What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
itsecurityguru.webp 2018-04-12 13:02:04 Boffins pull off quantum leap in true random number generation (lien direct) A team of physicists claim to have developed a guaranteed random number generator using photons and the laws of quantum mechanics. Random numbers are used to secure communications, and a good random number generator is essential for strong encryption. But ensuring that the numbers are truly random is difficult. View full story ORIGINAL SOURCE: The ... ★★★
itsecurityguru.webp 2018-04-12 13:01:03 Data exfiltrators send info over PCs\' power supply cables (lien direct) If you want your computer to be really secure, disconnect its power cable. So says Mordechai Guri and his team of side-channel sleuths at the Ben-Gurion University of the Negev. The crew have penned a paper titled PowerHammer: Exfiltrating Data from Air-Gapped Computers through Power Lines that explains how attackers could install malware that regulates CPU utilisation ...
itsecurityguru.webp 2018-04-12 13:00:03 Great Western Railway warns customers of possible compromise following cyber attack (lien direct) Great Western Railway has advised customers to reset their passwords after the company’s systems were targeted by attackers. The train operator confirmed to Computing that it has identified “a series of automated attempts” to access a “small percentage” of customer accounts. After conducting an investigation, the company found that GWR.com had been targeted and some accounts accessed. However, it ...
itsecurityguru.webp 2018-04-12 12:58:05 UK hit by 49 cyberattacks from Russian groups in six months says Amber Rudd (lien direct) Russian cybercriminals have targeted the UK in 49 separate incidents over the last six months, the Home Secretary has revealed. Speaking at the National Cyber Security Centre’s CYBERUK conference in Manchester, Amber Rudd said there’s been “a significant increase in the scale and severity of malicious cyber activity globally” but said that the government “will ...
itsecurityguru.webp 2018-04-12 12:58:00 Facebook\'s Zuckerberg says his data was harvested (lien direct) Facebook’s chief executive has revealed that his data was among that harvested in a privacy scandal. Mark Zuckerberg made the disclosure during his second day of being questioned in Washington. In a related development, the political consultancy at the heart of the affair has announced its acting chief executive is stepping down. View full story ...
itsecurityguru.webp 2018-04-12 12:57:01 Man makes $4bn in two days explaining Facebook to old people (lien direct) Mark Zuckerberg’s supposed blockbuster grilling by Congress was the bust it was always going to be, and he went home victorious largely by default. View full story ORIGINAL SOURCE: New Statesman
itsecurityguru.webp 2018-04-12 12:56:01 Moscow likely behind hack on German govt, spy chief says (lien direct) Germany's head of domestic intelligence said on Wednesday there was a “high likelihood” that the Russian government was behind a cyber attack on German computer networks, although he conceded it was difficult to be 100-percent certain. View full story ORIGINAL SOURCE: Reuters
itsecurityguru.webp 2018-04-11 14:17:00 Ex GCHQ Director formally joins the advisory board of Immersive Labs (lien direct) Immersive Labs has today confirmed ex-GCHQ Director, Robert Hannigan, as chairman of its advisory board. This is a key appointment for Immersive Labs, given Robert's excellent understanding of the cyber threat landscape both in the UK and globally. It is also a strong endorsement of Immersive Labs innovative gaming approach to cyber security training and ...
itsecurityguru.webp 2018-04-11 09:36:02 New authentication standards aim to make the web more secure (lien direct) A pair of authentication standards published this week have received endorsement from Mozilla, Microsoft and Google: the WebAuthn API, and the FIDO Alliance’s Client-to-Authenticator Protocol. The aim of WebAuthn and CTAP is to offer an authentication primitive that doesn’t rely on server-stored passwords, since a user’s fingerprint or even their unlock pattern is safer for ...
itsecurityguru.webp 2018-04-11 09:33:03 Cloud adoption placed on hold (lien direct) Enterprises are adopting the cloud much faster than their security teams can keep up – and misunderstanding about cloud environments is pervasive. The 2018 Enterprise Cloud Trends Report from iboss surveyed IT decision makers and office workers in US enterprises and found that 64% of IT decision makers believe the pace of software as a service (SaaS) application ... ★★★★★
itsecurityguru.webp 2018-04-11 09:23:02 UK Govt clamping down on Dark Web crime (lien direct) The National Cyber Security Centre’s CYBERUK conference in Manchester will be the backdrop for the launch of a £9m fund to increase cyber capabilities and tackle organised crime online, focusing on those who use anonymous and hidden online services for illegal activities such as hacking, people trafficking, selling weapons and drug dealing. View Full Story ... ★★★★
itsecurityguru.webp 2018-04-11 09:19:01 Facebook warned of Russian hacking back in 2016 (lien direct) Facebook detected Russian government hackers targeting the Facebook accounts of campaign officials before the 2016 presidential election, Mark Zuckerberg revealed during a congressional hearing on Tuesday. View Full Story ORIGINAL SOURCE: Motherboard ★★★★★
itsecurityguru.webp 2018-04-11 09:15:00 YouTube videos hacked (lien direct) A number of high-profile music videos disappeared from YouTube and had their titles and hold images defaced, after the video streaming website was targeted by hackers. This includes the most viewed video of all time ‘Despacito’ by Luis Fonsi and Daddy Yankee. View Full Story ORIGINAL SOURCE: Guardian ★★
itsecurityguru.webp 2018-04-11 09:12:00 Indecent exposure: could Wi-Fi be your weakest link? (lien direct) Imagine you'd spent a fortune making your home physically secure, only to discover you'd been quietly robbed by thieves who never set foot on your property. You thought you'd built a fortress, but didn't notice the gap in the fence that left you wide open to intruders. It's every homeowner's worst nightmare. But it's also ... ★★
itsecurityguru.webp 2018-04-11 09:10:01 Bitdefender survey shows Right Size EDR, not SOC needed to address Security Flaws (lien direct) Bitdefender, a leading global cybersecurity technology company protecting 500 million users worldwide, today announced the results of its latest survey, showing that more than half of CISOs worldwide (65 percent UK) are worried about a global skills shortage. Sixty-nine percent of respondents around the globe also reported that their team is under resourced, with more ... Guideline ★★★
itsecurityguru.webp 2018-04-11 09:08:01 Patch Tuesday Commentary, Chris Goettl, Director of Product Management, Security at Ivanti (lien direct) Microsoft has released updates today including 65 vulnerability fixes.  While there are no Zero Day exploits in the April patch release, there were a couple of Zero Days identified between March and April Patch Tuesdays, which we will mention in a moment.  There is one public disclosure this month in SharePoint Server. The challenging aspect ...
itsecurityguru.webp 2018-04-11 09:00:03 Are you ready to handle the Crisis Comms when you get breached? (lien direct) You are just about to go to sleep when you get a text from your SOC team: code RED. They have discovered your company has suffered a serious breach and you need to decide what to do.  At this point, you are either in the position of having prepared for such an event and your ...
itsecurityguru.webp 2018-04-10 11:05:00 (Déjà vu) CISO Chat – Rick Orloff, Chief Security Officer at Code42 (lien direct) Ever wondered what the role of a Chief Information Security Officer (CISO) encompasses? To put it simply, they are the guardians and protectors of everything information security related to a business. However, the tasks are far from simple as their teams work around the clock to respond to incidences that directly affect the safety of ...
itsecurityguru.webp 2018-04-10 10:57:00 The digital transformation roadblock: existing IAM solutions are creating major barriers to digital technology adoption (lien direct) Digital transformation is a much-hyped business buzzword, driven by the adoption of cloud IT services around the world. This hype has seen enterprises scramble to become more digitally agile in a fight to stay competitive. In fact, a new study by OneLogin[2], the industry leader in Unified Access Management, reveals that 92% of UK enterprises ... Guideline ★★★
itsecurityguru.webp 2018-04-10 10:54:01 Healthcare will become digitised by 2030 to keep services alive, experts predict (lien direct) Within ten years your medical check-up could involve more interaction with sensors, cameras and robotic scanning devices than human doctors and nurses, as healthcare organisations re-build services around the Internet of Things (IoT), according to a new report by Aruba, a Hewlett Packard Enterprise company.   The 'Building the Hospital of 2030' report, features the ... ★★★★★
itsecurityguru.webp 2018-04-09 11:57:04 Indian Government websites being hacked (lien direct) On April 06, India's official ministry of defence (MoD) website-mod.gov.in-was reportedly hacked. Instead of the homepage, visitors to the site saw the following message: “The website encountered an unexpected error. Please try again later.” Alongside the error warning, a Mandarin character-meaning either “Zen” or “home”-appeared at the top of the page, media reports said, fueling ...
itsecurityguru.webp 2018-04-09 11:55:05 Finland suffers third largest data breach (lien direct) Over 130,000 Finnish citizens have had their credentials compromised in what appears to be third largest data breach ever faced by the country, local media reports. View Full Story ORIGINAL SOURCE: The Hacker News
itsecurityguru.webp 2018-04-09 11:53:00 Dark Net being used by terrorists to plot and hide (lien direct) Terrorist organisations and individuals are evading security services and intelligence agencies by “hiding in the shadows” of the darknet, using encrypted messaging services, to communicate and anonymous cryptocurrencies such as bitcoin to generate funds. View Full Story ORIGINAL SOURCE: The Guardian
itsecurityguru.webp 2018-04-09 11:49:01 Hacker group exploit Cisco Flaw and target Iran and Russia (lien direct) The message “Don't mess with our elections” followed by a U.S. flag appeared on Iranian and Russian screens after a hacker group exploited Cisco Smart Install Client on vulnerable machines. The hackers claim to have targeted only the computer infrastructure in Iran and Russia during the attack on Friday night. View Full Story ORIGINAL SOURCE: ...
itsecurityguru.webp 2018-04-09 11:46:00 Russia not to blame for cyber attack on Arizona elections in 2016 (lien direct) A hack on an Arizona election database during the 2016 U.S. presidential campaign was carried out by suspected criminal actors and not the Russian government, a senior Trump administration official told Reuters on Sunday. View Full Story ORIGINAL SOURCE: Reuters
itsecurityguru.webp 2018-04-09 11:22:01 (Déjà vu) Getting buy-in from the Board – advice for CIOs (lien direct) IT and security conversations are moving away from the confines of remote IT departments and are finding their way to the top of boardroom agendas. As they do so, CIOs need to carefully consider the way they communicate with other senior executives if critical IT initiatives are to receive that all important buy-in from the ...
itsecurityguru.webp 2018-04-09 11:17:05 Malwarebytes Unveils Endpoint Protection and Response to Simplify Endpoint Monitoring, Detection and Remediation (lien direct) Malwarebytes™, the leading advanced malware prevention and remediation solution, today announced the release of Malwarebytes Endpoint Protection and Response.   When it comes to Endpoint Detection and Response (EDR), most businesses fall into one of three categories: they either don't have EDR and have limited visibility into endpoint activity across their infrastructure; they have an EDR solution ... Guideline
itsecurityguru.webp 2018-04-06 11:48:05 Research Findings Show Industry Leaders Struggle to Balance Digital Innovation and Security (lien direct) Akamai Technologies, Inc. (NASDAQ: AKAM), the world's largest and most trusted cloud delivery platform, today released data noting how companies are struggling with the tug-of-war between advancing digital innovation and ensuring secure digital experiences that maintain user trust and mitigate risk. As part of a commissioned study of more than 350 global information technology leaders ... Guideline ★★★★
itsecurityguru.webp 2018-04-06 11:47:01 Study Reveals 40 Percent of Large Businesses Will Implement Intelligent Assistants or Chatbots by 2019 (lien direct)  Spiceworks today announced the results of a new survey examining the adoption and usage of intelligent assistants and AI chatbots in the workplace. The results show that within the next 12 months, 40 percent of large businesses – those with more than 500 employees – expect to implement one or more intelligent assistant or AI chatbot on company-owned devices, ...
itsecurityguru.webp 2018-04-06 11:42:03 Scammers abused Facebook phone number search (lien direct) Facebook was warned by security researchers that attackers could abuse its phone number and email search facility to harvest people’s data. On Wednesday, the firm said “malicious actors” had been harvesting profiles for years by abusing the search tool. It said anybody that had not changed their privacy settings after adding their phone number should ...
itsecurityguru.webp 2018-04-06 11:41:04 Bot-ched security: Chat system hacked to slurp hundreds of thousands of Delta Air Lines, Sears customers\' bank cards (lien direct) Hackers are feared to have swiped sensitive personal information held by two of the best known companies in the US – after malware infected a customer support software maker. Both Sears and Delta Air Lines said Wednesday that hundreds of thousands of customers’ payment card numbers, expiration dates, and CVV security codes, were potentially extracted ...
itsecurityguru.webp 2018-04-06 11:27:04 Don\'t want to alarm you, but defence bods think North Korea could nuke UK \'within a few years\' (lien direct) North Korea maintains a hacking base in China, the UK Parliament’s Defence Select Committee has been told, while government snooping body GCHQ struggles to retain “cyber-staff”. Then there’s the slightly greater concern that the communist nation could nuke Britain “within a few years”. The House of Commons’ Defence Committee published its latest report, Rash or ... ★★★
itsecurityguru.webp 2018-04-06 11:26:05 Intel Remote Keyboard app nixed after discovery of critical remote control vulnerability (lien direct) Intel has issued a security advisory about its remote keyboard app after discovering a bug that made it possible for a remote user to mimic keyboard and mouse input with elevated privileges. Intel Remote Keyboard was available for both iOS and Android, but the critical vulnerability — and two other bugs with a High rating ... ★★★★★
itsecurityguru.webp 2018-04-06 11:26:00 State AG\'s Equifax case may portend big problems for data breach defendants (lien direct) We may be on the verge of a breakthrough in data breach litigation. A state judge in Massachusetts ruled Wednesday that the Massachusetts Attorney General can move forward with a potentially gigantic data breach case against the credit reporting firm Equifax. The AG, Maura Healey, is asking for statutory damages under Massachusetts consumer and data ... Equifax ★★★
itsecurityguru.webp 2018-04-06 11:24:03 OneDrive gets Files Restore rollback, Office 365 malware protection (lien direct) Once upon a time, viruses were the bane of the computing industry. They haven't totally disappeared, they just evolved and took on different forms. Malware is now even spread through malicious links and some can even hold your files for ransom. Microsoft's software and services still have the notoriety of being the target of such ...
itsecurityguru.webp 2018-04-06 08:34:05 Combating seven common threat techniques in 2018 (lien direct) By Keiron Shepherd, Senior Security Specialist, F5 Networks  With automated tools and hackers for hire, cybercrime has turned into a game for profit. Recent research from F5 Labs shows that out of 429 reported breaches studied between 2005 and 2017, hackers gained $2.75 billion on the black market. The digital world has opened the door ... ★★★★★
itsecurityguru.webp 2018-04-05 13:24:01 Inside the takedown of the alleged €1bn cyber bank robber (lien direct) The Carbanak cybercrime group is accused of stealing more than €1bn from banks around the world. Last week, police arrested the man they think is its mastermind View full story ORIGINAL SOURCE: Wired ★★★
itsecurityguru.webp 2018-04-05 13:23:03 (Déjà vu) Microsoft patches critical Malware Protection Engine flaw (lien direct) Microsoft has patched a remote code execution vulnerability impacting the Microsoft Malware Protection Engine – mpengine.dll – which provides the scanning, detection and cleaning capabilities for Microsoft's various anti-virus and anti-spyware software including Windows Defender. The vulnerability is deemed critical in nature. View full story ORIGINAL SOURCE: Techspot ★★★
itsecurityguru.webp 2018-04-05 13:20:01 Delta says online chat cyber security breach put some customer payment info at risk (lien direct) Delta Air Lines said Tuesday that a cyber security breach involving an online chat service it uses put some customer payment information at risk. Atlanta-based Delta said it was notified of the “cyber incident” March 28 by online chat service provider [24]7.ai. From Sept. 26 to Oct. 12, 2017, “certain customer payment information” for clients ... ★★★★★
itsecurityguru.webp 2018-04-05 13:19:02 The Company that Controls Rover Pipeline was a Cyber-Attack Target (lien direct) The Rover Pipeline's corporate parent came under cyber-attack this week, according to Bloomberg News, as did three other natural gas transmission companies. No pipeline operations or safety systems were affected. View full story ORIGINAL SOURCE: WKSU ★★
itsecurityguru.webp 2018-04-05 13:18:03 Only 1% of media companies are \'very confident\' in their cybersecurity (lien direct) As more consumers cut the cable cord, media companies are increasingly transitioning to over-the-top (OTT) content, offering online-based shows and information. However, increasing cyber threats may halt media organizations’ online services and ability to innovate in the space, according to a Wednesday report from security firm Akamai. View full story ORIGINAL SOURCE: Tech Republic ★★★★
itsecurityguru.webp 2018-04-05 13:17:05 List of data breaches and cyber attacks in March 2018 (lien direct) Healthcare breaches are common in our monthly lists – but the number of incidents this month is insane. Take a look at the list, and you'll quickly notice that the majority of them are healthcare related. There's a mixture of incidents in there, from a rogue employee to someone accidentally sending information to the wrong ...
itsecurityguru.webp 2018-04-05 13:17:00 Pyongyang Hackers Could be Major Future Threat: Parliament (lien direct) The North Korean cyber-threat to the UK remains below that of Russia and China but could increase in the future, a new parliamentary Defence Committee report has claimed. It reiterated the view that the WannaCry ransomware attack which decimated large parts of the NHS was carried out by the Kim Jong-un regime, but that the ... Wannacry
itsecurityguru.webp 2018-04-05 13:14:03 YouTube employee\'s Twitter account hijacked during shooting (lien direct) Lavrusik, a YouTube product manager, sent out one of the first tweets about the active shooting at the San Bruno, California, office at 12:57 p.m. Then, he sent out another tweet when he was safely evacuated about 16 minutes later. Following that update, around 2:10 p.m., a new tweet came up from the account: PLEASE ...
itsecurityguru.webp 2018-04-05 12:49:04 Swimlane Selects Lastline to Augment its Automated Security Platform (lien direct) Lastline Inc., the leader in advanced network-based malware protection, today announced a partnership with Swimlane, a leader in security automation and orchestration (SAO). Together, Lastline and Swimlane help enterprises quickly and efficiently identify, inspect, and respond to advanced malware attacks without increasing the workload on security operations staff. The interopability also streamlines security operations through ... Guideline
itsecurityguru.webp 2018-04-05 12:45:01 2.7 million businesses in the UK are leaving their corporate networks vulnerable to IoT hacks (lien direct) 2.7 million businesses in the UK are leaving their corporate networks vulnerable to IoT hacks, new research from ForeScout has revealed. The survey of 500 CIOs and IT managers found significant cause for concern with almost half (47 per cent) of respondents having allowed IoT devices onto their corporate network without changing the default password. ...
itsecurityguru.webp 2018-04-04 10:56:00 SEC Charges $32 Million DJ Khaled-Backed Centra ICO With Fraud (lien direct) It's a harsh awakening for celebrities who have entered the wild west of initial coin offerings amid the Bitcoin craze. Late Tuesday, the Securities and Exchange Commission charged the founders of an ICO, Centra, with fraud, saying the creators raised $32 million from investors with an intricate marketing campaign, including the use of paid endorsements ...
itsecurityguru.webp 2018-04-04 10:55:00 Bank card fraud fears: Cloning can be carried out by STANDING CLOSE (lien direct) A WARNING has been issued over contactless bank cards with details being “skimmed” while the card is still in your pocket. And criminals can gain access to the equipment by purchasing it legally for just £20 online. One of the biggest threats to consumers using contactless cards is that there details can be very easily ... ★★
itsecurityguru.webp 2018-04-04 10:53:05 Hold the phone: Mystery fake cell towers spotted slurping comms around Washington DC (lien direct) The US Department of Homeland Security (DHS) says it has detected strange fake cellphone towers – known as IMSI catchers – in America’s capital. These devices, which can masquerade as real phone masts to track people’s movements and potentially eavesdrop on calls and texts, represent a real and growing security risk, the agency said. And ... ★★★
itsecurityguru.webp 2018-04-04 10:50:00 86% of software vulnerabilities patched on day 1 (lien direct) Software vulnerabilities more than doubled between 2012 and 2017, but vendors are doing a better job of patching the holes in a timely manner, with 86% of vulnerabilities having patches available on the day of disclosure. These are among the key findings from Flexera's latest Vulnerability Review. The annual report found that 19,954 vulnerabilities were ... ★★★★★
Last update at: 2024-07-16 22:09:00
See our sources.
My email:

To see everything: RSS Twitter