Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2018-10-24 12:57:03 |
Banking Trojans continue to surface on Google Play (lien direct) |
>The malicious apps have all been removed from the official Android store but not before the apps were installed by almost 30,000 users
|
|
|
|
|
2018-10-24 10:03:00 |
LuminosityLink RAT author sentenced to 2.5 years in jail (lien direct) |
>As part of his plea agreement, the author of the malware also forfeited the proceeds from his crimes – 114 Bitcoin worth $725,000
|
Malware
|
|
|
|
2018-10-22 12:20:00 |
Strict password policy could prevent credential reuse, paper suggests (lien direct) |
The solution to password recycling may be easier to implement than previously thought, according to a recent paper
|
|
|
|
|
2018-10-19 10:19:02 |
Scams and flaws: Why we get duped (lien direct) |
What are the emotional triggers and errors in judgment that make you fall for an online scam?
|
|
|
|
|
2018-10-18 11:16:02 |
Tumblr patches bug that could have exposed user data (lien direct) |
>The microblogging platform is assuring its users that has found no evidence that any data was actually stolen
|
|
|
|
|
2018-10-18 08:54:00 |
VestaCP compromised in a new supply chain attack (lien direct) |
Customer see their admin credentials stolen & their servers infected with Linux/ChachaDDoS
|
|
|
|
|
2018-10-17 09:55:03 |
GreyEnergy: Updated arsenal of one of the most dangerous threat actors (lien direct) |
>ESET research reveals a successor to the infamous BlackEnergy APT group targeting critical infrastructure, quite possibly in preparation for damaging attacks
|
Threat
|
|
|
|
2018-10-16 12:01:02 |
Phishers are after something unusual in ploy targeting book publishers (lien direct) |
In a new twist on the theme, the scammers have their sights set on book manuscripts, among other things
|
|
|
|
|
2018-10-15 14:46:00 |
Facebook downgrades victim count, details data accessed in breach (lien direct) |
>While the number of victims is lower than previously thought, the data accessed for millions of them is more sensitive than originally believed
|
|
|
|
|
2018-10-15 13:23:05 |
The Occasional Orator Part 3 (lien direct) |
>Proper preparation can make all the difference when it comes to speaking at conferences
|
|
|
|
|
2018-10-12 11:26:04 |
Tips for minding the digital skills gap (lien direct) |
>The times they are a-changin', so how do you build and sharpen the skills that you need to avoid being left behind by the digital revolution?
|
|
|
|
|
2018-10-11 11:57:01 |
New TeleBots backdoor: First evidence linking Industroyer to NotPetya (lien direct) |
>ESET's analysis of a recent backdoor used by TeleBots – the group behind the massive NotPetya ransomware outbreak – uncovers strong code similarities to the Industroyer main backdoor, revealing a rumored connection that was not previously proven
|
Ransomware
|
NotPetya
|
|
|
2018-10-11 09:56:00 |
Send in the clones: Facebook cloning revisited (lien direct) |
As another confusing message spreads, we look at Facebook privacy, cloning, and hacking
|
|
|
|
|
2018-10-10 12:54:04 |
California outlaws poor default passwords in connected devices (lien direct) |
>The law is intended to help curb attacks that rely on weak, non-existent or publicly disclosed passwords that far too often ship with web-connected gadgets
|
|
|
|
|
2018-10-10 08:57:00 |
Google+ to shut down due to lack of adoption and privacy bug (lien direct) |
>Google has found no evidence of misuse of user information courtesy of a security glitch in the social platform's API
|
|
|
|
|
2018-10-09 12:00:03 |
Blockchain: What is it, how it works and how it is being used in the market (lien direct) |
A closer look at the technology that is rapidly growing in popularity
|
|
|
|
|
2018-10-08 12:34:05 |
Most routers full of firmware flaws that leave users at risk (lien direct) |
If you own a Wi-Fi router, it may well be riddled with security holes that expose you to a host of threats
|
|
|
|
|
2018-10-05 12:13:01 |
Virus Bulletin 2018: Supply chain hacking grows up (lien direct) |
Striking the balance between supply, demand and safety is a major concern
|
|
|
|
|
2018-10-05 10:12:05 |
Make it a cyber-habit: Five simple steps to staying safe online (lien direct) |
What are some essential steps you can take to increase your online safety – now and in the long run?
|
|
|
|
|
2018-10-04 12:02:01 |
Why ask the public about cybercrime and cybersecurity? (lien direct) |
Answers could help raise awareness of situations that people fear
|
|
|
|
|
2018-10-04 10:27:03 |
Virus Bulletin 2018: Attack velocity ramps up (lien direct) |
Some tips for helping to keep your data more secure from the floor of VB 2018
|
|
|
|
|
2018-10-03 13:13:00 |
Facebook: No evidence attackers used stolen access tokens on third-party sites (lien direct) |
>The social networking behemoth is expected to face a formal investigation by Ireland's Data Protection Commission in what could be the “acid test” of GDPR since the law became effective in May
|
|
|
|
|
2018-10-03 10:23:02 |
IT forensic tools: How to find the right one for each incident (lien direct) |
Some online resources that will help you find the most suitable IT forensic tools for each case
|
|
|
|
|
2018-10-02 12:12:00 |
Why keeping your cyber-wits about you matters (lien direct) |
>WeLiveSecurity is happy to support the European Cyber Security Month (ECSM) with its own “two cents”, split into four articles over the course of October that will be dedicated to promoting the campaign's goals
|
|
|
|
|
2018-10-01 13:33:05 |
50 million Facebook users affected in breach (lien direct) |
>It has yet to be determined whether the accounts were misused or what information was accessed. In the meantime, you can improve your account security with a few easy steps
|
|
|
|
|
2018-10-01 09:47:03 |
Top tips for protecting your Smart TV (lien direct) |
>The final few months of 2018 will likely be a busy time of year for people and cybercriminals will be no different as they continue to look for weak spots in networks
|
|
|
|
|
2018-09-28 11:34:00 |
Who\'s behind DDoS attacks at UK universities? (lien direct) |
>The timing of the attacks suggests that many attempts to take the networks offline may not necessarily be perpetrated by organized cybercriminal gangs
|
|
|
|
|
2018-09-27 09:57:03 |
LoJax: First UEFI rootkit found in the wild, courtesy of the Sednit group (lien direct) |
>ESET researchers have shown that the Sednit operators used different components of the LoJax malware to target a few government organizations in the Balkans as well as in Central and Eastern Europe
|
Malware
|
APT 28
|
|
|
2018-09-26 13:30:02 |
Twitter patches bug that may have spilled users\' private messages (lien direct) |
The flaw affected one of the platform's APIs between May 2017 and September 10 of this year, when it was patched “within hours”
|
|
|
|
|
2018-09-26 11:59:02 |
Defending your company from cyberattack (lien direct) |
>ESET CTO Juraj Malcho outlines some of the ways in which organizations can reduce their cybersecurity risk
|
|
|
|
|
2018-09-25 12:16:02 |
How to improve hiring practices in cybersecurity (lien direct) |
>Should schools and businesses do more to combat the shortfall of cybersecurity professionals by changing the hiring process for those interested in having a career in the industry?
|
|
|
|
|
2018-09-24 11:56:03 |
The Occasional Orator Part 2 (lien direct) |
>Public speaking and presenting at conferences can be daunting for the majority of people but by including some subtle tricks, the speaker can deliver a stronger message
|
|
|
|
|
2018-09-21 13:02:05 |
Attackers crack Newegg\'s defenses, slurp customers\' credit card data (lien direct) |
>The skimmer, injected into the store's payment page, harvested credit-card details from the store's online customers for more than a month
|
|
|
|
|
2018-09-21 09:58:01 |
DanaBot shifts its targeting to Europe, adds new features (lien direct) |
ESET researchers have discovered new DanaBot campaigns targeting a number of European countries
|
|
|
|
|
2018-09-20 14:05:04 |
Mirai\'s architects avoid prison thanks to work for FBI (lien direct) |
>Instead, the three men will cooperate with law enforcement and the broader research community – an area in which, it turns out, they already have quite some experience
|
|
|
|
|
2018-09-19 12:58:00 |
Fake finance apps on Google Play target users from around the world (lien direct) |
Cybercrooks use bogus apps to phish six online banks and cryptocurrency exchange
|
|
|
|
|
2018-09-18 11:58:02 |
The Occasional Orator Part 1 (lien direct) |
>Speaking at conferences can be daunting for presenters but often it is about striking the right balance between content and delivery
|
|
|
|
|
2018-09-17 12:26:04 |
Bristol airport takes flight screens offline after apparent ransomware attack (lien direct) |
>The screens in “key locations” are back up and running again, while the airport paid no ransom to return its systems to working order
|
Ransomware
|
|
|
|
2018-09-17 09:49:00 |
One in three UK orgs hit by cryptojacking in previous month, survey finds (lien direct) |
>Conversely, only a little over one-third of IT executives believe that their systems have never been hijacked to surreptitiously mine digital currencies
|
|
|
|
|
2018-09-14 09:43:01 |
Russian man accused of running Kelihos botnet pleads guilty (lien direct) |
>In its heyday, Kelihos comprised up to 100,000 compromised devices that were capable of blasting out billions of malware-laden emails every day
|
|
|
|
|
2018-09-13 14:00:01 |
Programmer\'s Day: Resources to audit your code (lien direct) |
Taking advantage of the celebration of the Day of the Programmer, we share some audit tools to evaluate the security of your code
|
|
|
|
|
2018-09-13 12:58:05 |
Kodi add-ons launch cryptomining campaign (lien direct) |
>ESET researchers have discovered several third-party add-ons for the popular open-source media player Kodi being used to distribute Linux and Windows cryptocurrency-mining malware
|
|
|
|
|
2018-09-12 13:36:02 |
Patch Tuesday: Microsoft plugs zero-day hole exploited by PowerPool (lien direct) |
>Microsoft and Adobe have each shipped out their scheduled batches of patches to address security flaws in their respective software
|
|
|
|
|
2018-09-11 12:59:02 |
Abandoning a domain name can come back to bite you, research shows (lien direct) |
>A domain name once left behind can catch up with you – by giving fraudsters access to a treasure trove of sensitive information
|
|
|
|
|
2018-09-10 14:26:01 |
Apple yanks top grossing app from Mac App Store for grabbing private user data (lien direct) |
The several thousand glowing reviews that Adware Doctor had garnered prior to its removal were “likely fake”, researchers say
|
|
|
|
|
2018-09-10 11:26:01 |
100 days of GDPR (lien direct) |
What impact has the new data protection directive had on businesses so far?
|
|
|
|
|
2018-09-07 11:53:01 |
British Airways suffers breach, 380,000 card details stolen (lien direct) |
The UK's flag carrier vows to compensate all customers who will lose out financially due to the incident
|
|
|
|
|
2018-09-06 13:47:00 |
Could home appliances knock down power grids? (lien direct) |
>Far-fetched though it may sound, the answer is yes, according to researchers, who show that electrical grids and smart home appliances could make for a dangerous mix
|
|
|
|
|
2018-09-05 12:57:01 |
PowerPool malware exploits ALPC LPE zero-day vulnerability (lien direct) |
>Malware from newly uncovered group PowerPool exploits zero-day vulnerability in the wild, only two days after its disclosure
|
Malware
Vulnerability
|
|
|
|
2018-09-04 11:56:04 |
Of ML and malware: What\'s in store? (lien direct) |
>All things labeled Artificial Intelligence (AI) or Machine Learning (ML) are making waves, but talk of them in cybersecurity contexts often muddies the waters. A new ESET white paper sets out to bring some clarity to a subject where confusion often reigns supreme
|
|
|
|