What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
itsecurityguru.webp 2018-07-26 11:59:05 Under GDPR, Data Breach Reports in UK Have Quadrupled (lien direct) Privacy Regulator Sees 1,750 Breach Reports in June, Up From 400 in April View Full Story ORIGINAL SOURCE: Bank Infosecurity Data Breach
itsecurityguru.webp 2018-07-26 11:57:02 Poor cybersecurity could destabilise increasingly complex energy grids (lien direct) Securing smart energy grids will take a ‘transformational’ project, says CQR Consulting’s Phil Kernick. Until then, we must ‘hobble forward’ with grids that are getting easier to take down. View Full Story ORIGINAL SOURCE: ZDNet
itsecurityguru.webp 2018-07-26 11:10:00 Cyber security vulnerability concerns skyrocket (lien direct) Security professionals are more worried about data breaches and cyber attacks than they were a year ago, with most fearing that Meltdown-Spectre attacks are becoming the norm View Full Story ORIGINAL SOURCE: Computer Weekly Vulnerability
itsecurityguru.webp 2018-07-26 11:07:04 Swann\'s home security camera recordings could be hijacked (lien direct) A popular wireless security camera designed to safeguard businesses and homes was vulnerable to a spying hack. View Full Story ORIGINAL SOURCE: BBC
itsecurityguru.webp 2018-07-25 11:58:00 Effort backed by Leading Bodies in the Field Aims to Support National Cyber Security Strategy. (lien direct) In recognition of the United Kingdom's increasing economic dependence on internet-enabled capabilities, a number of established councils, chartered professional bodies, professional certification bodies, academics and industry representative groups have established a collaborative alliance to advance the development of the cyber security profession. With representation from a breadth of disciplines currently active in cyber security professional ...
itsecurityguru.webp 2018-07-25 11:15:01 Could complacency be setting in when it comes to ransomware? (lien direct) By Chris Ross, SVP International, Barracuda Ransomware may be a headline favourite, but the attack itself is nothing new. In fact, it's been around in some form or another for decades. Since last year's high profile global campaigns such as WannaCry and NotPetya you'd be hard pressed to find anyone who isn't aware of the ... Ransomware NotPetya Wannacry
itsecurityguru.webp 2018-07-25 11:13:00 IoT security – A barrier to deployment? (lien direct) Security takes priority when it comes to the development and deployment of IoT, with Gartner predicting that by 2020, IoT security will make up 20% of annual security budgets. As a potential inhibitor, analysts, vendors and stakeholders alike are concerned about the potentially significant security risks associated with IoT deployments. These concerns are playing a role in ...
itsecurityguru.webp 2018-07-25 11:10:03 Supply Chain Attacks on the Rise as One of the Biggest New Threat Vectors as Organisations Scramble to Close Gaps (lien direct) CrowdStrike® Inc., the leader in cloud-delivered endpoint protection, today announced the results of its global supply chain survey, Securing the Supply Chain, produced by independent research firm Vanson Bourne. The study surveyed 1,300 senior IT decision-makers and IT security professionals in the US, Canada, UK, Mexico, Australia, Germany, Japan, and Singapore across major industry sectors. ... Threat Guideline
itsecurityguru.webp 2018-07-25 11:06:05 Dust yourself off and try again: Ancient Solaris patch missed the mark (lien direct) A vulnerability first detected and “resolved” years ago in Oracle’s Unix OS, Solaris, has resurfaced, necessitating a fix in Big Red’s latest quarterly patch batch. View full story ORIGINAL SOURCE: The Register Vulnerability
itsecurityguru.webp 2018-07-25 11:06:01 Want a $200k TIP? ZDI sticks bounties on bugs in big-name server code (lien direct) A bunch of new bug bounty rewards are up for grabs from the Zero Day Initiative, in a first-come, best-dressed program kicking off on August 1. The Trend Micro-backed operation announced on July 24 what it called the Targeted Incentive Program (TIP). View full story ORIGINAL SOURCE: The Register
itsecurityguru.webp 2018-07-25 11:05:03 Hipster Hackers turning to Retro Protocols for DDoS Attacks (lien direct) An obsession with retro clothing, cameras and luggage lingers across the UK, as an appetite for all things vintage shows little sign of fading. Hackers and script kiddies increasingly seem to be of the same opinion: aging technology with a patina of wear is better than shiny new objects. View full story ORIGINAL SOURCE: CBR
itsecurityguru.webp 2018-07-25 11:04:04 Email-Based Attacks a Growing Risk (lien direct) Human beings have long been the weakest link in an organization's security chain, largely because they so often fall victim to phishing campaigns, and a new report from Mimecast, State of Email Security 2018, found that attackers continue to target end users with email-based attacks. View full story ORIGINAL SOURCE: Infosecurity Magazine
itsecurityguru.webp 2018-07-25 11:04:00 Russian hackers accessed US electric utilities\' control rooms (lien direct) Hackers working for Russia were able to gain access to the control rooms of US electric utilities last year, allowing them to cause blackouts, federal officials tell the Wall Street Journal. View full story ORIGINAL SOURCE: CNET
itsecurityguru.webp 2018-07-25 11:03:00 Ransomware concern drops despite being top cost (lien direct) Concern about ransomware is declining as the number of victims decreases in Europe, the Middle East and Africa, research by Barracuda Networks has revealed. View full story ORIGINAL SOURCE: Computer Weekly Ransomware
itsecurityguru.webp 2018-07-24 14:56:05 (Déjà vu) How Apps Could Be Sneaking Malware Onto Your Phone (lien direct) Have you noticed your Android device has been slower and riddled with annoying pop-ups lately? You might have contracted malware that made its way onto your phone through the Google Play Store. View Full Story ORIGINAL SOURCE: Next Gov Malware
itsecurityguru.webp 2018-07-24 14:53:00 Google\'s Alphabet hit by Europe\'s other GDPR: Global Domination = Profit Reduction (lien direct) One company, however, seems to have solved the phishing problem: Google. And it’s all because of a $20 gadget called a security key, which Google requires its employees to use. View Full Story ORIGINAL SOURCE: Business Insider
itsecurityguru.webp 2018-07-24 14:51:02 Despite Flashy Attacks, Healthcare Ransomware Attacks Decline (lien direct) Even with some well-publicized ransomware attacks against healthcare organizations this year, such as Allscripts and LabCorp, healthcare ransomware attacks are on the decline, according to the latest analysis by cybersecurity firm Cryptonite. View Full Story ORIGINAL SOURCE: Health IT Security Ransomware
itsecurityguru.webp 2018-07-24 14:50:02 (Déjà vu) Data breach exposes trade secrets of carmakers VW, Toyota and GM (lien direct) Ten years’ worth of data belonging to some of the world’s biggest carmakers including Volkswagen, Fiat Chrysler and Toyota has been accidentally made available online, it has emerged. View Full Story ORIGINAL SOURCE: Telegraph Data Breach
itsecurityguru.webp 2018-07-23 15:42:01 Cryptomining Replaces Ransomware as Most Popular Cybercrime Malware (lien direct) Skybox® Security, a global leader in cybersecurity management, announced today the release of its mid-year update to the Vulnerability and Threat Trends Report which analyzes vulnerabilities, exploits and threats in play. The report, compiled by the team of security analysts at the Skybox® Research Lab, aims to help organizations align their security strategy with the reality ... Ransomware Malware Vulnerability Threat Guideline
itsecurityguru.webp 2018-07-23 15:40:02 What are the Guaranteed Best DDoS Defence Practices? (lien direct) By Ronald Sens, EMEA Director for A10 Networks DDoS is a constantly evolving threat. We are seeing DDoS attacks getting more sophisticated, more frequent and bigger than ever before. The systems that are most common in enterprises today cannot keep up with the constantly evolving DDoS threats because many use old technology. It is therefore ...
itsecurityguru.webp 2018-07-23 15:38:01 Positive Technologies experts discover dangerous vulnerabilities in robotic vacuum cleaners (lien direct) Positive Technologies specialists Leonid Krolle and Georgy Zaytsev have uncovered vulnerabilities in Dongguan Diqee 360 robotic vacuum cleaners. The security issues, found on Dongguan Diqee-branded vacuums, likely affect those made by the company and sold under other brands as well.  Leigh-Anne Galloway, Cyber Security Resilience lead,  described the causes and consequences: “The majority of owners of IoT devices would ... Guideline
itsecurityguru.webp 2018-07-23 15:34:03 Why the Cloud is Key to Mitigating the Menace of Phishing (lien direct) By Lior Samuelson, CEO, Cyren  The cloud can stop phishing in its tracks faster than appliances After the rise of ransomware over the last few years (largely combatted through better detection of the malware and more attention paid to having decent backups), phishing has stormed back onto the IT security manager's radar. According to our ... Ransomware Malware
itsecurityguru.webp 2018-07-23 15:32:01 City of London Police get cryptocurrency training to help tackle money laundering (lien direct) Fears that the growth of cryptocurrencies are opening up further opportunities for criminals to launder money have led to the establishment of a new training programme by the City of London Police. View full story ORIGINAL SOURCE: City AM
itsecurityguru.webp 2018-07-23 15:31:01 Rental attacks mean that blockchains must evolve or die (lien direct) Blockchain technologies have a well-earned reputation for hacking and fraud, but the recent theft of more than twenty million dollars of second-tier cryptocurrencies like Bitcoin Gold, Verge, and ZenCash was a fundamental attack on the core mechanisms that allow cryptocurrencies to function. View full story ORIGINAL SOURCE: Tech Crunch
itsecurityguru.webp 2018-07-23 15:30:02 Australia called out as willing to undermine human rights for digital agenda (lien direct) Global human rights, public policy, and advocacy group AccessNow has called out Australia for its lack of focus on human rights as it adapts to the challenges of the digital era, with a report from the non-profit saying the country should instead be leading the way in serving as a champion for human rights. View ... Guideline
itsecurityguru.webp 2018-07-23 15:29:03 Singapore experiences its worst data breach (lien direct) A Singapore healthcare database was hacked in what is the country’s worst cyber attack, with medical records of Prime Minister Lee Hsien Loong among those stolen. View full story ORIGINAL SOURCE: CNBC Data Breach
itsecurityguru.webp 2018-07-23 15:28:05 Joplin Family YMCA Warns Members of Email Phishing Scam (lien direct) Joplin Family YMCA members received the following letter warning them of a phishing scam for personal information that is coming in individual’s emails. View full story ORIGINAL SOURCE: Fox 14 TV
itsecurityguru.webp 2018-07-23 15:28:01 (Déjà vu) Watchdog sounds alarm on cybersecurity skills shortage (lien direct) The government has been accused of lacking urgency in its work to tackle a lack of suitably skilled cybersecurity workers in the critical national infrastructure sector. View full story ORIGINAL SOURCE: Civil Service World
itsecurityguru.webp 2018-07-20 14:46:01 What Defines a Cyber Insurgency? (lien direct) “A fool pulls the leaves. A brute chops the trunk. A sage digs the roots.” – Pierce Brown   The western world is currently grappling with a cyber insurgency.  The widespread adoption of the “kill-chain” coupled with the use of memory resident malware has fueled the cyber-attack wild fire.  The security architectures mandated by regulators and ... Malware
itsecurityguru.webp 2018-07-20 14:44:04 Amazon Prime Day: 60% increase in cloud transactions impact business apps (lien direct) Amazon Prime Day took place this week, with the retailer claiming that the first 10 hours grew even faster than the first 10 hours on the same day in 2017, exceeding the £766m ($1bn) in sales globally. According to reports, spending jumped 89 percent in the first 12 hours of the event compared to the ...
itsecurityguru.webp 2018-07-20 14:29:00 Cybersecurity no longer top risk for telecom industry (lien direct) Telecommunications executives have relegated disruption from new technologies to third place in their risk top 5: the number one risk identified by 60 telecom companies surveyed right now is exchange rate volatility, according to phone companies and internet providers. View Full Story ORIGINAL SOURCE: Helpnetsecurity
itsecurityguru.webp 2018-07-20 14:27:04 Hackers Breach Russian Bank and Steal $1 Million Due to Outdated Router (lien direct) A notorious hacker group known as MoneyTaker has stolen roughly $1 million from a Russian bank after breaching its network via an outdated router. The victim of the hack is PIR Bank, which lost at least $920,000 in money it had stored in a corresponding account at the Bank of Russia. View Full Story ORIGINAL ... Hack
itsecurityguru.webp 2018-07-20 14:25:04 Declassified files reveal how pre-WW2 Brits smashed Russian crypto (lien direct) Efforts by British boffins to thwart Russian cryptographic cyphers in the 1920s and 1930s have been declassified, providing fascinating insights into an obscure part of the history of code breaking. America’s National Security Agency this week released papers from John Tiltman, one of Britain's top cryptanalysts during the Second World War, describing his work in ...
itsecurityguru.webp 2018-07-20 14:23:05 Vulnerable IoT Vacuums, DVRs Put Homes at Risk (lien direct) The internet of things (IoT) has seen a string of vulnerabilities across multiple devices, the latest of which are new vulnerabilities in Dongguan Diqee 360 robotic vacuum cleaners, which could allow cybercriminals to eavesdrop, perform video surveillance and steal private data, according Positive Technologies. View Full Story ORIGINAL SOURCE: Infosecurity Magazine
itsecurityguru.webp 2018-07-20 14:22:05 Banking malware finds new life spreading data-stealing trojan (lien direct) The group behind a notorious banking trojan have expanded their operations are are now offering to deliver other forms of malware on behalf of other attackers. The Mealybug hacking operation has been active since at least 2014 and is known for its custom-built Emotet trojan, a form of self-propagating malware which has mostly targeted banking ... Malware
itsecurityguru.webp 2018-07-19 15:55:05 Cyber Security Incidents: Insider Threat falls in UK (to 65%) and Germany (to 75%) post GDPR, but US risk increases (to 80%) (lien direct) New research by data security company, Clearswift, has shown that year on year cyber security incidents from those within the organisation, as a percentage of all incidents, have fallen in the UK and Germany, two countries currently now under the ruling of GDPR. However, in the United States, a country outside of the direct jurisdiction, ... Threat
itsecurityguru.webp 2018-07-19 15:53:04 6 ways you are sabotaging your cyber defences (lien direct) If we asked any of the IT departments that we deal on a daily basis about their current priorities, they would all unfailingly say that protecting their company against cyber attacks and data breaches is top of the list – particularly now that GDPR is finally in force.   However, despite high awareness of the ...
itsecurityguru.webp 2018-07-19 15:31:00 Attention all passengers: Airport networks are putting you at risk! (lien direct) Coronet released a report identifying San Diego International Airport, John Wayne Airport-Orange County (CA) International Airport and Houston's William P. Hobby International Airport as America's most cyber insecure airports.The purpose of the report is to inform business travelers of how insecure airport Wi-Fi can inadvertently put the integrity and confidentiality of their essential cloud-based work ...
itsecurityguru.webp 2018-07-13 14:55:01 Nozomi Networks teams up with IBM to Answer Demand for Integrated IT/OT Cyber Security (lien direct) With Operational Technology (OT) attacks on the rise, Nozomi Networks and IBM earlier this week announced that they have teamed up to bring industrial organizations around the world easier access to deep OT network visibility and continuous threat detection. The news follows recent warning from various bodies – including the UK's NCSC and the US' ... Threat
itsecurityguru.webp 2018-07-13 10:43:02 Kapersky Report: $10 Million in Ether Stolen Through Phishing Last Year (lien direct) A new report from Kapersky Labs claims that cybercriminals are turning to cryptocurrency as a domain for scams and frauds. The schemes target ICO investors, who are perhaps vulnerable as they are seeking to invest money to begin with. “Kaspersky Lab experts have exposed a relatively new fraudulent trend: the development of cryptocurrency is not only attracting ...
