Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2016-06-28 09:30:23 |
Malicious scripts in compromised websites and how to protect yourself (lien direct) |
Some of the most dangerous vectors used by cybercriminals are those that involve scripts, since they are difficult for users to detect, says Josep Albors. |
|
|
|
|
2016-06-27 12:16:11 |
Cash machines turn 49 today: Are ATMs really that secure? (lien direct) |
Forty-nine years after the first ATM was installed in London, we ask how secure our cash machines are today? |
|
|
|
|
2016-06-27 11:23:02 |
The security review: The 5 most common reasons for corporate data loss (lien direct) |
Welcome to this week's security review, which includes an in-depth discussion of the most common reasons for corporate data loss. |
|
|
|
|
2016-06-24 13:48:31 |
Cyberattacks should be included in international humanitarian law (lien direct) |
The seriousness of cyberattacks is such that it should be included in international humanitarian law, a new report from the Global Commission on Internet Governance has said. |
|
|
|
|
2016-06-23 14:45:23 |
Google makes two-step verification easier (lien direct) |
Google has just introduced a new feature for users to make its two-step verification (2SV) process easier. |
|
|
|
|
2016-06-22 12:45:18 |
Facebook\'s Mark Zuckerberg \'tapes over webcam\' (lien direct) |
A Facebook post from Mark Zuckerberg 'reveals' that he is serious about security, as it seems to show that his webcam is covered up with tape. |
|
|
|
|
2016-06-21 11:30:46 |
The 5 most common reasons for corporate data loss (lien direct) |
ESET's Josep Albors takes a look at the main reasons for corporate data loss, which include undetected drives and devices being dropped from height. |
|
|
|
|
2016-06-20 15:36:56 |
UK MPs call for tougher sanctions against cybercriminals (lien direct) |
Individuals convicted of unlawfully obtaining or selling personal data should serve up to two years in prison, according to a new report from the UK's culture, media and sports committee. |
|
|
|
|
2016-06-20 10:00:26 |
The security review: Nemucod, cyberbullying and Windows 10 one year on (lien direct) |
Welcome to this week's security review, which includes detail on the evolution of Nemucod and thoughts on Windows 10 one year on from its launch. |
|
|
|
|
2016-06-17 13:36:58 |
T-Mobile Czech Republic \'suffers data leak\' (lien direct) |
T-Mobile Czech Republic has experienced a data leak, affecting 1.5 million of its customers, it has been claimed by local media. |
|
|
|
|
2016-06-17 08:30:41 |
Do you know if your child is being cyberbullied? These are the red flags (lien direct) |
As June 17th is Stop Cyberbullying Day, we have prepared a list of indicators that can help parents recognize whether their offspring is being cyberbullied. |
|
|
|
|
2016-06-16 11:30:34 |
Comparing dads across nations: Who has the strictest parents? (lien direct) |
Which country has the strictest parents? ESET's recent survey tests whether old stereotypes ring true in the digital era. |
|
|
|
|
2016-06-15 10:30:30 |
VerticalScope experiences major data breach: 45 million records stolen (lien direct) |
VerticalScope has experienced a major data breach, with cybercriminals making off with over 45 million records belonging to over 1,100 websites, it has been reported. |
|
|
|
|
2016-06-14 11:44:48 |
Apple looks into the benefits of differential privacy (lien direct) |
Differential privacy is going to be key to how Apple collects, stores and uses data, the tech giant revealed during its Worldwide Developers Conference. |
|
|
|
|
2016-06-13 10:00:26 |
The security review: Ray-Ban scam is back (lien direct) |
Welcome to this week's security review, including news of a returning Ray-Ban scam that has spread from social media to email. |
|
|
|
|
2016-06-10 13:15:21 |
32 million Twitter account credentials up for grabs – but site says it wasn\'t hacked (lien direct) |
Over 30 million Twitter account details are put up for sale on the computer underground. |
|
|
|
|
2016-06-10 09:00:41 |
Hours before Euro 2016, fake websites are still offering overpriced tickets (lien direct) |
Online scammers are trying to take advantage of fans desperately scouring the web for the last few tickets to Euro 2016 via newly created fake websites. |
|
|
|
|
2016-06-09 12:09:27 |
Most organizations unconfident in ability to protect data after breach (lien direct) |
The majority of IT professionals say they are not confident in their ability to keep their organization's data secure following a breach, a Gemalto study has found. |
|
|
|
|
2016-06-08 18:41:24 |
University of Calgary bows down to ransomware demands (lien direct) |
The University of Calgary has handed over $20,000 CND to cybercriminals, who had launched a ransomware attack on the institution. |
|
|
|
|
2016-06-08 11:30:53 |
Crimeware: Malware and massive campaigns around the world (lien direct) |
Cases of malware and crimeware incidents are reported daily around the world. Indeed, the number of reports, detections and threats grows constantly. |
|
|
|
|
2016-06-08 11:12:04 |
IRS\'s new Get Transcript online service benefits from enhanced cybersecurity (lien direct) |
The Internal Revenue Service (IRS) in the US has relaunched its Get Transcript online service, which it says is delivers enhanced cybersecurity. |
|
|
|
|
2016-06-07 22:11:13 |
Mandatory password reset for some Facebook and Netflix users in wake of mega-breaches (lien direct) |
Don't panic. Facebook and Netflix have not suffered a data breach. But it's quite possible that they are asking you to change your password. |
|
|
|
|
2016-06-07 16:45:58 |
Is the federal government doing enough to catch and prosecute computer criminals? (lien direct) |
With ransomware running rampant we asked Americans if they thought the US federal government was doing enough to catch and prosecute computer criminals. |
|
|
|
|
2016-06-07 11:30:41 |
Infrastructure attacks: The next generation (lien direct) |
ESET's David Harley revisits the Stuxnet phenomenon: How has the way we see the malware and its impact changed? |
|
|
|
|
2016-06-06 11:44:04 |
The security review: Crouching Tiger, Hidden DNS (lien direct) |
Welcome to this week's security review, including the story of a DNS hijack that sets the victim's computer to use specific DNS servers. |
|
|
|
|
2016-06-03 12:19:25 |
Nearly all phishing emails now contain ransomware (lien direct) |
As many as 93% of all phishing emails now contain ransomware, according to a new report by PhishMe. |
|
|
|
|
2016-06-02 16:52:23 |
Beware online fraudsters jumping on the back of recent data breaches (lien direct) |
The Internet Crime Complaint Center (IC3) has issued a public service announcement warning people about online fraudsters, who are attempting to exploit a recent spate of data breaches that have only just come to light. |
|
|
|
|
2016-06-02 12:30:39 |
Crouching Tiger, Hidden DNS (lien direct) |
An interesting DNS hijack that sets the victim's computer to use specific DNS servers has emerged. Here are the key details of this intriguing threat. |
|
|
|
|
2016-06-02 10:36:02 |
Network ELOFANTS and other insider threat insights from the DBIR and beyond (lien direct) |
An ELOFANT is an "Employee Left Or Fired, Access Not Terminated" and these ghost account insiders can undermine your organization's information security, as recent DBIR stats suggest. |
|
|
|
|
2016-06-01 12:10:59 |
Myspace data breach: 360 million accounts affected (lien direct) |
Myspace has revealed that it was the victim of a data breach. The incident took place a few years ago and is thought to have affected close to 360 million accounts. |
|
|
|
|
2016-06-01 11:30:12 |
Children\'s Day advice: The risks looming in cyberspace (lien direct) |
For many parents, especially those who aren't digital natives, recognizing risks that loom in cyberspace is not easy. This guide helps point to some of the main threats. |
|
|
|
|
2016-05-30 13:33:09 |
65 million Tumblr users should probably be careful… (lien direct) |
65 million Tumblr users have had their details compromised as a result of a recently-discovered breach dating back to 2013. But it's not just their passwords that they should be concerned about. |
|
|
|
|
2016-05-28 10:34:22 |
What the CISSP? 20 years as a Certified Information Systems Security Professional (lien direct) |
Reflecting on 20 years of CISSP, the Certified Information Systems Security Professional qualification from (ISC)2, the International Information System Security Certification Consortium. |
|
|
|
|
2016-05-26 15:30:00 |
Another malware wave hits Europe, mainly downloading ransomware Locky (lien direct) |
ESET LiveGrid® telemetry shows a spike in detections of the JS/Danger.ScriptAttachment malware in several European countries. |
|
|
|
|
2016-05-26 11:30:12 |
Beware Burger King WhatsApp scam: It\'s a trap (lien direct) |
Just when it seemed that the recent raft of WhatsApp scams were coming to a close, we have discovered a new one. This time it involves Burger King. |
|
|
|
|
2016-05-25 12:30:15 |
Expert insight from the author of the ESET TeslaCrypt decryptor (lien direct) |
WeLiveSecurity sits down with Igor Kabina, the ESET malware researcher who ultimately created the universal ESET TeslaCrypt decryption tool. |
|
Tesla
|
|
|
2016-05-25 11:30:15 |
Don\'t want ransomware to rock your universe? Add this to your towel (lien direct) |
These days, it is not Vogon poetry that's the most widespread risk one can encounter in the universe, but rather ransomware, explains ESET's Ondrej Kubovič. |
|
|
|
|
2016-05-24 15:51:09 |
SWIFT announces security boost to thwart cyberattacks (lien direct) |
Following a spate of recent incidents involving some of its customers, SWIFT has announced new measures it is looking to implement to keep cyberattacks at bay. |
|
|
|
|
2016-05-24 11:30:01 |
Critical infrastructure: It\'s time to make security a priority (lien direct) |
The importance of ensuring information security on critical infrastructure has been recognized for years, yet there are still cases that illustrate the need for improvement. |
|
|
|
|
2016-05-23 21:33:04 |
Teenager charged over Mumsnet hack and DDoS attack (lien direct) |
An 18-year-old man has been charged by British police in connection with an internet attack that saw Mumsnet hacked, users' accounts breached, passwords stolen, and the site blasted offline. |
|
|
|
|
2016-05-23 11:30:28 |
Tech support scams go with a Bing (lien direct) |
Microsoft takes a shot at preventing support scammers from exploiting Bing Ads, explains David Harley, senior research fellow at ESET. |
|
|
|
|
2016-05-23 11:00:33 |
Financial institutions \'need to prioritize\' cybersecurity (lien direct) |
Financial institutions need to put cybersecurity at the top of their agenda, according to a new report titled Cyber and the City. |
|
|
|
|
2016-05-23 10:00:56 |
The security review: ESET release decryptor for TeslaCrypt ransomware (lien direct) |
Welcome to this week's security review, which includes ESET releasing a new decryptor for TeslaCrypt ransomware, new revelations about a 2012 LinkedIn data breach and expert insight into Operation Groundbait. |
|
Tesla
|
|
|
2016-05-20 11:30:58 |
Will we ever fix \'broken\' USB stick security? (lien direct) |
As a recent study finds that half of people plug in USB sticks found at their work's car parking lot, we ask if the USB security threat will ever go away. |
|
|
★★★★
|
|
2016-05-20 08:05:23 |
Millions of people compromised by 2012 LinkedIn data breach (lien direct) |
Hundreds of millions of emails and passwords belonging to LinkedIn members have been put online for sale, it has been revealed. |
|
|
|
|
2016-05-19 10:00:46 |
Metadata from phone calls \'reveals personal information\' (lien direct) |
Metadata that is generated through phone calls discloses a significant amount of personal information, a new study from Stanford University in the US has found. |
|
|
|
|
2016-05-18 18:51:25 |
ESET releases decryptor for recent variants of TeslaCrypt ransomware (lien direct) |
Have you been infected by one of the new variants (v3 or v4) of notorious ransomware TeslaCrypt? If your encrypted files had the extensions .xxx, .ttt, .micro, .mp3 or left unchanged, then ESET has good news for you. Recently, TeslaCrypt's operators have announced they are wrapping up their malevolent activities. On this occasion one of |
|
Tesla
|
|
|
2016-05-18 11:30:02 |
Jigsaw ransomware 2.0: A fake or work in progress? (lien direct) |
Jigsaw 2.0 is not fully-fledged ransomware, but it does try to feed off of ransomware's current popularity amongst cybercriminals, writes ESET's Ondrej Kubovič. |
|
|
|
|
2016-05-18 10:35:19 |
Android apps \'need to follow better security practice\' (lien direct) |
Many Android apps in Google Play are still not following best practice when it comes to authentication and authorization. |
|
|
|
|
2016-05-17 15:33:11 |
Cybercrime on the rise as economic crime \'goes digital\' (lien direct) |
Incidents of cybercrime are on the rise, with a new study from PwC reporting it as the “only economic crime to have registered an increase”. |
|
|
|