What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
itsecurityguru.webp 2019-08-20 16:37:04 Five Steps To Defending Against And Recovering From A Cyber Attack. (lien direct) Given how commonplace cyber attacks have become on a global basis, the topic of cyber security is moving increasingly up the board agenda, and rightly so. 72% of large businesses in the UK said they had identified at least one cybersecurity breach in 12 months and 40% experienced a breach or attack at least once […]
itsecurityguru.webp 2019-08-20 14:35:02 Is There Room For New MSSPs To Enter The Cyber Security Market? (lien direct) Written by Bernard Parsons, CEO and Co-Founder, Becrypt While the MSSP model is far from new, and many well established MSSPs with comprehensive offerings exist, there seems to be no shortage of traditional Value-Added Resellers (VARs) still keen to transition to the model. There is still opportunity for these VARs, given the dynamic nature of […]
itsecurityguru.webp 2019-08-19 16:36:02 Demystifying Data Subject Access Requests. (lien direct) One year on from the introduction of the General Data Protection Regulation (GDPR) and it is becoming clear that when it comes to Data Subject Access Requests (DSAR), organisations are confused regarding a desire to balance the rights of an individual with the needs of an organisation, John Potts (Head of DPO DSAR and Breach […]
itsecurityguru.webp 2019-08-19 14:02:02 BlackBerry Again Positioned As A Leader In Gartner\'s 2019 Magic Quadrant For Unified Endpoint Management Tools. (lien direct) BlackBerry Limited (NYSE: BB; TSX: BB) today announced its position, for the fourth consecutive year, in the Leaders quadrant for unified endpoint management (UEM) and inclusion in the 2019 Gartner Magic Quadrant for Unified Endpoint Management Tools report by Gartner, Inc., the world's leading research and advisory company. This Magic Quadrant evaluates the ability to […] Guideline
itsecurityguru.webp 2019-08-19 12:16:04 Greenbone Introduces Virtual Appliances For Vulnerability Management. (lien direct) Greenbone, a leading provider of vulnerability analysis for IT networks, today announced that its proven portfolio of vulnerability management (VM) products is now available via virtual appliances. Greenbone's customers can now choose to deploy physical or virtual appliances, increasing flexibility and efficiency, while ensuring that data protection is always guaranteed. VM solutions identify and patch […] Vulnerability Guideline
itsecurityguru.webp 2019-08-19 12:15:03 Ransomware Modifications Double Year-On-Year In Q2 2019. (lien direct) Kaspersky researchers detected 16,017 new ransomware modifications in Q2 2019 – including ones belonging to eight new malware families. This is more than double the number of new samples detected a year ago, in Q2 2018 (7,620). The Kaspersky IT Threat Evolution Q2 2019 report also highlights that more than 230,000 users were attacked during […] Ransomware Malware Threat
itsecurityguru.webp 2019-08-16 17:06:03 CyCognito Platform (lien direct) Supplier: CyCognito Website: www.cycognito.com Price: Based on number of assets Scores Performance 5/5 Features 5/5 Value for Money 5/5 Ease of Use 5/5 Overall 5/5 Verdict: With data protection regulations getting ever stricter, failure is not an option. CyCognito is a new breed of security assessment platform that can keep you one step ahead of […]
itsecurityguru.webp 2019-08-16 14:00:04 Virgin Hyperloop One Selects OneLogin To Streamline Security And Access To All Enterprise Applications. (lien direct) OneLogin, the leader in Unified Access Management which delivers simple and secure application access and identity management to enterprises, today announced that Virgin Hyperloop One chose OneLogin’s cloud-based platform to improve security for all intellectual property across its enterprise applications. “We came to OneLogin to replace our outdated legacy product and needed a solution that […] Guideline
itsecurityguru.webp 2019-08-16 12:17:01 The Challenges Of Cobalt Strike Server Fingerprinting. (lien direct) By Jason Reaves, and Joshua Platt, Principal Threat Researchers at Flashpoint The misuse of legitimate security tools by criminals and state-sponsored actors has been a dilemma for close to two decades. Penetration-testing software and red-teaming frameworks were built for the purpose of testing the defences of enterprise networks, but that hasn't stopped individuals and collectives […] Threat
itsecurityguru.webp 2019-08-15 16:37:03 Disappointed Cyber Students Who Miss University Grades Given Free Access To Immersive Labs\' Learning Platform. (lien direct) Crestfallen cyber students who miss out on their first choices of university are being given free access to Immersive Labs' industry-leading cyber skills development platform. Backed by Goldman Sachs and developed by an ex GCHQ trainer, the technology will give students access to a purpose-built set of 'labs' which drop the user into entry-level cyber […] Guideline ★★★
itsecurityguru.webp 2019-08-15 16:37:03 70% Of Financial Companies Suffered A Cyber Security Incident In The Last 12 Months. (lien direct) New research by data security company, Clearswift, reveals that 70% of financial companies have experienced a cyber security incident in the past year, highlighting the serious threat that both data breaches and malicious attacks pose to the UK's financial sector. The research, which surveyed senior business decision makers within enterprise financial organisations in the UK, […] Threat ★★
itsecurityguru.webp 2019-08-15 16:37:03 Kaspersky To Open First Transparency Center In APAC. (lien direct) In line with its drive towards building trust in the cybersecurity industry, Kaspersky today announces the opening of its first Transparency Center in Asia Pacific, to be hosted by CyberSecurity Malaysia – Malaysia's national cybersecurity specialist agency. The company's third code review facility will be located at Menara Cyber Axis, Cyberjaya, alongside key cyber-related government […] ★★
itsecurityguru.webp 2019-08-12 17:17:00 Hacking campaign targets Fortnite players. (lien direct) Parents of children who watch gaming streams on Twitch or YouTube on their phones or computers may be at risk of fraud thanks to a six-month long hacking rampage that targeted gamers. Attackers offering cheats for popular games Fortnite, Apex Legend and Counter-Strike fooled victims into downloading “hit-and-run” malicious software that extracted valuable personal information […] ★★
itsecurityguru.webp 2019-08-12 17:15:04 Hacker tries to extort $3.5 million from Binance. (lien direct) An unnamed person is reportedly demanding 300 bitcoin (worth around $3.5 million) from Malta-based exchange Binance, implying that it will continue to release 10,000 photos that relate to alleged stolen know-your-customer (KYC) data in January if it fails to comply. In a statement today, Binance said it's investigating the case for “legitimacy and relevancy,” but […] ★★★★
itsecurityguru.webp 2019-08-12 17:14:04 107% rise in mobile financial attacks. (lien direct) Kaspersky, a cybersecurity firm, says the number of mobile financial attacks it detected in the first half of the year rose by 107 per cent. The firm said it observed that attackers perpetuated their acts using pseudo names of prominent financial services and banks in its latest financial threat report. Analysts at the company said […] Threat
itsecurityguru.webp 2019-08-12 17:13:04 DSLR cameras are vulnerable to ransomware attack according to reseachers. (lien direct) Check Point Software Technologies issued a report yesterday that detailed how its security researchers were able to remotely install malware on a digital DSLR camera. In it, researcher Eyal Itkin found that a hacker can easily plant malware on a digital camera. He says that the standardised Picture Transfer Protocol is an ideal method for […] Ransomware Malware
itsecurityguru.webp 2019-08-12 17:11:03 Seemingly Authentic iPhone Lightning Cables Will Hijack Your Computer. (lien direct) I plugged the Apple lightning cable into my iPod and connected it to my Mac, just as I normally would. My iPod started charging, iTunes detected the device, and my iPod produced the pop-up asking if I wanted to trust this computer. All expected behaviour. But this cable was hiding a secret. A short while […]
itsecurityguru.webp 2019-08-07 19:37:05 Tenable Expands Partner Ecosystem To Span The Cyber Exposure Lifecycle. (lien direct) Tenable®, Inc., the Cyber Exposure company, today announced the expansion of its Cyber Exposure ecosystem with new and enhanced technology integrations from leading vendors in public cloud infrastructure, SIEM and IT Service Management solutions. This news follows Tenable's announcement of new innovations to automatically discover and assess rogue assets across on-premises and cloud environments. Together, […] Guideline ★★
itsecurityguru.webp 2019-08-06 15:52:04 Cyberfort Group Launches To Support Business Growth Through Cybersecurity. (lien direct) As cyber-attacks continue to increase in sophistication, businesses urgently need to catch-up on detection and defence without compromising on commercial viability. Cyberfort Group, a new breed of cybersecurity provider, has launched to help businesses maximise growth while solving their biggest challenges with cybersecurity strategy. Cyberfort provides expert cyber advice and consultancy, alongside a comprehensive range […] ★★★★★
itsecurityguru.webp 2019-08-06 15:52:04 Tackling The Digital Identity Security Crisis With Biometric Fingerprint Technology. (lien direct) By David Orme, Senior Vice President of IDEX Biometrics ASA Digital identity, also known as an amalgamation of information available online that can bind a persona to an individual, is changing the face of personal identity as we know it. In a similar way to its physical counterpart, digital identity can be used to authorise […] ★★★★
itsecurityguru.webp 2019-08-06 15:52:04 Record Number Of Data Breaches And Associated Cost Drive 1Password Revenue Over 300%. (lien direct) 1Password, a leading password manager, today announced their B2B revenue has risen more than 300% over the last two years, as businesses rush to find solutions to rampant data and privacy breaches. A recent report from the Identity Theft Resource Center identified over 1,100 breaches in 2018, exposing over half a billion passwords. Additionally, IBM […] Guideline ★★★★★
itsecurityguru.webp 2019-08-01 09:44:04 Securonix Announces Network Traffic Analysis Product Offering. (lien direct) Securonix, Inc., a leader in next-gen SIEM, today announced the launch of its network traffic analysis (NTA) product that will provide bundled Corelight network sensors and use case content. Securonix NTA will be an integral part of the Securonix SIEM product, enabling customers to deploy a single solution that correlates network traffic, security events, and […] Guideline
itsecurityguru.webp 2019-07-29 16:06:05 LinkedIn Accounts For More Than Half Of Social Media Phishing Emails In Q2 2019, According To KnowBe4 Findings. (lien direct) KnowBe4, the provider of the world's largest security awareness training and simulated phishing platform, reviewed the results of tens of thousands of simulated phishing tests over the course of Q2 2019 and found that more than 50 percent of those related to social media had “LinkedIn” in the title. With this information, organisations need to […] ★★
itsecurityguru.webp 2019-07-19 14:35:01 Malware that waits for three mouse clicks before running. (lien direct) An elusive hacking operation is using a previously unreported backdoor in a malware campaign targeting diplomats and government departments around the world. The Ke3chang advanced persistent threat group is thought to operate out of China and has conducted cyber-espionage campaigns using remote access trojans and other malware since at least 2010. Now cybersecurity researchers at ESET have identified […] Malware Threat APT 15 APT 25 ★★
itsecurityguru.webp 2019-07-19 14:34:03 Firefox to warn users when passwords have been stolen by hackers. (lien direct) You can't spend hours combing through archives of breached data to see if your login credentials were leaked, so Mozilla's rebranded in-browser password manager, Lockwise, will soon notify users if their saved usernames or passwords were exposed in a data breach, and recommend that they change them. Mozilla's feature, pointed out by TechDow based on Mozilla bug reports, is already […] ★★
itsecurityguru.webp 2019-07-19 14:33:05 Independent Age charity suffers a data breach. (lien direct) The older people's charity Independent Age has had a data security breach that resulted in personal information, including the bank details and salaries of almost all of its staff, being sent to a former colleague. Third Sector understands that the breach was on 11 June and consisted of personal information for the charity's staff being accidentally disclosed to […] ★★★★★
itsecurityguru.webp 2019-07-19 14:33:02 Half of the people of the Isle of White are at risk of cyber attack. (lien direct) More than half of Manx people risk falling foul of online scams after admitting they use the same password for several accounts, a survey has found. Nearly all respondents said they had received a fraudulent email, while only two thirds were confident in their online security. The poll also found almost 40% did not know […] ★★★★
itsecurityguru.webp 2019-07-19 14:32:05 Slack resets user passwords after 2015 data breach. (lien direct) In March 2015, the business messaging service and enterprise communications hub, Slack, was breached and a database of usernames and passwords compromised. The attackers were able to insert code to log passwords in plain text as they were typed. Unsurprisingly, Slack was quick to reset passwords of users that were confirmed to have been impacted […]
itsecurityguru.webp 2019-07-19 14:30:02 Navisite And Alert Logic Provide New Managed Threat Detection And Remediation Solution Through Expanded Global Partnership. (lien direct) Navisite, a part of Spectrum Enterprise, the enterprise-focused arm of Charter Communications, Inc., and Alert Logic, the SIEMless Threat Management™ company, today announced the availability of an enhanced, fully integrated portfolio of Managed Threat Detection and Remediation services for enterprise cloud clients. Navisite is leveraging Alert Logic's award-winning SIEMless Threat Management platform to expand security […] Threat
itsecurityguru.webp 2019-07-18 18:37:01 Symantec Introduces The Industry\'s Most Comprehensive Cloud Access Security Solution. (lien direct) Symantec Corp. (NASDAQ: SYMC), the world's leading cyber security company, today announced its new cloud access security solution to help secure cloud and internet access and use in an enterprise environment. These enhancements and integrations across Symantec's network security portfolio further position Symantec as the only security provider to offer an integrated cloud-delivered solution that […] Guideline
itsecurityguru.webp 2019-07-18 18:36:04 Perimeter 81 Launches Zero Trust Application Access. (lien direct) Perimeter 81, the leading Zero Trust Secure Network as a Service provider, announced today that it has officially unveiled its new cornerstone solution: Zero Trust Application Access. The service is designed to meet the demands of today's ever-expanding modern network and ensure fully secured, isolated and agentless access to an organization's critical web applications, secure […] Guideline
itsecurityguru.webp 2019-07-18 18:36:01 The Evolving Nature Of Cloud Load Balancing. (lien direct) Written by Ronald Sens, EMEA Director at A10 Networks Load balancing of application traffic has been around for a long time. But, as more organisations move to the private and public cloud, it's undergoing significant changes. Let's look at some of the important considerations of this evolving technology. Three major requirements underline IT operations and […]
itsecurityguru.webp 2019-07-18 18:31:04 AMCA data breach affects over 2 million patients. (lien direct) Another clinical lab ensnared in the AMCA data breach has come forward. Clinical Pathology Laboratories (CPL) says 2.2 million patients may have had their names, addresses, phone numbers, dates of birth, dates of service, balance information and treatment provider information stolen in the previously reported breach. Another 34,500 patients had their credit card or banking information […] Data Breach
itsecurityguru.webp 2019-07-18 18:30:05 Ransomware attack hits US ration station. (lien direct) Tampa-based community radio station WMNF 88.5-FM is stepping up cybersecurity after its computer systems were hobbled by ransom-seeking hackers last month. Interim general manager Cindy Reichard said the ordeal began June 18 when a programmer noticed a computer in one of the studios was acting strangely. The station then received a digital message: Your files […] Ransomware
itsecurityguru.webp 2019-07-18 18:30:01 Privacy implications with FaceApp. (lien direct) FaceApp, the latest viral challenge, is keeping the selfies of its users, according to its privacy policy. The app, which encourages users to age themselves after uploading pictures, was developed by a group in St Petersburg, Russia. The trend has since amassed millions of users across the world. But following security concerns, politicians have been […]
itsecurityguru.webp 2019-07-18 18:29:03 36 terabyte data breach confirmed by Lenovo. (lien direct) Lenovo has confirmed that a “high severity” security vulnerability has left users of specific network-attached storage devices with data exposed to anyone who went looking for it. How much data? How does at least 36TB grab you? That’s the number that the security researchers who uncovered the vulnerability in the Lenovo-EMC storage products put on […] Data Breach Vulnerability
itsecurityguru.webp 2019-07-18 18:28:05 Cloud security still top concern for most security professionals, (lien direct) An overwhelming majority of cyber security professionals (93%) say they are moderately to highly concerned about public cloud security, a survey reveals. Only 3% of respondents said they were not concerned, while 4% said they were slightly concerned. While 18% said they were moderately concerned, roughly the same proportion said they were “very concerned” (37%) […]
itsecurityguru.webp 2019-07-16 09:49:02 Securonix Achieves SOC2® + HITRUST CSF® Certification. (lien direct) Securonix, Inc., the leader in next-gen SIEM, today announced that it has achieved SOC2 + HITRUST Type 2 certification for the Securonix SaaS environment. This is the latest advancement in Securonix's ongoing commitment to provide a highly secure and industry compliant environment for protecting and safeguarding client information. The certification validates Securonix's adherence to state […] Guideline ★★★
itsecurityguru.webp 2019-07-16 09:44:03 Ransomware attacks on US municipalities boycotted by mayors. (lien direct) Numerous big cities across the United States have fallen victim to ransomware attacks costing the municipalities tens of millions of dollars to recover. While some city administrators refrain from giving in to extortion demands, most end up paying in exchange for the decryption keys. Seeing how ransomware operators are showing no signs of stopping, city mayors have […] Ransomware ★★
itsecurityguru.webp 2019-07-16 09:43:04 AI being used by organisations to combat cyber attacks. (lien direct) Companies and public sector organisations say they have no choice but to automate their cyber defences as hacking become increasingly sophisticated. Security professionals can no longer keep pace with the volume and sophistication of attacks on computer systems. In a study of 850 security professionals across 10 countries, more than half said their organisations are […] ★★★★★
itsecurityguru.webp 2019-07-16 09:43:00 Cyber risk being ignored by UK boards. (lien direct) The total cost of cyber security breaches to UK mid-market businesses with a turnover between £15m and £1bn a year reached at least £30bn in the past 12 months, according to assurance, tax and advisory firm Grant Thornton. More than half (53%) of just over 500 UK mid-market companies interviewed reported losses equivalent to between 3% […]
itsecurityguru.webp 2019-07-16 09:42:02 Hackers can manipulate image and audio files across WhatsApp and Telegram. (lien direct) If you thought instant messaging platforms like WhatsApp and Telegram that provide end-to-end encryption give you rock-solid security, think again. Researchers from cyber-security firm Symantec on Monday revealed the vulnerabilities that allowed hackers to manipulate the images and audio files you receive on these platforms. The security flaw, dubbed “Media File Jacking”, affected WhatsApp for Android […]
itsecurityguru.webp 2019-07-16 09:41:01 NCSC prevents airport email scam. (lien direct) An attempt to defraud thousands of people using a bogus email from a UK airport was one of a range of cyber-attacks prevented last year. The scam used a fake gov.uk address, but the messages were prevented from ever reaching their intended recipients. The details were revealed by GCHQ’s National Cyber Security Centre in an annual […]
itsecurityguru.webp 2019-07-15 10:01:04 Password free future for payments, says Visa. (lien direct) Visa believes the payment industry can move away from passwords in the next five years thanks to advancements in authentication and anti-fraud technologies that are already making “static” cardholder verification (CVM) methods such as signature and PINs optional. With the ability of financial institutions and merchants to share 10 times more data with each other […]
itsecurityguru.webp 2019-07-15 10:01:00 Connected hair straighteners can be hacked to cause fire hazard. (lien direct) Researchers have found a way to successfully hack connected hair straighteners to turn them on and increase the heating element up to its maximum temperature-causing a serious fire hazard for unsuspecting owners. Pen Test Partners decided to put the Glamoriser hair straightener through its security paces, given that it has Bluetooth Low Energy (BLE) embedded […] Hack
itsecurityguru.webp 2019-07-15 10:00:02 Hackers demanding $2 million via ransomware attack on US college. (lien direct) Hackers are increasingly launching ransomware attacks in order to make a quick buck. They lock down the target's computer systems and then demand a ransom to decrypt the data. That same thing has happened with New York City's Monroe College which has been hit by a ransomware attack. The hackers are now demanding $2 million to allow […] Ransomware
itsecurityguru.webp 2019-07-15 09:59:05 Penobscot Community Health Care suffers data breach. (lien direct) A health care provider in Maine is warning patients of a potential data breach. The Bangor Daily News reports that a Penobscot Community Health Care spokesman says a third-party collection agency may have exposed the personal and credit card information of some patients. The provider has a contract with American Medical Collection Agency, which reported […]
itsecurityguru.webp 2019-07-15 09:59:00 Reports of data breaches increase dramatically since GDPR. (lien direct) The number of whistleblower reports to the information commissioner over data breaches have jumped 175 per cent since GDPR came in, according to research. People have become more vigilant about the handling of personal data, and more likely to report potential breaches, since the regulations were introduced in May 2018 according to law firm RPC. […]
itsecurityguru.webp 2019-07-04 11:53:04 Anti-Virus Companies Now Flag Malware China Installs on Tourists\' Phones. (lien direct) Multiple antivirus companies are now explicitly flagging in their products an app that Chinese authorities were planting onto the phones of tourists at the country’s border. Tuesday, a collaboration between Motherboard, Süddeutsche Zeitung, the Guardian, the New York Times, and the German public broadcaster NDR revealed Chinese authorities are installing the malware-called BXAQ or Fengcai-onto travelers’ Android devices at […] Malware
itsecurityguru.webp 2019-07-04 11:53:01 Hacker who launched DDoS attacks on Sony, EA, and Steam gets 27 months in prison. (lien direct) A 23-year-old man from Utah was sentenced this week to 27 months in prison for a series of DDoS attacks that took down online gaming service providers like Sony’s PlayStation Network, Valve’s Steam, Microsoft’s Xbox, EA, Riot Games, Nintendo, Quake Live, DOTA2, and League of Legends servers, along with many others. Named Austin Thompson, but […]
Last update at: 2024-07-09 11:08:11
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter