What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
itsecurityguru.webp 2018-03-14 12:14:05 Malicious activity surges coincide with geopolitical events (lien direct) Comodo released its Global Malware Report 2017, which culminates a year of security analysis and research into threat patterns. Among its major findings: 2017 was a year of multiple geopolitical events that corresponded with major malware spikes in enterprise security. View full story ORIGINAL SOURCE: Help Net Security
itsecurityguru.webp 2018-03-14 12:10:02 A team of enthusiasts from SPYSE has just launched the free of charge SSL-certificate search engine (lien direct) SPYSE team, a group of highly-skilled security specialists and IT experts of the area, has just released CertDB, which is an SSL Certificate search engine that could be used for the various purposes. The mission of the project lies in blurring the widespread belief that an SSL Certificate is just a minor collection of the ...
itsecurityguru.webp 2018-03-14 12:00:02 Have we entered an age of Compliance Complacency? (lien direct) Data is power. It's a prime commodity for businesses, which in turn means it is constantly under threat. Just try and think back to a week where a data breach or cyber attacks did not hit the headlines, and you'll struggle. Not only are these threats a growing problem for any organisation, but the issue ...
itsecurityguru.webp 2018-03-13 13:31:01 Massive breach discovered in Florida Virtual School database (lien direct) A massive data breach, which may put nearly 370,000 students and teachers at-risk, has just been discovered but it stretches back two years. Florida Virtual School says that a vendor left the door to their server open and unprotected. And now, a simple missed password could put you at risk. View full story ORIGINAL SOURCE: ...
itsecurityguru.webp 2018-03-13 13:30:01 Your smart camera could go rogue: Here\'s how it becomes a data-stealing spy tool (lien direct) Kaspersky Lab researchers have discovered multiple security vulnerabilities in popular smart cameras that are frequently used as baby monitors, or for internal home and office security surveillance. View full story ORIGINAL SOURCE:  Times of India
itsecurityguru.webp 2018-03-13 13:28:02 Healthcare industry: Attacks outpacing investments in personnel, education and resources (lien direct) Recognizing that healthcare organizations are facing constant cyber attacks, the 2018 Impact of Cyber Insecurity on Healthcare Organizations study examines the myriad of cybersecurity-related challenges and how organizations are (or are not) addressing them. Results show the security stakes are high, with 62 percent of the 627 executives surveyed admitting to experiencing an attack in ... ★★
itsecurityguru.webp 2018-03-13 13:27:01 Researchers find critical flaws in SecurEnvoy SecurMail, patch now! (lien direct) If you're a user of SecurEnvoy SecurMail and you haven't yet implemented the latest patch, do so now – or risk getting your encrypted emails read by attackers. The warning comes from SEC Consult researchers, who discovered a number of vulnerabilities in the product that break its core security promises. View full story ORIGINAL SOURCE: ... ★★★★
itsecurityguru.webp 2018-03-13 13:26:01 Survey: 18 percent of healthcare employees willing to sell patient data (lien direct) Some employees in the healthcare field are acting with bad intentions, willing to sell data to unauthorized parties for as little as $500, a new survey claims. View full story ORIGINAL SOURCE: ZDNet ★★★★★
itsecurityguru.webp 2018-03-13 13:25:02 Trump blocks Broadcom\'s bid for Qualcomm on security grounds (lien direct) US President Donald Trump has blocked a planned takeover of chipmaker Qualcomm by Singapore-based rival Broadcom on grounds of national security. View full story ORIGINAL SOURCE: BBC ★★★★
itsecurityguru.webp 2018-03-13 13:24:04 LinkedIn Updates Policies for GDPR Compliance (lien direct) LinkedIn has updated its terms of service and will become compliant with the General Data Protection Regulation in May. View full story ORIGINAL SOURCE: Infosecurity Magazine
itsecurityguru.webp 2018-03-13 12:11:05 Three Pressing Cyber Threats for IoT in 2018 (lien direct) By Kristofer Mansson, CEO of Silobreaker Every year we see new pressing cyber threats, from new targets for hackers to new issues cropping up in the cybersecurity space. 2018 will be no different. One area that has recently got a lot of attention is IoT devices, as the use of such devices has increased in ... General Information
itsecurityguru.webp 2018-03-13 12:02:01 Cybersecurity Is About More Than Reacting to Attacks (lien direct) Reacting quickly to cyberattacks is a vital aspect of cybersecurity. A prompt response can be the difference between minimal damage and catastrophic data loss. Additionally, cybersecurity experts value the importance of preventive and offensive measures, whose presence is as important, if not more so, for cybersecurity professionals to master as a quick response. A quick, ... General Information
itsecurityguru.webp 2018-03-13 11:58:04 Smart camera vulnerabilities could allow criminals to spy on victims (lien direct) Kaspersky Lab researchers have discovered multiple security vulnerabilities in popular smart cameras that are frequently used as baby monitors, or for internal home and office security surveillance. According to the research, the uncovered flaws could allow attackers to obtain remote access to video and audio feeds from the cameras, remotely disable these devices, execute arbitrary ... Vulnerability
itsecurityguru.webp 2018-03-13 11:50:03 When Complacency Breeds Security Risks (lien direct) Mike Simmonds, managing director, Axial Systems believes employee attitude is as important as technology when securing data Despite the glaring headlines about data breaches and the loss of confidential information, the more we use technology, the more careless we become about security. Yet, when things do go wrong, we tend to blame the technology itself. ... General Information
itsecurityguru.webp 2018-03-12 15:34:02 Security researchers warn of increased Iran cyber threat (lien direct) Experts are sounding the alarm about new cyber activity from Iran, as hackers become more emboldened and skilled at carrying out surveillance operations and other attacks outside the country's borders. View Full Story ORIGINAL SOURCE: The Hill
itsecurityguru.webp 2018-03-12 15:31:05 Malware on macOS makes significant rise in 2017 (lien direct) Mac malware increased by 270% in 2017, compared to 2016, a report by MalwareBytes has revealed, with four new major Mac vulnerabilities uncovered in the first two months of 2018. View Full Story  ORIGINAL SOURCE: IT PRO
itsecurityguru.webp 2018-03-12 15:24:03 (Déjà vu) Necurs and Gamut Botnets make up for 97% of the Internet\'s Spam Emails (lien direct) Just two botnets accounted for 97% of all spam emails in the last three months of 2017, according to a McAfee report released earlier today. View Full Story ORIGINAL SOURCE: Bleeping Computer
itsecurityguru.webp 2018-03-12 15:21:04 Data privacy still being ignored by organisations (lien direct) It has been found that many organisations are not doing all they can to protect data privacy with there being a lack of transparency in how businesses store personal data, according to PwC's 2018 Global State of Information Security Survey (GSISS). It was found only 51% of respondents have an accurate inventory of where personal ... General Information
itsecurityguru.webp 2018-03-12 15:19:04 Global SOC maturity improves, yet some still operate with serious gaps in security (lien direct) Despite the volume of threats rising, the global findings of a new Micro Focus report indicate that more mature Security Operational Centres (SOCs) are becoming more efficient in detection with greater ability to recover from breaches than ever before. View Full Story  ORIGINAL SOURCE: Helpnetsecurity Studies
itsecurityguru.webp 2018-03-12 14:35:03 Spiceworks Study Reveals Nearly 90 Percent of Businesses Will Use Biometric Authentication Technology by 2020 (lien direct)  Spiceworks today announced the results of a new survey examining the adoption and security of biometric authentication technology in the workplace. The results show 62 percent of organisations currently use biometric authentication technology, and an additional 24 percent plan to utilise it within the next two years. The findings indicate that although most IT professionals believe ... Threat
itsecurityguru.webp 2018-03-12 12:44:01 (Déjà vu) CISO Chat – Christian Vezina, Chief Information Security Officer at VASCO Data Security (lien direct) Ever wondered what the role of a Chief Information Security Officer (CISO) encompasses? To put it simply, they are the guardians and protectors of everything information security related to a business. However, the tasks are far from simple as their teams work around the clock to respond to incidences that directly affect the safety of ... Studies
itsecurityguru.webp 2018-03-09 09:57:00 Cryptomining Rules Endpoints Around Me (lien direct) The Saga Continues for the ownership of endpoints. Organisations purchase them, manage them, update, support, and protect them. However, the bad actors “own” them all the time. In the last half of 2017, cryptojacking became popularised. This led to a predictable shift from cyber criminals not only cryptojacking, but also installing malware with the sole ...
itsecurityguru.webp 2018-03-09 09:52:02 The Olympic False Flag: How infamous Olympic Destroyer malware was designed to confuse cybersecurity community (lien direct) Kaspersky Lab's Global Research and Analysis Team has published the results of its own research into attacks by the Olympic Destroyer malware, providing technical evidence of a very sophisticated false flag placed inside the worm by the malware creator in order to knock threat hunters off the trail to its real origin. The Olympic Destroyer ...
itsecurityguru.webp 2018-03-09 09:41:05 Seven in Ten C-Level IT Decision Makers Believe Government Should Have Done More to Explain the GDPR (lien direct) Bitdefender, a leading global cybersecurity technology company protecting 500 million users worldwide, released research today that reveals 74% of C-Level IT decision makers believe the government should have done more to explain to organisations what the General Data Protection Regulation (GDPR) is, and how companies should best prepare. Simultaneously, more than half (52%) believe that ... Guideline
itsecurityguru.webp 2018-03-08 13:57:03 (Déjà vu) Microsoft stops malware campaign spreading to 400,000 users in 12 hours (lien direct) Microsoft revealed today that Windows Defender stopped a massive malware distribution campaign that attempted to infect over 400,000 users with a cryptocurrency miner during a 12-hour period on March 6, 2018. The Redmond-based OS maker attributes the detections to computers infected with the Dofoil malware -also known as Smoke Loader- a popular malware downloader. View ... ★★★
itsecurityguru.webp 2018-03-08 13:54:04 Smart devices need to be made safer – UK Gov (lien direct) The UK government has announced guidelines to make internet-connected devices safer to use following a spate of security breaches.It includes moves to make sure passwords are unique and not resettable to a factory default and that sensitive data transmitted via apps is encrypted. View Full Story ORIGINAL SOURCE: BBC ★★★★★
itsecurityguru.webp 2018-03-08 13:37:00 Data Breach at Fresno State affects 15,000 (lien direct) A stolen external hard drive has led to the personal information of more than 15,000 people formerly and currently associated with California State University at Fresno athletic department. View Full Story ORIGINAL SOURCE: SC Magazine UK
itsecurityguru.webp 2018-03-08 12:04:03 Cyberattacks costing Londoners £26 million a month (lien direct) Individuals and businesses in London are losing an average of £26 million a month in cyber attacks on businesses and individuals, Scotland Yard has warned today. View Full Story ORIGINAL SOURCE: Evening Standard
itsecurityguru.webp 2018-03-08 11:51:04 (Déjà vu) Aspiring cyber security professionals gain careers insight at Manchester Met (lien direct) Budding cyber security professionals gained a valuable insight into the world of cyber security and how to pursue a career in the industry at last week's event run by the not-for-profit Institute of Information Security Professionals (IISP) and Cyber Security Challenge UK (CSC).     The event was organised as part of the IISP's ongoing ...
itsecurityguru.webp 2018-03-08 11:49:01 Organisations must not ignore threat of coin mining malware, warns NTT Security (lien direct) NTT Security, the specialised security company for NTT Group, has warned that organisations could be targeted by malware designed for mining cryptocurrency.   In a new report out today, researchers at its Global Threat Intelligence Center (GTIC) share their report into a type of malware solely designed to mine Monero (XMR), a form of cryptocurrency affording its users the ...
itsecurityguru.webp 2018-03-08 11:47:01 £820: All you\'re worth on the dark web to criminals (lien direct) Fraudsters on the dark web could buy your entire personal identity for just £820, according to the UK's first Dark Web Market Price Index by Virtual Private Network (VPN) comparison service Top10VPN.com. Bank account logins, passport details and even access to your Netflix account are worth money to bidders on dark web markets – but ...
itsecurityguru.webp 2018-03-07 13:07:02 Entersekt launches digital payments enablement product (lien direct) Entersekt, an innovator in mobile-first fintech solutions, this week launched Connekt, a digital commerce enablement product. The company, known for its mobile app security and authentication technology, is offering Connekt to financial services providers to help them adapt to changing market conditions. Tech giants and a host of start-ups have come to dominate digital payments, ...
itsecurityguru.webp 2018-03-07 10:37:01 Applebee\'s restaurants hit by POS malware (lien direct) Malware was discovered on point of sales systems at more than 160 Applebee's restaurants, exposing credit card information from unknowing diners. View Full Story ORIGINAL SOURCE: Threatpost
itsecurityguru.webp 2018-03-07 10:33:02 Kaspersky Lab offering big bucks on Bug Bounty Program (lien direct) Kaspersky Lab is extending its bug bounty program to include rewards of up to $100,000. The new top-end award will be for the discovery and responsible disclosure of severe vulnerabilities in some of the firm's flagship products, and it represents a twentyfold increase on existing reward levels. View Full Story ORIGINAL SOURCE: Infosecurity Magazine
itsecurityguru.webp 2018-03-07 10:28:02 Police now using DDoS tactics to apprehend drug dealers (lien direct) U.K. police tried DDoS style attacks to disrupt service on suspected drug dealer’s phones in cases where they couldn’t prosecute but were looking to interfere with the drug trade. View Full Story ORIGINAL SOURCE: SC Magazine
itsecurityguru.webp 2018-03-07 10:25:02 GandCrab Ransomware v2 released (lien direct) Last week, security firm Bitdefender, the Romanian Police, and Europol allegedly gained access to the GandCrab Ransomware’s Command & Control servers, which allowed them to recover some of the victim’s decryption keys. This allowed Bitdefender to release a tool that could decrypt some victim’s files. View Full Story ORIGINAL SOURCE: Bleeping Computer
itsecurityguru.webp 2018-03-07 10:11:02 Businesses under pressure – Employees want same simple access to cloud applications as consumers, finds Gemalto (lien direct) New research from Gemalto, the world leader in digital security, found that the proliferation of cloud applications and use of a disparate range of devices within businesses has led to nearly two-thirds (64%) of IT leaders admitting that their security teams are considering implementing consumer-grade access to cloud services for employees. Surveying more than 1,000 ... Guideline ★★★★★
itsecurityguru.webp 2018-03-07 10:03:03 The Many Faces of Cryptocurrency (lien direct) While it may be a bit harsh to label it the currency of crime, Bitcoin and its dozens of cryptocash cousins certainly have an underworld appeal. Profit-motivated cybercriminals are drawn to its decentralised nature and the anonymity that it affords. Cryptocurrency also simplifies cashing out for the bad guys, and the potential for extortion through ... ★★★★★
itsecurityguru.webp 2018-03-06 15:03:00 Pennsylvania sues Uber for data breach (lien direct) Shapiro says the hackers stole names and license information from Uber drivers. Over 50 million riders’ and 7 million drivers’ data was affected. “We want to make sure that consumers are protected across Pennsylvania, and that’s why we’re holding Uber accountable”. View Full Story ORIGINAL SOURCE: Stock News Press Uber
itsecurityguru.webp 2018-03-06 15:01:04 Insider Threat Seriously Undermining Healthcare Cybersecurity (lien direct) Two separate reports suggest insiders – of the malicious and careless variety – pose more of a problem in healthcare than any other sector. View Full Story  ORIGINAL SOURCE: Dark Reading
itsecurityguru.webp 2018-03-06 15:00:04 (Déjà vu) Secretive drone company wins contract to police prisons (lien direct) A British company has been enlisted by the government to help stop drones being used to smuggle phones, drugs and weapons into prisons. View Full Story ORIGINAL SOURCE: The Telegraph
itsecurityguru.webp 2018-03-06 14:59:02 IT pros don\'t learn from cyberattacks, study (lien direct) When it comes to repeating mistakes, the words of former President George W. Bush should apply just as much to cybersecurity as they do to the security of the nation: “There’s an old saying in Tennessee - I know it’s in Texas, probably in Tennessee - that says, fool me once, shame on - shame on you. ...
itsecurityguru.webp 2018-03-06 14:58:00 Miner vs miner: attack script seeks out and destroys competing currency exploits (lien direct) Cryptocurrency-mining malware-scum have started to write code that evicts rivals from compromised computers. The miner in question was first noticed by SANS Internet Storm Center handler Xavier Mertens. Mertens spotted the PowerShell script on March 4, and noting that it kills any other CPU-greedy processes it spots on target machines, he wrote: “The fight for CPU cycles ...
itsecurityguru.webp 2018-03-06 12:16:01 Brits worried about how much personal information they share online; survey reveals need for more education and transparency (lien direct) A new survey into consumer attitudes to digital identity has revealed that a majority of British consumers are concerned about how much personal data they have shared online and know little or nothing about their rights regarding their own data.   UK consumers worried about how much of their digital identity has been shared   ...
itsecurityguru.webp 2018-03-06 12:12:05 UK Reaches Top Five of Global Cloud Computing Scorecard (lien direct) BSA | The Software Alliance today released its 2018 Global Cloud Computing Scorecard, a flagship study that assesses cloud computing policies around the globe. The report ranks the UK fourth out of 24 leading IT economies, compared to its ranking of nine in 2016 – a sign that the legal and regulatory environment for cloud ... Guideline
itsecurityguru.webp 2018-03-06 09:56:02 AlienVault Sees Strong End to 2017 (lien direct) Security vendor AlienVault has announced that the company’s threat detection and incident response platform, the Unified Security Management (USM), is on the rise with sales and growth exceeding expectations. By the end of 2017, AlienVault had increased its install base to over 7,000 businesses, which range from banks, healthcare providers, retailers, universities and governmental institutions. ...
itsecurityguru.webp 2018-03-05 12:30:05 Spotify Issues Warning Shot To Illegal Users of the App (lien direct) Spotify is taking the issue of piracy seriously, with users warned that if they are caught using hacked versions of the music streaming service to gain premium privileges that accounts will be terminated if caught. View Full Story ORIGINAL SOURCE: Torrentfreak ★★★
itsecurityguru.webp 2018-03-05 12:02:00 Ethereum Smart Contracts Littered with Vulnerabilities (lien direct) Researchers have discovered that there are 34,200 vulnerable contracts that if exposed, can be used to steal Ether and steal and freeze assets. View Full Story ORIGINAL SOURCE: Bleeping Computer ★★
itsecurityguru.webp 2018-03-05 11:57:05 Russians used Propaganda in Reddit to Influence 2016 US Elections (lien direct) Reddit used as a hub for Russians to manipulate and influence American political debate including the 2016 US Presidential Elections. View Full Story ORIGINAL SOURCE: BBC ★★
itsecurityguru.webp 2018-03-05 11:36:04 Spectre and Meltdown: Firmware flaws finally factor into security strategies (lien direct) As the world reels from the effects of infamous ransomware attacks and the GDPR conundrum, another pair of cyberthreats has surfaced to make matters worse. Meet Spectre and Meltdown. These two newly discovered firmware-level vulnerabilities can create an opening for attackers to hijack passwords, cookies, certificates, IP addresses, and other sensitive information stored in the ... ★★★★★
Last update at: 2024-07-30 05:18:30
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter