion as “Digital Suburbs” Emerge (lien direct) Tech companies are growing at more than double the rate of the UK economy at an annual 4.5 percent, according to https://technation.io/insights/report-2018/2018 report – with the digital tech sector now worth £184 billion to the economy, up a massive £14 billion in a year. London has secured its position as the world's “third global startup ecosystem” ...
itsecurityguru.webp 2018-05-16 14:28:03 Fortinet Threat Landscape Report Reveals an Evolution of Malware to Exploit Cryptocurrencies (lien direct) Fortinet® (NASDAQ: FTNT), a global leader in broad, integrated and automated cybersecurity solutions, today announced the findings of its latest Global Threat Landscape Report. The research reveals cybercriminals are evolving their attack methods to increase their success rates and speed infections. While ransomware continues to impact organizations in destructive ways, there are indications that some cybercriminals ... Guideline
itsecurityguru.webp 2018-05-16 14:26:05 10 Reasons not to Innovate your Cybersecurity (lien direct) You've never been hacked before, and you're confident you know where you critical or sensitive data is at all times. Why change something that's working today? No business can ever be 100% sure where its data is or that it hasn't been compromised in transit. Failure to recognise this issue is a board-level responsibility. You ...
itsecurityguru.webp 2018-05-16 14:25:01 EfficientIP DNS Threat Report reveals the cost per attack has increased by 57% to $715,000 for organizations globally (lien direct) EfficientIP, a leading specialist in DNS security to ensure service continuity, user protection and data confidentiality, today announced the results of its 2018 Global DNS Threat Report. It explored the technical causes and behavioral responses towards DNS-based threats and their potential effects on businesses across the world. Over the past year, organizations on average faced ... Guideline
itsecurityguru.webp 2018-05-16 13:32:00 25% of Businesses Targeted with Cryptojacking in the Cloud (lien direct) New public cloud security report detects a spike in cryptojacking, mismanaged cloud storage, account takeover, and major patches getting overlooked. View Full Story ORIGINAL SOURCE: Dark Reading
itsecurityguru.webp 2018-05-16 13:30:00 White House kills cyber coordinator position (lien direct) Just days after Rob Joyce left his position as cyber coordinator at the White House, the Trump administration has decided to eliminate the position. View Full Story  ORIGINAL SOURCE: SC Magazine UK
itsecurityguru.webp 2018-05-16 13:27:04 Twitter announces global change to algorithm in effort to tackle harassment (lien direct) Twitter is announcing a global change to its ranking algorithm this week, its first step toward improving the “health” of online conversations since it launched a renewed effort to address rampant trolling, harassment and abuse in March. View Full Story ORIGINAL SOURCE: The Guardian
itsecurityguru.webp 2018-05-16 13:26:05 Keyless cars causing dozens of deaths (lien direct) Dozens of people have been poisoned by carbon monoxide after failing to turn off the ignition on keyless cars, according to the New York Times. Its report found that 28 people had died and 45 others had suffered injuries since 2006. View Full Story ORIGINAL SOURCE: BBC
itsecurityguru.webp 2018-05-15 14:01:01 Russia Troll Farm Hijacked American Teen Girls\' Computers for Likes (lien direct) Online propaganda was phase one. Then came hijacking computers. The Kremlin-linked Russian troll farm known as the Internet Research Agency took an ominous detour into malware distribution in the middle of the 2016 presidential campaign, targeting teenage girls in the U.S. with a Chrome plug-in that pulled their browsers into a crude botnet, according to an analysis ...
itsecurityguru.webp 2018-05-15 13:54:00 Facebook purges 200 rogue apps as data scandal grows (lien direct) Facebook is suspending about 200 apps that it believes may have misused data. The social media giant said in a blog post Monday that the suspensions resulted from its investigation into all apps that had access to large amounts of information before Facebook changed its platform policies in 2014. Those changes, according to Facebook, significantly ...
itsecurityguru.webp 2018-05-15 13:52:05 Mexican Banks Lose Millions in SWIFT-like Attacks (lien direct) As many as five Mexican banks may have been targeted by what appears to be a highly co-ordinated cyber-attack in which unauthorized transfers were made to bogus accounts. The campaign seems to have focused on the domestic SPEI transfer network, and as such is reminiscent of the recent spate of sophisticated attacks on the global ...
itsecurityguru.webp 2018-05-15 13:51:03 Face recognition police tools \'staggeringly inaccurate\' (lien direct) Police must address concerns over the use of facial recognition systems or may face legal action, the UK’s privacy watchdog says.Information Commissioner Elizabeth Denham said the issue had become a “priority” for her office. View Full Story ORIGINAL SOURCE: BBC
itsecurityguru.webp 2018-05-15 13:47:02 Getting your company out of a crisis situation (lien direct) Why situation rooms hold the key to dealing with a data breach   You can imagine a scene in an action movie where the president is briefed on an ongoing incident, surrounded by generals, and chiefs of staff. Each in turn describe parts of the event, while the president asks questions and directs actions until ...
itsecurityguru.webp 2018-05-15 13:45:04 Getting smarter about protecting healthcare systems from cyberattacks in 2018 (lien direct) We often use similar terms in the security and healthcare. We talk about viruses and weaknesses and we put plans in place to reduce vulnerability, improve the health of the patient/network and protect it against attacks from external factors. We also act to mitigate the effects of attacks that do get through from the inside. ...
itsecurityguru.webp 2018-05-15 13:43:03 UK Consumers Vow to Punish Businesses that Fail to Safeguard Their Data and Reward Those that Put Data Protection First (lien direct) New findings from a global research study by Veritas Technologies, a leader in multi-cloud data management, reveal that UK consumers have little trust in organisations to safeguard their personal data. With more and more companies suffering data breaches and hackers seemingly one step ahead, nearly two in five (39 per cent) of UK consumers believe most ... Guideline
itsecurityguru.webp 2018-05-14 14:01:05 North Korean Hackers Are Now Developing iPhone Spy Tools (lien direct) Probing the bowels of what he believed to be North Korean hacking architecture, American cybersecurity researcher Darien Huss found an outlier: iPhone software. It appeared at first glance to be a fairly mundane program, a mobile device management (MDM) tool. Such apps are typically used for businesses to remotely monitor and control employees’ phones. But, according to Huss, ...
itsecurityguru.webp 2018-05-14 13:58:04 (Déjà vu) Card Breach Announced at Chili\'s Restaurant Chain (lien direct) Malware has harvested payment card details from some Chili’s restaurants, Brinker International, the company behind the restaurant chain announced on Friday. Brinker says it detected the malware on Friday, May 11, the same day it made the announcement. The company said it is still investigating the incident together with law enforcement and third-party forensic experts. ...
itsecurityguru.webp 2018-05-14 13:57:02 Twitter fails to take down Xanax adverts (lien direct) Twitter and Instagram have been criticised by an MP for failing to remove posts advertising Xanax. There is evidence the anti-anxiety medication is increasingly being used recreationally by young people, some of whom have needed hospital treatment. View Full Story ORIGINAL SOURCE: BBC
itsecurityguru.webp 2018-05-14 13:18:04 (Déjà vu) Five on-the-Ground Insights on Implementing Endpoint Security in the Cloud (lien direct) Today's “access-everything-anywhere-anytime” mobile data environment is great news for business productivity and performance but on the flipside it's also a huge opportunity for cybercriminals. The increasing multitude of endpoints represents an ever-expanding playground in which to develop new ways of infiltrating corporate networks and making off with the digital goods. Malware, ransomware and a rising ...
Last update at: 2024-07-17 06:07:46
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter