What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Blog.webp 2017-05-05 19:48:21 Google Docs Scam Highlights Phishing\'s Low, Low Bar (lien direct) In-brief: There were a thousand reasons not to click on that Google Docs link…but thousands of people did anyway. Why? Two days ago, I was one of thousands of Google users who received a super squirrel-y email message with a link to what appeared to be a Google Doc. I declined to click on that link for about 1,000 different reasons, some of...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/310675904/0/thesecurityledger -->»      Related StoriesGoogle Looks Beyond Passwords To Secure Data, AssetsAnalysis of 85K Remote Desktop Hacks Finds Education, Healthcare Top TargetsThe Billion Dollar Headache: Sophisticated Ransomware takes aim at Small Business 
Blog.webp 2017-05-04 17:08:14 Report warns of Robot Hacks, Tampering (lien direct) In-brief: Common industrial robots are susceptible to hacks and other forms of electronic hacking that could cause physical harm to workers or result in flawed and dangerous products. Trend Micro issued a report Wednesday warning that common industrial robots are susceptible to hacks and other forms of electronic hacking that could cause physical...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/309030217/0/thesecurityledger -->»      Related StoriesCode Tutorials Spread Application Flaws Far and WidePodcast: Hack, or Phreak – What Really Happened in Dallas?Estonia 10 Years Later: Lessons learned from the World’s First Internet War 
Blog.webp 2017-05-02 22:54:54 Info on Intel Flaw Followed Offer of Cash Bounty (lien direct) In-brief: the disclosure of a critical flaw in remote management software by Intel followed the company’s move, in March, to begin offering cash bounties for information about software vulnerabilities, an Intel spokesman confirmed.  The disclosure of a critical flaw in remote management software by Intel followed soon after the...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/307124614/0/thesecurityledger -->»      Related StoriesAnalysis of 85K Remote Desktop Hacks Finds Education, Healthcare Top TargetsPodcast: Hack, or Phreak – What Really Happened in Dallas?Seven Years After Stuxnet, Industrial Firms Still Lag on Security 
Blog.webp 2017-05-02 18:19:25 New Shodan Module hunts RATs (lien direct) In-brief: a new service built into Internet of Things search engine Shodan promises to find the computers that control remote access trojans (RATs) – a common form of information stealing malware.  A new service from Internet of Things search engine Shodan promises to find computers infected with remote access trojans (or RATs). The...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/306906414/0/thesecurityledger -->»      Related StoriesAnalysis of 85K Remote Desktop Hacks Finds Education, Healthcare Top TargetsGoogle Looks Beyond Passwords To Secure Data, AssetsLeaked CIA Tools Linked to Known Cyber Espionage Group | Symantec 
Blog.webp 2017-05-02 13:28:52 Updated: Intel Fixes \'Nightmarish\' Firmware Flaw But Nobody\'s Safe (lien direct) In-brief: Intel issued a patch for a serious vulnerability in firmware that has shipped with its chipsets for almost nine years, but it could take months for patches to reach affected customers from OEMs. (Editor’s note: updated with analysis from Matthew Garrett. PFR May 2, 2017.) Intel released a patch for a serious and remotely...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/306690346/0/thesecurityledger -->»      Related StoriesDHS warns of BrickerBot Threat to Internet of ThingsSeven Years After Stuxnet, Industrial Firms Still Lag on SecurityWiFi Chip Flaw in iPhone is Really Bad News for IoT 
Blog.webp 2017-04-28 19:52:12 Estonia 10 Years Later: Lessons learned from the World\'s First Internet War (lien direct) In-brief: Gadi Evron recalls the denial of service attacks aimed at the government of Estonia in 2007 – one of the first recognized acts of ‘cyber war’ and a template for incidents that followed. Evron says there were many lessons in that incident – some of which the U.S. and its allies are still struggling to learn.  Ten...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/302281358/0/thesecurityledger -->»      Related StoriesPodcast: Hack, or Phreak – What Really Happened in Dallas?Podcast: Facebook Makes a Stand. But can Fake News be stopped?Analysis of 85K Remote Desktop Hacks Finds Education, Healthcare Top Targets 
Blog.webp 2017-04-27 11:26:45 Report: we\'ll know antivirus is dead when it goes quiet (lien direct) In-brief: anti-virus software may go out with neither a bang nor a whimper – but utter silence. That’s if the trend towards cyber criminal actors using file-less malware continues, according to a new report.  Antivirus software may go out with neither a bang nor a whimper, but utter silence, according to a new report by the firm...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/300891133/0/thesecurityledger -->»      Related StoriesAnalysis of 85K Remote Desktop Hacks Finds Education, Healthcare Top TargetsEmboldened, Fancy Bear hacking crew targets French, German PoliticiansSeven Years After Stuxnet, Industrial Firms Still Lag on Security  APT 28
Blog.webp 2017-04-26 21:47:58 Analysis of 85K Remote Desktop Hacks Finds Education, Healthcare Top Targets (lien direct) In-brief: An analysis of 85,000 hacked Remote Desktop Protocol servers from the cyber criminal marketplace xDedic shows that education and healthcare networks were the most often targeted by hackers, who often used brute force password guessing to gain access.  Hackers are targeting vulnerable remote desktop protocol (RDP) deployments to gain...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/300249042/0/thesecurityledger -->»      Related StoriesPodcast: Hack, or Phreak – What Really Happened in Dallas?Seven Years After Stuxnet, Industrial Firms Still Lag on SecurityEmboldened, Fancy Bear hacking crew targets French, German Politicians  APT 28
Blog.webp 2017-04-25 22:34:41 Chinese and Russian Hackers Mining Shadow Brokers Release (lien direct) In-brief: Chinese and Russian hacking crews are making short work of a clutch of new hacking tools released by the group Shadow Brokers and purportedly stolen from the NSA. Attacks using the tools may already be taking place.  Chinese and Russian hacking crews are making short work of a clutch of new hacking tools released by the group Shadow...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/299050208/0/thesecurityledger -->»      Related StoriesGoogle Looks Beyond Passwords To Secure Data, AssetsCode Tutorials Spread Application Flaws Far and WideSurvey Finds Breaches depress Share Price – a lot | Digital Guardian 
Blog.webp 2017-04-25 15:11:55 Update: Emboldened, Fancy Bear hacking crew targets French, German Politicians (lien direct) In-brief: emboldened by media attention for its escapades in the U.S. Presidential election, the hacking crew known as “Fancy Bear” is targeting political parties in France as well as Germany, the firm Trend Micro reported on Tuesday – the latest evidence of meddling in foreign affairs. (Editor’s note: updated to add...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/298666506/0/thesecurityledger -->»      Related StoriesAs Trump and Xi Meet, Reports of China-Sponsored Hacks Flare | Digital GuardianPodcast: Hack, or Phreak – What Really Happened in Dallas?Podcast: Facebook Makes a Stand. But can Fake News be stopped?  APT 28
Blog.webp 2017-04-24 22:28:16 Podcast: Passwords are dying, but they\'re not going anywhere (lien direct) In-brief: Companies like Microsoft and Google have both unveiled initiatives that de-emphasize the traditional, static, alpha-numeric password in recent days. So is the password going the way of the horse and buggy? Don’t be so sure, says Robert Capps of the firm NuData. Capps thinks that passwords will be with us for the foreseeable future...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/297906300/0/thesecurityledger -->»      Related Stories300 Billion Passwords? Internet of Things Growth poses Unprecedented Threat by 2020Google Looks Beyond Passwords To Secure Data, AssetsPodcast: Hack, or Phreak – What Really Happened in Dallas? 
Blog.webp 2017-04-21 22:23:05 Google Looks Beyond Passwords To Secure Data, Assets (lien direct) In-brief: Google is pushing an approach to network security dubbed “tiered access,” demoting the trusted password, which is now just one piece of data that is needed to get access to sensitive data and resources on Google’s network.  The status of the lowly password is falling a bit lower in the hallowed halls of Google, where...Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/295783494/0/thesecurityledger -->»      Related StoriesPodcast: Facebook Makes a Stand. But can Fake News be stopped?Analysis of 85K Remote Desktop Hacks Finds Education, Healthcare Top TargetsEmboldened, Fancy Bear hacking crew targets French, German Politicians  APT 28
Last update at: 2024-04-28 04:07:47
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter