What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
itsecurityguru.png 2019-03-25 14:19:02 Hackers could hack defibrillator implants. (lien direct)

A major flaw in defibrillator implants, used by more than 31,000 people in the UK, could allow hackers to take control of the devices and harm patients. The US Department of Homeland Security has issued a warning on devices used to treat patients with heart conditions, stating that an attacker could modify or control a […]

The post Hackers could hack defibrillator implants. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-25 14:18:03 Family Locator, a family tracking app, leaked real-time location data. (lien direct)

A popular family tracking app was leaking the real-time locations of more than 238,000 users for weeks after the developer left a server exposed without a password. Source: Tech Crunch

The post Family Locator, a family tracking app, leaked real-time location data. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-25 14:17:05 FEMA, US Disaster Relief organisation, exposes 2.3 million survivors\' personal details. (lien direct)

Disaster relief org FEMA has admitted, conveniently on a Friday night, to accidentally leaking banking details and other personal information of 2.3 million hurricane and wildfire survivors. Source: The Register

The post FEMA, US Disaster Relief organisation, exposes 2.3 million survivors\' personal details. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-25 14:16:05 RBS customers at risk of cyber attack due to security flaw. (lien direct)

Royal Bank of Scotland (RBS) customers have been put at risk of cyber-attack after being recommended flawed security software. Since January, the banking group has begun to offer its business banking customers a product called Thor Foresight Enterprise free of charge. Security researchers uncovered a flaw in it that made customers less secure. Source: BBC […]

The post RBS customers at risk of cyber attack due to security flaw. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-25 14:15:03 Security Researchers hack Telsa Car at Pwn2Own contest. (lien direct)

A team of security researchers has hacked a Tesla Model 3 car on the last day of the Pwn2Own 2019 hacking contest that was held this week in Vancouver, Canada. Team Fluoroacetate –made up of Amat Cama and Richard Zhu– hacked the Tesla car via its browser. They used a JIT bug in the browser renderer process […]

The post Security Researchers hack Telsa Car at Pwn2Own contest. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-21 17:53:05 $100 million BEC scammer pleads guilty. (lien direct)

Business email compromise (BEC) operation resulted in $100 million in losses to a multinational technology company and a social media firm, according to the US Attorney’s Office. Source: Dark Reading

The post $100 million BEC scammer pleads guilty. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-21 17:53:02 Two new Fin7 malware samples discovered. (lien direct)

Despite the 2018 crackdown on Fin7, the cybercrime group has been ramping up its efforts with two new malware samples and an attack panel. Source: Threatpost

The post Two new Fin7 malware samples discovered. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-21 17:52:03 Your data on health apps is no longer safe, study shows. (lien direct)

A study tested two dozen medicine apps to find out how and where they’re sharing your personal data. Source: Motherboard

The post Your data on health apps is no longer safe, study shows. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-21 17:51:05 Spear phishing relies on spoofing brands. (lien direct)

As phishing attacks become increasingly commonplace, it\'s important to know what to look out for. But not all phishing attacks are the same, and some are far more sophisticated than others. Cybersecurity experts say spear phishing in particular is on the rise. Source: Gizmodo

The post Spear phishing relies on spoofing brands. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-21 17:51:01 Russia takes aim at EU elections. (lien direct)

Russian hackers have targeted European government systems ahead of the EU parliament election, cybersecurity firm FireEye said Thursday. Source: CNBC

The post Russia takes aim at EU elections. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-20 11:29:05 Microsoft remains threat actors favourite. (lien direct)

It should come as no surprise that cybercriminals favored Microsoft Office vulnerabilities in their cyberattacks last year, given the rise in phishing attacks that included rigged Word and Excel Office file attachments. Source: ZDNet

The post Microsoft remains threat actors favourite. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-20 11:29:00 Leave campaign in hot water over spam texts. (lien direct)

The Information Commissioner’s Office (ICO) has fined Brexit Campaign group Vote Leave £40,000 ($53,000) for sending out nearly 200,000 unsolicited text messages. Source: BBC News

The post Leave campaign in hot water over spam texts. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-20 11:28:01 Government needs to do better at email security says NCSC. (lien direct)

Email security in UK government organisations is lagging far behind that of central government, analysis reveals, with less than a third implementing standard protection Source: Computer Weekly

The post Government needs to do better at email security says NCSC. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-20 11:27:01 Google aiding tech support scams via fake eBay Ads. (lien direct)

A fake advertisement in the Google search results has been running for the past week that looked just like a legitimate ad for eBay. When you clicked on it, though, instead of being brought to the auction site you would be shown an incredibly annoying tech support scam that would try to lock up your […]

The post Google aiding tech support scams via fake eBay Ads. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-20 11:26:01 DDoS falls out of fashion. (lien direct)

The average distributed denial-of-service (DDoS) attack size shrunk 85% in the fourth quarter of 2018 following an FBI takedown of “booter,” or DDoS-for-hire, websites, in December 2018, researchers report. Source: Dark Reading

The post DDoS falls out of fashion. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-19 22:58:04 99% Of SMEs Do Not Have Sufficient Skills To Prevent Cyberattacks. (lien direct)

An alarming cybersecurity skills shortage has been exposed with just one in five companies revealed to have sufficient in-house capability to protect critical assets from attack, a study has found. 96% of those hit by a data breach in the last year report that inadequate security testing was at least somewhat responsible for the issue. […]

The post 99% Of SMEs Do Not Have Sufficient Skills To Prevent Cyberattacks. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-19 22:53:03 Proofpoint Research Reveals 65% Increase In Cloud Application Attacks In Q1 2019; 40% Of Attacks Originating From Nigeria. (lien direct)

Proofpoint, Inc., a leading cybersecurity and compliance company, today released its Cloud Application Attack Snapshot: Q1 2019 research, which examined over one hundred thousand cloud application attacks aimed at global organizations between September 2018 and February 2019. Overall, targeting attempts increased by 65 percent during that time period with 40 percent originating in Nigeria. China […]

The post Proofpoint Research Reveals 65% Increase In Cloud Application Attacks In Q1 2019; 40% Of Attacks Originating From Nigeria. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-19 22:51:05 Neustar Named A Leader In IDC MarketScape Worldwide DDoS Prevention Report. (lien direct)

Neustar®, Inc., a trusted, neutral provider of real-time information services, announced today that it has been named a Leader in the IDC MarketScape: Worldwide DDoS Prevention Solutions 2018- 2019 Vendor Assessment (DOC # US43699318 March 2019). In the published excerpt, Neustar\'s advanced features, functionality, detection and mitigation techniques were all cited as strengths within the […]

The post Neustar Named A Leader In IDC MarketScape Worldwide DDoS Prevention Report. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-19 22:50:02 The Biometric Smart Card: Connecting The Digitally Excluded. (lien direct)

By Stan Swearingen, CEO of IDEX Biometrics Digital inclusion is the ability of individuals to access and use information and communication technologies (ICT). Even in today\'s hyper-connected and technologically advanced world, there are still those who struggle to access basic IT and are being excluded as a result. In fact, according to recent research, 11.5m […]

The post The Biometric Smart Card: Connecting The Digitally Excluded. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-19 22:48:01 Over Half Of European Organisations Have Suffered Consequences Caused By At Least One Cyberattack In The Last Two Years. (lien direct)

With the complexity of IT business infrastructure on the rise and the continuously evolving threat landscape, IT decision makers find it increasingly challenging to safeguard their organisations from cyberattacks – more than half of European businesses (54%) have faced at least one cyberattack in the last 24 months which resulted in some sort of disruption […]

The post Over Half Of European Organisations Have Suffered Consequences Caused By At Least One Cyberattack In The Last Two Years. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-15 12:04:04 Cyberfort Group Acquires Defensive Cyber Specialist Auriga Consulting. (lien direct)

The Cyberfort Group has strengthened its end-to-end data security proposition with the acquisition of Auriga Consulting for an undisclosed sum. As a centre of excellence in cyber security, assurance and monitoring services, Auriga offers bespoke solutions in risk and compliance management, cyber design and implementation and cyber monitoring and intelligence. With a track record of […]

The post Cyberfort Group Acquires Defensive Cyber Specialist Auriga Consulting. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-15 12:04:01 New Kaspersky Endpoint Security For Business Provides Security Teams With Greater Control And Automatic Anomaly Detection. (lien direct)

Kaspersky Lab has unveiled the next generation of its endpoint protection with new Kaspersky Endpoint Security for Business. The product features Adaptive Anomaly Control, which intelligently perceives and blocks anomalous applications and user behavior, and offers improved protection from miners and network threats. Kaspersky Endpoint Security for Business now also provides users with a web-based […]

The post New Kaspersky Endpoint Security For Business Provides Security Teams With Greater Control And Automatic Anomaly Detection. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-15 12:03:04 Media Alert: Proofpoint Research Reveals 65% Increase In Cloud Application Attacks In Q1 2019; 40% Of Attacks Originating From Nigeria. (lien direct)

Proofpoint, Inc., a leading cybersecurity and compliance company, today released its Cloud Application Attack Snapshot: Q1 2019 research, which examined over one hundred thousand cloud application attacks aimed at global organizations between September 2018 and February 2019. Overall, targeting attempts increased by 65 percent during that time period with 40 percent originating in Nigeria. China […]

The post Media Alert: Proofpoint Research Reveals 65% Increase In Cloud Application Attacks In Q1 2019; 40% Of Attacks Originating From Nigeria. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-15 11:20:00 Collaborative Work Management Platform Wrike Bolsters Security Offering. (lien direct)

Collaborative work management (CWM) platform Wrike has announced seven new security features, including encryption key management, customized access management and cloud access security broker (CASB) integration support. The company has also earned the ISO/IEC 27001:2013 certification from the British Standards Institution, which ensures that Wrike has an end-to-end security framework and a risk-based approach to […]

The post Collaborative Work Management Platform Wrike Bolsters Security Offering. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-15 11:12:05 Database of around 33 million job profiles in China is accessible online. (lien direct)

A large database with approximately 33 million profiles for people seeking jobs in China has been fully accessible and unprotected online. This information included sensitive information that could have been used for scammers and identity theft. The database was discovered by Sanyam Jain, a security researcher and member of GDI.Foundation, who found the database using the Shodan […]

The post Database of around 33 million job profiles in China is accessible online. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-15 11:12:01 Majority of businesses exploring AI and machine learning. (lien direct)

The use of more artificial intelligence to improve security has been touted for a while. New research from Webroot reveals that a majority of business are now actively exploring the technology. It finds 71 percent of businesses surveyed in the United States plan to use more artificial intelligence and machine learning in their cybersecurity tools this year. […]

The post Majority of businesses exploring AI and machine learning. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-15 11:11:03 Iranian hackers hit personal phone of Benny Gantz. (lien direct)

Iranian hackers in recent months broke into the personal phone of Benny Gantz, a leading candidate in next month\'s elections, and obtained its entire contents, according to a report Thursday. Two senior Shin Bet security service officials approached the Blue and White party chairman last month to inform him that his cellular phone had been […]

The post Iranian hackers hit personal phone of Benny Gantz. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-15 11:10:01 New malware affects e-commerce sites to steal payment data. (lien direct)

The rash of e-commerce sites infected with card-skimming malware is showing no signs of abating. Researchers on Thursday revealed that seven sites-each with more than 500,000 collective visitors per month-have been compromised with a previously unseen strain of sniffing malware designed to surreptitiously swoop in and steal payment card data as soon as visitors make […]

The post New malware affects e-commerce sites to steal payment data. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-15 11:08:04 Chinese online shopping giant exposes millions of user profiles and shopping orders. (lien direct)

Gearbest, a Chinese online shopping giant, has exposed millions of user profiles and shopping orders, security researchers have found. Security researcher Noam Rotem found an Elasticsearch server leaking millions of records each week, including customer data, orders and payment records. The server wasn\'t protected with a password, allowing anyone to search the data. Gearbest ranks as […]

The post Chinese online shopping giant exposes millions of user profiles and shopping orders. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-15 10:59:05 Ransomware attack causes students to lose GCSE coursework. (lien direct)

Hackers have used ransomware to encrypt files at a school, causing it to lose some students’ GCSE coursework. The Sir John Colfox Academy in Bridport, Dorset, said a member of staff mistakenly opened an email containing a virus. The email claimed to be from a colleague at another Dorset school and infected the computer network. […]

The post Ransomware attack causes students to lose GCSE coursework. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-14 11:04:03 Over 6,000 patients in Massachusetts notified of data breach. (lien direct)

Concord, Mass.-based Emerson Hospital sent letters to 6,314 patients alerting them of a May2018 cybersecurity attack that may have affected their information, according to the HIPAA Journal. The security incident, which happened between May 9-17, was the result of a former MiraMed Global Services, a company that helps hospitals collect payments, who sent patient files to […]

The post Over 6,000 patients in Massachusetts notified of data breach. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-14 11:01:02 Outdoor retailer Kathmandu hit by data breach. (lien direct)

Kathmandu, an outdoor wear and equipment retailer, revealed that it suffered a data breach that disclosed its customers\' credit card and personal information. The New Zealand-based company stated that unknown intruders allegedly gained access to its online trading website for over a month between January 8, 2019, and February 12, 2019. Kathmandu stated the hackers […]

The post Outdoor retailer Kathmandu hit by data breach. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-14 11:01:01 Australian man arrested after selling account details for Netflix, Hulu and Spotify. (lien direct)

A Sydney man has been arrested after allegedly selling hundreds of thousands of compromised account details for subscription streaming services, including for Netflix, Hulu and music streaming service Spotify – raking in about $212,000 ($300,000 AUD) in profit in the process. The Australian Federal Police (AFP) were tipped off to the 21-year-old malefactor\'s alleged activities […]

The post Australian man arrested after selling account details for Netflix, Hulu and Spotify. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-14 10:57:04 Facebook says its outage was not caused by DDoS attack. (lien direct)

A slew of Facebook-owned sites are experiencing a worldwide outage, leaving thousands of users unable to connect to social media for several hours. Facebook, Messenger, and Instagram have all been having issues since around noon (ET), in some cases resulting in a \'total blackout.\' The three apps crashed primarily in major urban areas across the United States and […]

The post Facebook says its outage was not caused by DDoS attack. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-13 12:06:01 March edition of Microsoft Patch Tuesday lists fixes for 64 vulnerabilities. (lien direct)

The March edition of Patch Tuesday includes fixes for 64 CVE-listed vulnerabilities, while Adobe addressed a pair of bugs in Photoshop and Digital Editions. Even SAP has got in on the game. DHCP flaws headline Patch Tuesday priorities. Of the 64 bugs squashed in Redmond’s March update, researchers are pointing to five particular bugs as […]

The post March edition of Microsoft Patch Tuesday lists fixes for 64 vulnerabilities. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-13 12:05:00 New variant of Ursnif banking Trojan discovered by Cybereason. (lien direct)

A new variant of an infamous banking Trojan malware with a history going back over ten years has emerged with new tactics to ensure it’s harder to detect. The malware aims to hunt out financial information, usernames, passwords and other sensitive data. The Ursnif banking Trojan is one of the most popular forms of information-stealing malwaretargeting […]

The post New variant of Ursnif banking Trojan discovered by Cybereason. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-13 12:04:00 Phishing scams impact students of Central Michigan University. (lien direct)

Many students of the Central Michigan University were hacked after they opened emails having the bright blue button which says “click here to read message”, and then inevitably clicks them. The emails look like being sent by somebody already known to the student, as the subject line was already exchanged previously with that person. “One […]

The post Phishing scams impact students of Central Michigan University. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-13 11:58:00 Flaw found in Swiss electronic voting systems. (lien direct)

The Swiss Federal Chancellery (SFC) on Tuesday said security researchers have found an fascinating flaw in the Swiss Post’s e-voting system as part of an ongoing penetration test. Said flaw, if successfully exploited by miscreants, would prevent officials from detecting unauthorized changes to citizens’ electronically-cast votes. Swiss authorities released the source code of their computer-based voting system and began […]

The post Flaw found in Swiss electronic voting systems. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-13 11:52:04 New strain of ransomware spreads using NSA\'s EternalBlue exploit. (lien direct)

A new Ransomware-as-a-Service called Yatron is being promoted on Twitter that plans on using the EternalBlue and DoublePulsar exploits to spread to other computer on a network. This ransomware will also attempt to delete encrypted files if a payment has not been made in 72 hours. BleepingComputer was first notified about the Yatron RaaS by a […]

The post New strain of ransomware spreads using NSA\'s EternalBlue exploit. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-12 11:49:04 Over half a million people in Michigan affected by healthcare data breach. (lien direct)

The state now says more than 600,000 people might have been affected by a health care data breach. Michigan Attorney General Dana Nessel says the breach involving Wolverine Solutions Group impacted customers with several health systems. Those include Blue Cross Blue Shield of Michigan, McLaren Health Care and others. Wolverine Solutions Group says the ransomware got […]

The post Over half a million people in Michigan affected by healthcare data breach. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-12 11:47:02 Ransomware on the rise, according to Forrester. (lien direct)

Ransomware may be poised to return as a top scourge for companies, as more and more of them pay up after an attack in an effort to minimize the cost of recovery. That\'s just one insight gleaned from an interview at RSA Conference 2019 last week with Josh Zelonis, senior analyst at Forrester Research. Threatpost […]

The post Ransomware on the rise, according to Forrester. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-12 11:44:02 President Trump proposing $9.6 billion in 2020 budget for cybersecurity. (lien direct)

President Donald Trump has revealed his proposed budget for the 2020 fiscal year, which “supports the creation” of Space Force (USSF) as the sixth branch of the armed forces. The White House also hopes to bolster cybersecurity and NASA exploration missions. The administration wants to increase Department of Defense spending by five percent to $718 billion. It’s earmarking more than $9.6 billion to […]

The post President Trump proposing $9.6 billion in 2020 budget for cybersecurity. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-12 11:43:01 Slack being used by cybercriminals to hide malware. (lien direct)

A group of hackers is using a previously undocumented backdoor program designed to interact with attackers over Slack. While abusing legitimate services for malware command-and-control purposes is not a new development, this is the first time researchers have seen Slack, a popular enterprise collaboration tool, being used in this way. The backdoor was detected by […]

The post Slack being used by cybercriminals to hide malware. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-12 11:40:03 Misconfigured Box accounts lead to sensitive data leak. (lien direct)

Security researchers have found dozens of companies inadvertently leaking sensitive corporate and customer data because staff are sharing public links to files in their Box  enterprise storage accounts that can easily be discovered. The discoveries were made by Adversis, a cybersecurity firm, which found major tech companies and corporate giants had left data inadvertently exposed. Although data […]

The post Misconfigured Box accounts lead to sensitive data leak. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-11 14:54:03 Things To Know Before Developing Intelligence Requirements. (lien direct)

Written by Mike Mimoso, Editorial Director, Flashpoint To state the obvious, proper intelligence requirements must be in place before data collection, analysis, and consumption of intel can happen. These requirements are critical because they enable an organisation to choose and prioritise its intelligence goals, determine what information it needs to collect and from what sources […]

The post Things To Know Before Developing Intelligence Requirements. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-11 14:48:05 Security teams woefully understaffed. (lien direct)

As emerging technology and threat landscapes experience rapid transformation, the skillsets need to change as well. 80 percent of 336 IT security professionals Dimensional Research polled on behalf of Tripwire believe it\'s becoming more difficult to find skilled cybersecurity professionals, and nearly all respondents (93 percent) say the skills required to be a great security […]

The post Security teams woefully understaffed. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-11 14:47:02 Zero-day discovered in Chrome and Windows 7. (lien direct)

Earlier this week Google released an update for the Chrome web browser that it urged users to ensure was implemented immediately. That was because the Threat Analysis Group at Google had uncovered a critical zero-day vulnerability that was already being exploited in the wild. Now a Google security engineer, Clement Lecigne, has warned that another zero-day vulnerability […]

The post Zero-day discovered in Chrome and Windows 7. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-11 14:46:05 Phishing attacks attacking healthcare organisations. (lien direct)

Many healthcare organizations remain vulnerable to phishing attacks, a new study finds. When researchers sent simulated phishing emails, nearly one in seven of the messages were clicked by employees of healthcare systems, according to the report published in JAMA Network Open. “Cybersecurity is a really important issue for hospitals and healthcare organizations and it\'s only […]

The post Phishing attacks attacking healthcare organisations. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-11 14:46:01 Software company disclose data breach. (lien direct)

American software company Citrix disclosed a security breach during which hackers accessed the company’s internal network. In a short statement posted on its blog, Citrix Chief Security Information Officer Stan Black said Citrix found out about the hack from the FBI earlier this week. “On March 6, 2019, the FBI contacted Citrix to advise they had reason […]

The post Software company disclose data breach. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-11 14:45:05 Mass protest against cyber-security bill in Russia. (lien direct)

Thousands of people in Russia have protested against plans to introduce tighter restrictions on the internet. A mass rally in Moscow and similar demonstrations in two other cities were called after parliament backed the controversial bill last month. The government says the bill, which allows it to isolate Russia’s internet service from the rest of […]

The post Mass protest against cyber-security bill in Russia. appeared first on IT Security Guru.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21

Information mise à jours le: 2019-03-26 04:01:32
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Notre RSS (filtré) Twitter