Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-22 10:33:00 |
Mexicans served with Dark Tequila in spyware spree (lien direct) |
The campaign has been swiping bank credentials and corporate data for years through offline malware. |
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-22 09:30:00 |
Hacker holds the data of 20,000 Superdrug customers to ransom (lien direct) |
Customers are being asked to change their account passwords immediately. |
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-22 08:50:01 |
Adobe releases out of schedule remote code execution fix (lien direct) |
The patch resolves two critical flaws which can both lead to remote code execution. |
Guideline
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-21 12:27:04 |
Guns are already on UK streets. 3D printing could make things far worse. (lien direct) |
Opinion: With 3D gun blueprints now available for download, it's potentially too late to stop the future impact on the streets of London. |
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-21 10:33:00 |
McAfee: Calling Bitfi unhackable may have been \'unwise\' but it was great marketing (lien direct) |
Updated: The "unhackable" wallet saga may have been little more than salesmanship designed to provoke controversy. |
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-21 08:33:00 |
Philips reveals code execution vulnerabilities in cardiovascular devices (lien direct) |
Only a low level of skill is required to exploit the bugs. |
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-20 12:19:02 |
UK hacking prosecutions plummet with only 47 charges recorded last year (lien direct) |
A lack of resources is believed to be partly to blame for incredibly low prosecution figures. |
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-20 08:35:02 |
Alleged head of BitConnect cryptocurrency scam arrested in Dubai (lien direct) |
BitConnect has been accused of operating an exit scam after duping investors out of millions of rupees. |
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-20 07:07:02 |
Coinbase files patent for freeze logic cryptocurrency wallet security (lien direct) |
The invention aims to add a fresh layer of security to wallets used directly for merchant payments. |
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-20 06:12:03 |
EU considers 60-minute deadline for social networks to remove terrorist content (lien direct) |
The commission says that not enough progress has been made in stamping out extremist content. |
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-17 14:08:02 |
Necurs botnet launches fresh assault against banks (lien direct) |
The spam botnet has been harnessed in order to compromise close to 3,000 financial institutions. |
Spam
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-17 12:58:00 |
1990s technology exposes 32,000 smart homes, businesses to exploit (lien direct) |
When modern IoT gadgets rely on technology from the 1990s, it is unsurprising that security becomes a problem. |
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-17 09:43:00 |
Mozilla wipes 23 Firefox add-ons off the map for tracking user activity (lien direct) |
The purge was prompted by the exposure of the Web Security add-on's data-slurping habits. |
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-17 08:49:00 |
\'Hacky hack hack\': Teen arrested for breaking into Apple\'s network (lien direct) |
Updated: The Apple fan allegedly managed to download roughly 90GB in corporate documents as well as access customer accounts. |
Hack
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-17 07:01:00 |
Open-source vulnerabilities which will not die: Who is to blame? (lien direct) |
Major open-source vulnerabilities have wreaked havoc and caused heartache for IT admins worldwide. |
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-16 16:38:00 |
Severe vulnerability exposes WordPress websites to attack (lien direct) |
Researchers say the PHP security flaw could leave countless WordPress websites open to exploit. |
Vulnerability
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-16 11:13:01 |
Google expands bug bounty program to include fraud protection bypass, free purchases (lien direct) |
External attack vectors and techniques which bypass spam and fraud systems are now part of the program. |
Spam
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-16 09:37:00 |
Firefox add-on snoops on 200,000 users\' browsing activities (lien direct) |
Updated: The add-on was quietly removed from a recommendations list on the official Firefox blog. |
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-15 16:01:04 |
Former Microsoft engineer sent behind bars for role in ransomware extortion scheme (lien direct) |
The engineer was neck-deep in laundering proceeds from Reveton ransomware victims. |
Ransomware
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-15 12:50:00 |
Adobe fixes critical code execution flaws in latest patch update (lien direct) |
Two vulnerabilities in Acrobat and Reader are considered critical. |
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-15 09:35:03 |
Microsoft Patch Tuesday: 60 vulnerabilities resolved including two active exploits (lien direct) |
A total of 19 vulnerabilities are deemed critical, including two zero-day flaws being actively used in the wild. |
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-15 07:17:05 |
Instagram hack is locking hundreds of users out of their accounts (lien direct) |
Recovery options are being changed to .ru addresses by an unknown threat actor. |
Hack
Threat
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-14 19:37:00 |
Beyond Spectre: Foreshadow, a new Intel security problem (lien direct) |
Researchers have broken Intel's Software Guard Extensions, System Management Mode, and x86-based virtual machines. |
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-14 09:23:00 |
Hackers can infiltrate police body cameras to tamper with evidence (lien direct) |
It is possible that crucial recordings could be modified or deleted due to vulnerabilities in body cam software. |
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-14 07:30:00 |
Man-in-the-Disk attacks take advantage of Android storage systems (lien direct) |
Updated: The novel attack technique relies on Android developers which use lazy storage protocols. |
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-13 14:15:05 |
The future of IoT? State-sponsored attacks, say security professionals (lien direct) |
IT security professionals believe that nation states will begin to exploit smart, connected devices in the next 12 months. |
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-13 10:28:00 |
Apple macOS vulnerability paves the way for system compromise with a single click (lien direct) |
Tampering with two lines of code unveiled a serious bug which could lead to full system compromise. |
Vulnerability
Guideline
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-13 09:28:00 |
25 Android smartphone models contain severe vulnerabilities off the shelf (lien direct) |
Researchers say that the swathe of bugs impacts major vendors. |
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-12 22:00:01 |
Hackers can steal data from the enterprise using only a fax number (lien direct) |
Fax machines are still widely used by businesses and a communications protocol vulnerability is leaving them exposed to cyberattacks. |
Vulnerability
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-12 22:00:01 |
Windows 10 upgrades: Swapping the big bang for the long grumble? (lien direct) |
The switch to Windows as a service has brought benefits -- and some downsides too. |
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-10 11:18:04 |
PayPal, Square vulnerabilities impact mobile point-of-sale machines (lien direct) |
Researchers have disclosed the existence of point-of-sale bugs which impact mobile payment services worldwide. |
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-10 09:33:05 |
AWS error exposed GoDaddy business secrets (lien direct) |
It is believed information belonging to thousands of GoDaddy systems was leaked due to the failure. |
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-10 06:44:05 |
Crowdfense launches platform to source new zero-day vulnerabilities for sale (lien direct) |
Researchers will be given a platform to sell both zero-day security flaws and exploit chains. |
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-09 15:17:05 |
Open, Cortana: Voice assistant used to bypass locked Windows 10 machine security (lien direct) |
Exploit of Microsoft's Cortana did not require any external code. |
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-09 10:29:00 |
Challenge accepted: 15-year-old plays Doom on \'unhackable\' Bitfi (lien direct) |
Bitfi is becoming something of a joke as an "unhackable" device -- but there may be more to come. |
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-09 10:00:02 |
Smart city systems are riddled with critical security vulnerabilities (lien direct) |
Researchers have uncovered countless zero-day bugs which can be used to kill our critical city systems. |
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-09 08:54:05 |
BIND DNS software vulnerability which could lead to DoS attacks exposed (lien direct) |
The bug impacts multiple versions of the open-source software. |
Vulnerability
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-09 08:43:00 |
Comcast customer portal vulnerabilities exposed sensitive data (lien direct) |
Two serious security flaws in Comcast systems may have left home addresses and social security numbers up for grabs. |
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-08 10:40:00 |
OpenEMR security flaws could have exposed millions of patient records (lien direct) |
Over 20 severe bugs were found using only manual methods by a single cybersecurity group. |
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-08 10:00:01 |
Anki\'s delightful little robot is a step in the right direction for sidekick automation (lien direct) |
The home robots of science fiction just aren't here yet, but that doesn't mean we can't have some fun iterating. |
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-08 10:00:00 |
DeepLocker: When malware turns artificial intelligence into a weapon (lien direct) |
In the future, your face could become the trigger for the execution of malware. |
Malware
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-08 08:40:01 |
New Wi-Fi attack cracks WPA2 passwords with ease (lien direct) |
The common Wi-Fi security standard is no longer as secure as you think. |
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-08 07:05:00 |
Pentagon bans military from using GPS apps and fitness trackers (lien direct) |
Those on active duty are being told not to use devices and apps with GPS, but the policy may be difficult to impose. |
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-08 06:29:05 |
You can buy Bitcoin ATM malware for $25,000 in the Dark Web (lien direct) |
Malware targeting cryptocurrency-based ATMs commands high prices in the underground. |
Malware
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-07 13:00:00 |
Iran cited as growing threat in cybersecurity landscape (lien direct) |
Accenture says that Iran is becoming a hotbed for cyberespionage. |
Threat
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-06 10:00:00 |
ATM hacking becomes a priority in IBM cybersecurity facilities (lien direct) |
As jackpotting becomes an increasingly frustrating problem for banks, IBM has stepped in to find a solution. |
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-06 08:14:03 |
Salesforce warns customers of data leak caused by API error (lien direct) |
The issue may impact enterprise players utilizing Salesforce marketing cloud services. |
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-06 06:51:00 |
Can you recover the power grid after a cyberattack? The Department of Energy finds out (lien direct) |
The project will investigate the consequences of attacks on energy infrastructure and how long it takes systems to recover. |
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-03 08:55:02 |
MikroTik routers enslaved in massive Coinhive cryptojacking campaign (lien direct) |
Hundreds of thousands of devices are mining cryptocurrency through power stolen from victims. |
|
|
|
![ZDNet.webp](./Ressources/img/ZDNet.webp) |
2018-08-02 14:00:00 |
Disclose.io: A safe harbor for hackers disclosing security vulnerabilities (lien direct) |
The laws are murky when it comes to responsible disclosure of bugs, but Disclose.io intends to make things more clear-cut. |
|
|
|