itsecurityguru.webp 2018-07-13 10:41:05 Crypto-mining Malware Doubles from Last Year (lien direct) The number of global organizations affected by crypto-mining malware more than doubled from the second half of 2017 to the first six months of this year, according to new data from Check Point. View Full Story ORIGINAL SOURCE: Infosecurity Magazine Malware
itsecurityguru.webp 2018-07-13 10:40:03 WordPress Sites Targeted in World Cup-Themed Spam Scam (lien direct) Spammers using a ‘spray & pray’ approach to post comments on WordPress powered blogs, forums, says Imperva. WordPress-powered websites are being targeted in a comment spam campaign designed to get users to click on links to sites offering betting services on the 2018 FIFA World Cup games. View Full Story ORIGINAL SOURCE: Dark Reading Spam
itsecurityguru.webp 2018-07-13 10:39:02 \'Data is a fingerprint\': why you aren\'t as anonymous as you think online (lien direct) In August 2016, the Australian government released an “anonymised” data set comprising the medical billing records, including every prescription and surgery, of 2.9 million people. View Full Story ORIGINAL SOURCE: The Guardian
itsecurityguru.webp 2018-07-13 10:38:00 Windows Malware Carries Valid Digital Signatures (lien direct) Researchers from Masaryk University in the Czech Republic and Maryland Cybersecurity Center (MCC) monitored suspicious organizations and identified four that sold Microsoft Authenticode certificates to anonymous buyers. The same research team also collected a trove of Windows-targeted malware carrying valid digital signatures. View Full Story ORIGINAL SOURCE: Infosecurity Magazine Malware
itsecurityguru.webp 2018-07-13 10:34:03 Cylance Unveils “Cylance Smart Antivirus;” AI-Powered Antivirus for Consumers (lien direct) Cylance Inc., the leading provider of AI-driven, prevention-first security solutions, today launched Cylance Smart Antivirus, AI-powered antivirus software designed specifically for consumers. By extending the enterprise-grade AI of CylancePROTECT into the home, Cylance provides internet users with next-generation security software that proactively predicts and blocks never-before-seen threats. More than 350,000 new pieces of malware are created every day, and traditional ... Guideline
itsecurityguru.webp 2018-07-13 09:54:01 Janrain and Akamai partner to enhance security of digital customer identities (lien direct) Janrain®, the company that pioneered the Customer Identity and Access Management (CIAM) category, and Akamai Technologies, Inc. (NASDAQ: AKAM), the world's largest and most trusted cloud delivery platform, today announced that they have partnered to provide Janrain Secure Edge, bringing new integrated security capabilities to the Janrain Identity Cloud®, the world's largest identity network. The ...
itsecurityguru.webp 2018-07-12 11:14:04 Newly Found Spectre Variants Bring New Concerns (lien direct) The plague that is Spectre continues to evolve and adapt, showing up in two new variants this week dubbed Spectre 1.1 and Spectre 1.2 that follow the original Spectre’s playbook while expanding on the ways they can do damage. View Full Story ORIGINAL SOURCE: Dark Reading
itsecurityguru.webp 2018-07-12 11:11:01 Bitcoin scammers posing as Elon Musk exploit Thai Cave rescue efforts (lien direct) Crypto scammers looking to profit off of the rescue of 12 young soccer players and their coach from a Thai cave posed as Elon Musk in order to steal Bitcoin from unsuspecting users. View Full Story ORIGINAL SOURCE: SC Magazine
itsecurityguru.webp 2018-07-12 11:09:05 Ticketmaster Breach Part of Global Digital Skimming Campaign (lien direct) The Ticketmaster UK 'breach' is far more extensive than at first thought - part of a single operation by a threat group affecting over 800 e-commerce sites around the globe, according to new intelligence. View Full Story ORIGINAL SOURCE: Infosecurity Magazine Threat
itsecurityguru.webp 2018-07-12 11:07:02 Emma\'s Diary faces fine for selling new mums\' data to Labour (lien direct) A company that offers pregnant women and new parents health advice and gifts, faces a fine for illegally sharing more than a million people’s personal data with the Labour Party. View Full Story ORIGINAL SOURCE: BBC
Last update at: 2024-07-17 10:08:03
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter