What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
WiredThreatLevel.webp 2019-02-15 12:00:00 Darpa Wants to Solve Science\'s Replication Crisis With Robots (lien direct) Social science has an image problem-too many findings don't hold up. A new project will crank through 30,000 studies to try to identify red flags. Studies
no_ico.webp 2019-01-11 16:00:04 Orphaned Accounts: Did The Quora Hack Reveal Hidden Dangers? (lien direct) From watching funny cat videos to checking the latest news, we are all familiar with the exchange of personal data (email address information, and the like) for services. But, could we be becoming dangerously complacent? Studies reveal that 57 per cent of British consumers are concerned about how much personal data they have previously shared … The ISBuzz Post: This Post Orphaned Accounts: Did The Quora Hack Reveal Hidden Dangers? Hack Studies
AlienVault.webp 2019-01-04 14:00:00 Things I Hearted This Week, 4th Jan 2018 (lien direct) Welcome to 2019! I hope that you had a well-deserved break over the holidays, and a special shout out to all the people that carried on pulling shifts in the SOC, were on-call, and helped ensure stuff stayed as secure as possible while the rest of us were eating and sleeping too much! I’ve said it before, and I’ll say it again, that you are the real backbone of the security industry, and although you may never go to conferences, or be heard on a podcast, or put your name to a blog - you go about your job keeping things as secure as possible. We’re only half a week into the new year and the security world hasn’t slowed down in the slightest, so let’s just get down to what’s been going on these last few days, and catch up with some of the excitement that I missed while I was busy consuming mince pies. Victorian Government Employees Details Stolen We didn’t even make it a day into the new year without news of a data breach where thousands of records were stolen. Sure, it’s small compared to the millions of records we’re getting accustomed to reading about, but it’s significant nonetheless. It’s like data breaches have become an olympic level sport with everyone racing to be first. The work details of 30,000 Victorian public servants have been stolen in a data breach, after part of the Victorian Government directory was downloaded by an unknown party. The list is available to government employees and contains work emails, job titles and work phone numbers. Employees affected by the breach were told in an email their mobile phone numbers may have also been accessed if they had been entered into the directory. Data breach sees Victorian Government employees' details stolen | ABC New Town of Salem Breach Affects 7 Million Accounts Getting up to the kind of breach numbers we’re all more used to, The Town of Salem (video game) was hit with a massive data breach last week that exposed the information on more than 7 million users. The breach was discovered by the cybersecurity research Dehashed on December 28 when he received an anonymous email that indicated someone had gained access to the game’s database. Town of Salem is a role-playing game operated by BlankMediaGames. Town of Salem breach affects 7 million accounts | SC Magazine Promote Your Scams In the battle for advertising revenue supremacy, social media giants have automated their whole process and seem to have forgotten to include any basic checks for, you know, looking for obvious scams. Like this little gem whereby an obvious PayPal phishing scam was sent as a promoted tweet. And we think we’re going to clean up fake news. Twitter let someone promote an obvious PayPal phishing scam Data Breach Vulnerability Studies Uber
WiredThreatLevel.webp 2018-11-20 12:00:00 Airports Cracked Uber and Lyft-Time for Cities to Take Note (lien direct) Airports serve as handy case studies for what happens when the cars show up, and how to beat them back again. Studies Uber
securityintelligence.webp 2018-10-29 11:10:02 5 Ways CISOs Can Improve Collaboration on Security Risks (lien direct) >While the CISO's role is more important than ever, recent studies have revealed a disconnect between CISOs and business executives and difficulities communicating security risks in business terms. Studies
CSO.webp 2018-10-10 09:52:00 Top cybersecurity facts, figures and statistics for 2018 (lien direct) Looking for hard numbers to back up your sense of what's happening in the cybersecurity world? We dug into studies and surveys of the industry's landscape to get a sense of the lay of the land-both in terms of what's happening and how your fellow IT pros are reacting to it.Ransomware is down, cryptomining is up With last year's outbreak of NotPetya, ransomware-malicious programs that encrypt your files and demand a ransom payment in bitcoin to restore them-became one of the most talked about forms of malware of 2017. Yet at the same time, the actual rates of malware infection began to plummet around the middle of the year, until by December 2017 it represented only about 10 percent of infections.    Malware Studies NotPetya
WiredThreatLevel.webp 2018-10-05 11:00:00 We\'re Destroying the Sea-But It Could Save Us From Ourselves (lien direct) A new review looks at more than 1,000 studies of potential oceanic solutions to climate change. A good idea? Wind energy. Maybe not so good? Loading the sea with iron. Studies APT 32
no_ico.webp 2018-09-25 13:15:02 De-Risking Digital Transformation (lien direct) From small businesses to global conglomerates, digital transformation is taking place across all sectors and sizes of organisations. It is one of the key decisions that business decision makers find themselves faced with. Studies have found that 96% of companies consider it important or critical to their development, whilst MIT Centre for Business discovered that digital transformation can have … The ISBuzz Post: This Post De-Risking Digital Transformation Studies
WiredThreatLevel.webp 2018-09-12 18:00:00 How Our Biological Clock Could Dictate Medical Treatments (lien direct) Two new studies bring us closer to finding the optimal time, according to our internal clocks, to pop a pill-or maybe even schedule surgery. Studies
TechRepublic.webp 2018-08-27 22:31:00 How to implement VMware Pulse IoT Center: 3 case studies (lien direct) Customers including CSX, GE Research, and VMware itself explained how they deployed VMware Pulse IoT Center to manage their connected initiatives. Studies
CSO.webp 2018-08-02 07:26:00 IDG Contributor Network: “Political hack” takes on new meaning in the age of cyberwarfare (lien direct) The media blitz about Russia's involvement in our electoral process redefines the term “political hack.” Our fundamental right to legitimately and confidentially vote in elections, with confidence our vote counts, is not challenged by a despot, but rather by a bot. e-Voting machines are routinely analyzed and discoveries of one or another vulnerability are reported. Several studies over the past few years reveal the brittleness and insecurities of the various electronic voting machines used across America.  The most recent demonstration at this year's DefCon provides a step by step process on how to exploit and attack a particular eVoting machine. Undoubtedly other machines are also vulnerable to malicious alteration. Vulnerability Studies
TechRepublic.webp 2018-07-09 17:16:02 Robots will steal your white collar office job, too: 3 case studies (lien direct) While much attention has focused on automation taking away blue collar jobs, several others are also at risk. Studies
TechRepublic.webp 2018-07-06 14:38:00 25% of employees admit that they use the same password for everything (lien direct) Cybersecurity policies and procedures are effective only if they're followed--and studies continue to show that security best practices are routinely ignored. It's time for a better approach. Studies ★★★★
no_ico.webp 2018-03-13 12:55:00 Thycotic Releases 2018 Global State Of Privilege Access Management Risk And Compliance Report (lien direct) The ISBuzz Post: This Post Thycotic Releases 2018 Global State Of Privilege Access Management Risk And Compliance Report Studies
Blog.webp 2018-03-13 11:55:02 Examine Browser Ad-Blockers Strength using Burpsuite (lien direct) Today we will determine the effectiveness of different blocker such as Ghostery, Adblock Ultimate and Ublock Origin which are extension of browser's and their work is to block Ad's popping up while browsing through websites on your browser. To make use of these extension's you need to install and enable them. We will determine the... Continue reading → Studies
SecurityWeek.webp 2018-03-13 03:26:04 New Cyberespionage Attacks Linked to MuddyWater Campaign (lien direct) Recent attacks targeting organizations in Turkey, Pakistan and Tajikistan appear to be linked to the previously detailed MuddyWater campaigns, according to Trend Micro. Studies
itsecurityguru.webp 2018-03-12 15:19:04 Global SOC maturity improves, yet some still operate with serious gaps in security (lien direct) Despite the volume of threats rising, the global findings of a new Micro Focus report indicate that more mature Security Operational Centres (SOCs) are becoming more efficient in detection with greater ability to recover from breaches than ever before. View Full Story  ORIGINAL SOURCE: Helpnetsecurity Studies
MalwarebytesLabs.webp 2018-03-12 15:00:00 The digital entropy of death: what happens to your online accounts when you die (lien direct) What happens to online accounts when we die? Not a cheerful subject by any stretch of the imagination, but the good news is there are options available-some, a little more sensible than others. Categories: 101 Tags: (Read more...) Studies
itsecurityguru.webp 2018-03-12 12:44:01 (Déjà vu) CISO Chat – Christian Vezina, Chief Information Security Officer at VASCO Data Security (lien direct) Ever wondered what the role of a Chief Information Security Officer (CISO) encompasses? To put it simply, they are the guardians and protectors of everything information security related to a business. However, the tasks are far from simple as their teams work around the clock to respond to incidences that directly affect the safety of ... Studies
Last update at: 2024-07-17 18:08:42
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter