What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
SecurityAffairs.png 2019-01-14 05:43:03 Which is the link between Ryuk ransomware and TrickBot? (lien direct)

FireEye and CrowdStrike discovered that threat actors behind the Ryuk ransomware are working with another cybercrime gang to gain access to target networks. In August 2018, security experts from Check Point uncovered a ransomware-based campaign aimed at organizations around the world conducted by North Korea-linked threat actor. This is the first time that a security firm […]

The post Which is the link between Ryuk ransomware and TrickBot? appeared first on Security Affairs.

SecurityThroughEducation.PNG 2019-01-14 05:05:02 Ep. 113 – Nutrition Facts for Online Information with Clint Watts (lien direct)

Misinformation is a powerful tool. As we enter 2019 we invite on a fascinating guest, Clint Watts, who has spend his career learning all about how to use it and how it is used. – Jan 14, 2019 Contents Download Get Involved Download Ep. 113 – Nutrition Facts for Online Information with Clint Watts Get […]

The post Ep. 113 – Nutrition Facts for Online Information with Clint Watts appeared first on Security Through Education.

bleepingcomputer.png 2019-01-14 03:00:04 Windows 7 KMS Activation Issues Caused by Microsoft Mistake, Not an Update (lien direct)

On January 8th, 2019, Windows 7 machines that were activated through Key Management Service started receiving a "Windows is not genuine" error indicating that the license is not valid. It turns out this this problem was not related to a January Patch Tuesday update, but rather caused by a problem on Microsoft\'s activation server. [...]

CSO.png 2019-01-14 03:00:00 How to protect backups from ransomware (lien direct)

Despite a recent decline in attacks, ransomware still poses significant threats to enterprises, as the attacks against several major newspapers demonstrated this month. It is also becoming more capable. In particular, ransomware writers are aware that backups are an effective defense and are modifying their malware to track down and eliminate the backups.

To read this article in full, please click here

zataz.png 2019-01-13 21:12:01 Fuite de données corrigée pour l\'agence d\'intérim Mister Temp (lien direct)

Après l’intervention d’un cyber chercheur et du protocole ZATAZ, le portail Mister Temp, une agence d’intérim en ligne, bouche une fuite de données à partir d’un espace de stockage mal sécurisé. Fuite pour une agence d’intérim en ligne ! Il y a des Protocoles d’al...

Cet article Fuite de données corrigée pour l’agence d’intérim Mister Temp est apparu en premier sur ZATAZ.

datasecuritybreach.png 2019-01-13 20:40:00 System Down pour les distributions Linux (lien direct)

Plusieurs vulnérabilités, baptisées System Down, découvertes dans plusieurs distributions Linux. Le laboratoire de la société Qualys vient de révéler trois vulnérabilités exploitables localement dans systemd-journald, un composant central présent dans toutes les distributions Linux. Ces vulnérabilité sont baptisée " System Down " en référence au groupe de Rock, System of a Down. L\'avis de sécurité complet est ici. […]

datasecuritybreach.png 2019-01-13 20:30:02 Vulnérabilités pour les caméras de surveillance Guardzilla Indoor Security (lien direct)

Des experts en cybersécurité passent au banc d\'essai la caméra de surveillance pour la maison, Guardzilla Indoor Security. Ils découvrent de nombreuses vulnérabilités. Guardzilla produit des caméras de surveillance, discrètes, faciles à utiliser et à installer à la maison. Il s’agit de produits très abordables dont l’objectif principal est de fournir une sécurité physique contre […]

zataz.png 2019-01-13 20:25:05 Lien dangereux sur le site d\'American Express France (lien direct)

Le site web d’American Express propose un lien qui pourrait être exploité à des fins malveillantes. Prudence si vous êtes client d’Amex. Un lecteur, Aziz, vient de me faire constater un problème particulièrement dangereux pour les clients d’American Express. Les porteurs de cette c...

Cet article Lien dangereux sur le site d’American Express France est apparu en premier sur ZATAZ.

zataz.png 2019-01-13 17:43:04 4 jours de panne après un piratage chez Domaine.fr (lien direct)

Depuis vendredi 4 janvier 2019, le site domaine.fr souffrait d’un gros problème. Plus possible d’utiliser le service de SMTP. Un pirate était passé par là ! Les clients du site Domaine.fr ont du s’en rendre compte. Depuis le 4 janvier 2019, très compliqué d’envoyer des courri...

Cet article 4 jours de panne après un piratage chez Domaine.fr est apparu en premier sur ZATAZ.

zataz.png 2019-01-13 17:10:03 Fuite de donnés chez Allobébé ? ZATAZ vous révèle la vente d\'infos dans le black market (lien direct)

La société AlloBébé alerte ses clients d’une fuite de données. Un phishing aux couleurs de la FNAC aurait permis la mise en place du piège. ZATAZ vous révélé la vente d’informations clients Allobébé dans le black market. La société AlloBébé diffuse, depuis le 10 janvier, un courriel inté...

Cet article Fuite de donnés chez Allobébé ? ZATAZ vous révèle la vente d’infos dans le black market est apparu en premier sur ZATAZ.

datasecuritybreach.png 2019-01-13 17:05:03 47 vulnérabilités dont 7 critiques corrigées en janvier 2019 (lien direct)

De taille moyenne, le premier Patch Tuesday de l’année 2019 permet de résoudre 47 vulnérabilités dont seulement 7 sont considérées comme critiques. 26 de ces vulnérabilités concernent les serveurs Windows et des systèmes d’exploitation pour postes de travail. Deux des vulnérabilités critiques concernent Hyper-V et pourraient conduire à l’exécution de code à distance (RCE) sur le […]

Blog.png 2019-01-13 15:59:03 Windows Applocker Policy – A Beginner\'s Guide (lien direct)

Hello Friends!! This article is based on “Microsoft Windows – Applocker Policy” and this topic for System Administrator, defines the AppLocker rules for your application control policies and how to work with them. Table of Content Introduction to Applocker What is applocker Policy? Who Should Use AppLocker? What can your rules be based upon? Configure... Continue reading

The post Windows Applocker Policy – A Beginner\'s Guide appeared first on Hacking Articles.

datasecuritybreach.png 2019-01-13 15:50:05 10 ans de prison pour des DDoS à l\'encontre d\'hôpitaux (lien direct)

Un internaute de 34 ans condamné à 10 ans de prison pour avoir lancé des attaques de DDoS, sous le masque Anonymous. Ils voulaient punir des centres de soins américains. Dix ans de prison pour un DDoS critique ! Toute l’affaire débute en avril 2014. Un internaute, s’annonçant comme membre Anonymous, lance plusieurs attaques informatiques […]

SecurityAffairs.png 2019-01-13 15:43:01 Security Affairs newsletter Round 196 – News of the week (lien direct)

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Let me inform you that my new book, “Digging in the Deep Web” is online with a special deal 20% discount Kindle Edition Paper Copy Once again thank you! Blur data leak potentially exposed data of 2.4 […]

The post Security Affairs newsletter Round 196 – News of the week appeared first on Security Affairs.

Pirate.png 2019-01-13 15:42:05 Gardez vos informations privées avec les outils de confidentialité pour Internet (lien direct)
Peut-être que le Père Noël sait quand vous dormez, quand vous êtes réveillé(e), si vous avez été sage, mais il n\'a rien sur les pouvoirs d\'Internet.
zataz.png 2019-01-13 15:42:00 Piratage d\'un système d\'alerte, le pirate diffuse de faux messages (lien direct)

You\'ve been hacked – Un pirate informatique s’infiltre dans le système d’alerte australien EWN et diffuse des milliers de faux messages aux abonnés. Dans le petit monde du piratage informatique, qui regroupe de plus en plus de personnes que l’on veuille ou non, se cache un gr...

Cet article Piratage d’un système d’alerte, le pirate diffuse de faux messages est apparu en premier sur ZATAZ.

datasecuritybreach.png 2019-01-13 15:31:00 Le baron de la drogue El Chapo utilisait son propre réseau de communication chiffré (lien direct)

Joaquin Guzman, plus connu sous le pseudonyme d’El Chapo, l’un des plus important baron de la drogue utilisait un réseau de communication chiffré spécialement créé pour lui. Le FBI va réussir à le mettre sur écoute avec l’aide de son administrateur. En informatique, la première faille reste l’humain. Le baron de la drogue mexicain Joaquin […]

datasecuritybreach.png 2019-01-13 15:09:05 Espionnage des vidéos des sonnettes de porte d\'entrée Ring (lien direct)

Les employés de la filiale d’Amazon, Ring, pouvaient consulter les vidéos et photos prises par les sonnettes de portes connectées installées partout dans le monde. Ambiance espionnage pour la société Ring, filiale d’Amazon. Cette société, créée en Ukraine et racheté en 2018 par le géant de la vente en ligne américain (environ 1 milliard de […]

SecurityAffairs.png 2019-01-13 14:42:05 TA505 Group adds new ServHelper Backdoor and FlawedGrace RAT to its arsenal (lien direct)

Proofpoint analyzed two strains of malware tracked as ServHelper and FlawedGrace distributed through phishing campaigns by the TA505 crime gang. Security researchers at Proofpoint researchers discovered two strains of malware tracked as ServHelper and FlawedGrace distributed through phishing campaigns by the TA505 crime gang. The ServHelper is a backdoor, experts analyzed two variants of it, while […]

The post TA505 Group adds new ServHelper Backdoor and FlawedGrace RAT to its arsenal appeared first on Security Affairs.

bleepingcomputer.png 2019-01-13 14:02:00 Mozilla to Disable Flash Plugin by Default in Firefox 69 (lien direct)

Starting in Firefox 69, Mozilla will be disabling support for the Adobe Flash plugin by default. This is being done as part of the roadmap set forth by Mozilla on how they will be ultimately disable all support for Flash in Firefox. [...]

WiredThreatLevel.png 2019-01-13 14:00:00 CES\'s Flying Taxis, and More of This Week\'s Car News (lien direct)

A Hyundai with legs, a Tesla Model S robot death stunt, and all the happenings out of Vegas that you missed.

WiredThreatLevel.png 2019-01-13 14:00:00 Trump\'s Border Wall Tops This Week\'s Internet News Roundup (lien direct)

Last week, the internet was consumed with talk of President Trump\'s attempts to get funding for a wall on the US southern border.

WiredThreatLevel.png 2019-01-13 12:00:00 Dark Matter Hunters Are Looking Inside Rocks for New Clues (lien direct)

Dark matter may occasionally interact with minerals in the earth, leaving traces that physicists hope to decipher.

WiredThreatLevel.png 2019-01-13 12:00:00 The Rise of the Swiss Army Gadget (lien direct)

From mirrors with speakers to picture frame wireless chargers, we\'re deep into the age of multi-function devices.

bleepingcomputer.png 2019-01-13 11:43:05 Microsoft Releases KB4487345 Update to Fix Windows 7 Share Issues (lien direct)

Last week Microsoft released the January 2019 Patch Tuesday updates and included in the release were two updates that caused problems connecting to ntework shares on Windows 7 and Windows Server 2008 R2. On January 11th, Microsoft has released a a stand-alone update that resolves this issue. [...]

TechWorm.png 2019-01-13 08:47:04 10 Best Reddit Clients For Android And Windows (lien direct)

Reddit often referred to as the front page of the internet is one of the most popular social media platforms that is used by millions of users. Anything that you can think of has a subreddit. Reddit makes it easier to interact with like-minded people on the internet. Well, if you have been scouting for some […]

The post 10 Best Reddit Clients For Android And Windows appeared first on TechWorm.

SecurityAffairs.png 2019-01-12 22:14:05 Hacktivist Martin Gottesfeld 10 years in prison for hospital cyberattack (lien direct)

The American hacktivist Martin Gottesfeld (34) has been sentenced to 10 years in prison for carrying out DDoS attacks against two healthcare organizations in the US in 2014. The alleged Anonymous member, Martin Gottesfeld, was accused of launching DDoS attacks against the two US healthcare organizations in 2014, the Boston Children\'s Hospital and the Wayside […]

The post Hacktivist Martin Gottesfeld 10 years in prison for hospital cyberattack appeared first on Security Affairs.

no_ico.png 2019-01-12 19:00:01 Zurich Sued For $100 Million Following NotPetya Attack (lien direct)

Following the news that Mondelez, the US food company that owns the Oreo and Cadbury brands, is suing its insurance company, Zurich, for refusing to pay out on a $100m claim for damage caused by the NotPetya cyber attack, please see below comments from Igor Baikalov, chief scientist at Securonix. Igor Baikalov, Chief Scientist at …

The ISBuzz Post: This Post Zurich Sued For $100 Million Following NotPetya Attack appeared first on Information Security Buzz.

TechWorm.png 2019-01-12 18:50:02 Breaking Bad Mobile Game For Android And iOS Will Put You In Empire Business (lien direct)

Breaking Bad is one of the most popular crime TV series that was initially released almost a decade ago. Sony and FTX Games have announced that this popular TV series will soon be launched as a mobile game. So here’s everything you need to know about the Breaking Bad: Criminal Elements mobile game. ALSO READ: 10 Best Horror Movies […]

The post Breaking Bad Mobile Game For Android And iOS Will Put You In Empire Business appeared first on TechWorm.

bleepingcomputer.png 2019-01-12 18:04:01 The Week in Ransomware - January 11th 2019 - Access-as-a-Service (lien direct)

For the most part it has been a slow this week in terms of new ransomware variants being released. On the other hand, there has been quite a bit of interesting information that was released about Ryuk. [...]

WiredThreatLevel.png 2019-01-12 17:40:02 Ring Security Cam Snooping, Location Tracking, and More Security News This Week (lien direct)

A German hack confession, unencrypted government sites, and more security news this week.

bleepingcomputer.png 2019-01-12 16:39:01 Ryuk Ransomware Partners with TrickBot to Gain Access to Infected Networks (lien direct)

Ryuk has historically been considered a a targeted ransomware where the actors scope out networks in order to gain access and install their ransomware. New research now indicates that the Ryuk actors may be using other malware as an Access-as-a-Service to gain access to networks. [...]

WiredThreatLevel.png 2019-01-12 15:00:00 Space Photos of the Week: The Life and Death of Stars (lien direct)

It\'s gases to gases, dust to dust in cold, dark space. Also, Jupiter has rings.

SecurityAffairs.png 2019-01-12 14:04:03 Rapid7 announced the release of Metasploit 5.0 (lien direct)

Rapid7 announced the release of Metasploit 5.0, the latest version of the popular penetration testing framework that promises to be very easy to use. Rapid7 announced the release of Metasploit 5.0, the new version includes several new important features and, the company believes it will easier to use and more powerful. Most important changes introduced […]

The post Rapid7 announced the release of Metasploit 5.0 appeared first on Security Affairs.

WiredThreatLevel.png 2019-01-12 14:00:00 \'Doctor Who\' Is Reaching a Whole New Audience (lien direct)

The BBC series recently completed its first season with Jodie Whittaker as the titular Doctor-a welcome addition to the franchise.

no_ico.png 2019-01-12 13:42:05 Unprotected MongoDB Exposes Over 200 Million Resumes (lien direct)

A huge MongoDB database containing over 200 million records with resumes from job seekers in China was left unprotected for at least one week with anyone able to locate it. The size of the cache weighed 854GB. The information exposed this way, 202,730,434 records in total, includes all the details one would expect to see in a resume: personal …

The ISBuzz Post: This Post Unprotected MongoDB Exposes Over 200 Million Resumes appeared first on Information Security Buzz.

WiredThreatLevel.png 2019-01-12 13:00:00 A Flying Tesla? Sure! We Calculate the Power Demands (lien direct)

Elon says he\'d use SpaceX propulsion tech to make a Roadster take flight, and we have thoughts.

bleepingcomputer.png 2019-01-12 12:50:05 Fake Movie File Infects PC to Steal Cryptocurrency, Poison Google Results (lien direct)

A malicious Windows shortcut file posing as a movie via The Pirate Bay torrent tracker can trigger a chain of mischievous activities on your computer, like injecting content from the attacker into high-profile web sites such as Wikipedia, Google and Yandex Search or by stealing cryptocurrency. [...]

WiredThreatLevel.png 2019-01-12 12:00:00 Why Seattle Built-Then Buried-a Key Part of Its New Tunnel (lien direct)

As the city gets ready to open the long-awaited SR 99 tunnel, it exhumes a crucial ramp it intentionally buried in 2013.

WiredThreatLevel.png 2019-01-12 12:00:00 The FTC Thinks You Pay Too Much for Smartphones. Here\'s Why (lien direct)

The agency has charged wireless chip maker Qualcomm with imposing a "tax" on the makers of smartphones like Apple and Samsung.

WiredThreatLevel.png 2019-01-12 12:00:00 9 Best CES 2019 Devices You Can Buy Right Now: Suunto, Lenovo, Razer, and More (lien direct)

Has CES whet your appetite for gadgets? From Withings watches to Xbox keyboards, here are our favorite weekend picks.

no_ico.png 2019-01-12 11:28:04 OXO Breach (lien direct)

Oxo International, a homeware, office supplies, and kitchen utensil manufacturer has disclosed a two-year long breach that exposed customer details in a Magecart like attacks. Experts comments below: Robert Capps, VP and Authentication Strategist at NuData Security: “Once data has been stolen, it\'s used in a number of ways, including account takeover and identity fraud. More recently, …

The ISBuzz Post: This Post OXO Breach appeared first on Information Security Buzz.

SecurityAffairs.png 2019-01-12 10:26:02 Z-WASP attack: hackers used Zero-Width spaces to bypass Office 365 protections (lien direct)

Z-WASP attack: Phishers are using a recently fixed flaw in Office 365 that allows them to bypass protections using zero-width spaces and deliver malicious messages to recipients. Microsoft recently fixed a vulnerability in Office 365 that was exploited by attackers to bypass existing phishing protections and deliver malicious messages to victims\' inboxes. The vulnerability ties with the […]

The post Z-WASP attack: hackers used Zero-Width spaces to bypass Office 365 protections appeared first on Security Affairs.

WiredThreatLevel.png 2019-01-12 07:41:00 Gadget Lab Podcast: Robots, Smart Health, and Security Fails at CES (lien direct)

WIRED\'s Gadget Lab team kicks off the new year with a wrap-up of the year\'s biggest electronics show. Plus, an interview with Reddit\'s Jen Wong.

WiredThreatLevel.png 2019-01-12 00:53:04 MacKenzie Bezos and the Myth of the Lone Genius Founder (lien direct)

Even juicy divorce speculation represents a chance to acknowledge how myriad factors-and people-contribute to the success of a company like Amazon.

ZDNet.png 2019-01-11 23:39:03 NASA internal app leaked employee emails, project names (lien direct)

NASA Jira server leaked data for three weeks, possibly more.

SecurityAffairs.png 2019-01-11 22:55:00 British hacker sentenced to jail for attack on Liberian Telecoms firms (lien direct)

The British hacker Daniel Kaye has been sentenced to 32 months in prison for the cyberattack on Liberian telecom firms. The British hacker Daniel Kaye (29) has been sentenced to 32 months in prison for the 2016 attack that took down telecommunications services in Liberia. Kaye pleaded guilty in December to two charges under the Computer Misuse […]

The post British hacker sentenced to jail for attack on Liberian Telecoms firms appeared first on Security Affairs.

TechRepublic.png 2019-01-11 22:04:01 Good data in, good data out: How innovation in technology has evolved (lien direct)

Xerox\'s CISO Alissa Abdullah discusses how innovation in technology and security has changed throughout her career.

Kaspersky.png 2019-01-11 21:58:02 Pre-Installed Android App Impacts Millions with Slew of Malicious Activity (lien direct)

The app was developed by legitimate Chinese manufacturing giant TCL.

TechRepublic.png 2019-01-11 21:28:03 What AWS can learn from Google\'s roaring Kubernetes success (lien direct)

Google has done everything right with Kubernetes and its enablement of a vibrant community. AWS has a chance to follow with Firecracker.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21

Information mise à jours le: 2019-01-19 06:03:28
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Notre RSS (filtré) Twitter