What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
ESET.png 2018-03-29 12:58:02 Pingu Cleans Up: Subscription scam on Google Play (lien direct)

>The game was uploaded to Google Play and attempted to trick users into unwittingly signing up for a weekly paid subscription

The post Pingu Cleans Up: Subscription scam on Google Play appeared first on WeLiveSecurity

ESET.png 2018-03-29 09:59:00 World Backup Day: Banks having each other\'s back (lien direct)

As World Backup Day reminds us, robust backups are integral to healthy information security practices of any organization. This is doubly true for those operating in critical sectors.

The post World Backup Day: Banks having each other’s back appeared first on WeLiveSecurity

ESET.png 2018-03-29 07:58:05 Lizard Squad member jailed after offering DDoS-for-hire attack service (lien direct)

>"Hacker-for-hire" service launched distributed denial-of-service (DDoS) attacks against websites and phone-bombed its victims.

The post Lizard Squad member jailed after offering DDoS-for-hire attack service appeared first on WeLiveSecurity

ESET.png 2018-03-28 12:58:03 World Backup Day: Saving the day by saving data (lien direct)

World Backup Day, celebrated annually on March 31, is a timely reminder of the importance of taking effective measures that can make all the difference when a data loss incident strikes. It is also a good time to pause and reflect on the rising tide of threats that organizations, notably those operating in critical industries, face in cyberspace. 

The post World Backup Day: Saving the day by saving data appeared first on WeLiveSecurity

ESET.png 2018-03-28 09:57:05 Monero cryptocurrency: Malware\'s rising star (lien direct)

Bitcoin gets all the press these days when it comes to cryptocurrency but the gap in market capitalization is narrowing.

The post Monero cryptocurrency: Malware\'s rising star appeared first on WeLiveSecurity

ESET.png 2018-03-28 07:57:00 Be wary when scanning QR codes with iOS 11\'s camera app (lien direct)

Boobytrapped QR code can trick iOS 11 into taking you to a malicious website

The post Be wary when scanning QR codes with iOS 11’s camera app appeared first on WeLiveSecurity

ESET.png 2018-03-27 12:57:01 The Last Windows XP Security White Paper (lien direct)

Using the strategies and procedures we present in our paper could help prevent an attacker from taking control of your computer

The post The Last Windows XP Security White Paper appeared first on WeLiveSecurity

ESET.png 2018-03-27 09:59:05 Oil & gas industry in Middle East found lagging in security (lien direct)

The oil and gas industry is the target of as much as one-half of all cyberattacks in the Middle East

The post Oil & gas industry in Middle East found lagging in security appeared first on WeLiveSecurity

ESET.png 2018-03-27 07:57:03 Police arrest members of cybercrime gang (lien direct)

ATM jackpot gang is thought to have infiltrated over 100 financial firms in 40 countries costing banks more than one billion dollars.

The post Police arrest members of cybercrime gang appeared first on WeLiveSecurity

ESET.png 2018-03-26 11:56:01 Critical Infrastructure Interview with David Harley (lien direct)

WeLiveSecurity sat down with David Harley to get a better understanding of Critical Infrastructure and the role he has played in the area throughout his career.

The post Critical Infrastructure Interview with David Harley appeared first on WeLiveSecurity

ESET.png 2018-03-26 08:00:02 Hey Siri! Read me this locked iPhone\'s hidden messages… (lien direct)

Messages sent to your iPhone may not be as private as you think.

The post Hey Siri! Read me this locked iPhone’s hidden messages… appeared first on WeLiveSecurity

ESET.png 2018-03-23 12:08:02 City of Atlanta computers held hostage in ransomware attack (lien direct)

City officials confirm that Atlanta is dealing with a cyberattack that has locked down internal systems and is holding them hostage using ransomware

The post City of Atlanta computers held hostage in ransomware attack appeared first on WeLiveSecurity

ESET.png 2018-03-22 13:57:05 Glupteba is no longer part of Windigo (lien direct)

Latest ESET research strongly suggests that Glupteba is no longer tied to the infamous Operation Windigo.

The post Glupteba is no longer part of Windigo appeared first on WeLiveSecurity

ESET.png 2018-03-21 14:50:05 Pirate websites expose users to more malware, study finds (lien direct)

The research confirmed that the more time the users spent on pirate sites the higher the likelihood that some type of malware would compromise their computers.

The post Pirate websites expose users to more malware, study finds appeared first on WeLiveSecurity

ESET.png 2018-03-20 10:28:01 UK\'s National Lottery urges millions of players to change their passwords (lien direct)

The lottery\'s operator has found that attackers probably used an automated method known as \'credential stuffing\' to access up to 150 customer accounts.

The post UK\'s National Lottery urges millions of players to change their passwords appeared first on WeLiveSecurity

ESET.png 2018-03-16 09:55:01 Tricks that cybercriminals use to hide in your phone (lien direct)

Malware in the official Google store never stops appearing. For cybercriminals, sneaking their malicious applications into the marketplace of genuine apps is a huge victory.

The post Tricks that cybercriminals use to hide in your phone appeared first on WeLiveSecurity

ESET.png 2018-03-15 12:58:05 Employers\' best bet for appealing to security pros? Value their opinions (lien direct)

The report also sheds light on how not to go about attracting new hires. Vague and inaccurate job descriptions along with job postings that include insufficient qualifications were found to top the list of turnoffs for many jobseekers

The post Employers\' best bet for appealing to security pros? Value their opinions appeared first on WeLiveSecurity

ESET.png 2018-03-14 18:15:05 How diversity in cybersecurity contributes to your company (lien direct)

Diverse background can contribute to your organization\'s security. Here are some tips to get more diversity in security perspectives.

The post How diversity in cybersecurity contributes to your company appeared first on WeLiveSecurity

ESET.png 2018-03-14 12:55:05 Mr. Robot S03E05: A Runtime Error, Credential Theft and New Easter Eggs (lien direct)

The latest episode of this series marks the halfway point in the third season and, in addition to some amazing camerawork there are several examples of actions related to IT security that crop up throughout the episode.

The post Mr. Robot S03E05: A Runtime Error, Credential Theft and New Easter Eggs appeared first on WeLiveSecurity

ESET.png 2018-03-14 01:00:03 Dangerous malware stealing bitcoin hosted on Download.com for years (lien direct)

ESET researchers dicovered that Trojanized applications used to steal bitcoin were hosted inadvertently by the popular website download.cnet.com.

The post Dangerous malware stealing bitcoin hosted on Download.com for years appeared first on WeLiveSecurity

ESET.png 2018-03-13 14:17:03 Cryptocurrency exchange announces bounty on hackers (lien direct)

The attack itself unfolded within the span of two minutes on March 7. Hackers made a flurry of automated transactions that involved the digital currencies Viacoin (VIA) and Bitcoin (BTC).

The post Cryptocurrency exchange announces bounty on hackers appeared first on WeLiveSecurity

ESET.png 2018-03-13 08:55:02 OceanLotus ships new backdoor using old tricks (lien direct)

To smuggle the backdoor onto a targeted machine, the group uses a two-stage attack whereby a dropper package first gains a foothold on the system and sets the stage for the backdoor itself. This process involves some trickery commonly associated with targeted operations of this kind.

The post OceanLotus ships new backdoor using old tricks appeared first on WeLiveSecurity

Threat
ESET.png 2018-03-09 17:01:02 New traces of Hacking Team in the wild (lien direct)

Since being founded in 2003, the Italian spyware vendor Hacking Team gained notoriety for selling surveillance tools to governments and their agencies across the world. The capabilities of its flagship product, the Remote Control System (RCS), include extracting files from a targeted device, intercepting emails and instant messaging, as well as remotely activating a device\'s webcam and microphone.

The post New traces of Hacking Team in the wild appeared first on WeLiveSecurity

ESET.png 2018-03-09 10:35:01 One in five healthcare employees willing to sell patient data, study finds (lien direct)

The problem was particularly acute among provider organizations, as opposed to payer organizations (21% vs. 12%). Also, and perhaps counterintuitively, staff with more frequent cybersecurity training were more inclined to such practices.

The post One in five healthcare employees willing to sell patient data, study finds appeared first on WeLiveSecurity

ESET.png 2018-03-08 13:41:03 New DDoS attack method breaks record again, adds extortion (lien direct)

DDoS mitigation service Arbor Networks has announced that an undisclosed US company has suffered an attack fueled by internet-facing Memcached servers that clocked in at 1.7 terabits per second (Tbps), beating the previous record of 1.35 Tbps.

The post New DDoS attack method breaks record again, adds extortion appeared first on WeLiveSecurity

ESET.png 2018-03-07 13:52:01 Trends 2018: The ransomware revolution (lien direct)

While Denial of Service attacks amplified by the use of networks of bot-compromised PCs were becoming a notable problem by the turn of the century, DDoS extortion threats have accelerated in parallel (if less dramatically) with the rise in ransomware in the past few years.

The post Trends 2018: The ransomware revolution appeared first on WeLiveSecurity

ESET.png 2018-03-06 11:16:03 Cryptojacking: the result of the “cryptocurrency rush” (lien direct)

Tools for mining cryptocurrencies also fall into this category, as in many cases the websites cannot warn users since they have been compromised themselves, hence even the administrators may not be aware that they are contributing to mining for the benefit of an attacker.

The post Cryptojacking: the result of the “cryptocurrency rush” appeared first on WeLiveSecurity

ESET.png 2018-03-05 14:06:02 Global police test their cyber-chops in simulated IoT attack (lien direct)

More than three dozen cybercrime and digital forensics experts from 23 countries have investigated a simulated attack on a bank that had been carried out through an IoT device.

The post Global police test their cyber-chops in simulated IoT attack appeared first on WeLiveSecurity

ESET.png 2018-03-02 15:38:03 GitHub knocked briefly offline by biggest DDoS attack ever (lien direct)

At its peak, inbound traffic reached a staggering 1.35 terabits per second (Tbps), outflanking the previously record-setting assault of 1 Tbps at French web hosting provider OVH in September 2016.

The post GitHub knocked briefly offline by biggest DDoS attack ever appeared first on WeLiveSecurity

ESET.png 2018-03-02 12:32:03 The rise of AI needs to be controlled, report warns (lien direct)

The experts urge policy-makers to work closely with technical researchers, computer scientists and the cybersecurity community to investigate, understand and prepare for possible malicious uses of AI.

The post The rise of AI needs to be controlled, report warns appeared first on WeLiveSecurity

ESET.png 2018-03-02 10:01:02 How to start analyzing the security of your IoT devices (lien direct)

Nowadays, a lot of attacks take place by tricking the user in some way, such as to open a file, click on a malicious link, or enter their personal data into a fake website. But when it comes to the “Internet of Things” (IoT), the methods are a little different. In principle, this is partly because

The post How to start analyzing the security of your IoT devices appeared first on WeLiveSecurity

ESET.png 2018-03-01 14:25:02 Mobile World Congress: Introducing 5G (lien direct)

If we look back at previous incarnations of mobile networks, 1G, 2G and so on, there have been major changes to the technology. The next generation, 5G, delivers, greater speed and lower latency, but also has the advantage of being able to connect many more devices concurrently.

The post Mobile World Congress: Introducing 5G appeared first on WeLiveSecurity

ESET.png 2018-03-01 09:35:05 Major reform of cybersecurity policies in France (lien direct)

This document, which is described by its authors as a “real white paper on cyber-defense”, is divided into three parts, followed by approximately 20 priority recommendations summarizing the central elements of the document.

The post Major reform of cybersecurity policies in France appeared first on WeLiveSecurity

ESET.png 2018-02-28 12:18:00 Researchers unveil Veil to make \'private browsing more private\' (lien direct)

The blinding server randomly adds some nonsense code to every webpage. This \'code obfuscation\', according to the academics, has no effect on what the actual page looks like, but it drastically changes the appearance of the underlying source file.

The post Researchers unveil Veil to make \'private browsing more private\' appeared first on WeLiveSecurity

ESET.png 2018-02-28 08:58:01 Cryptocurrency scams on Android: do you know what to watch out for? (lien direct)

The recent rise in cryptocurrency scams appearing on the Android platform in disguise has shown that such incidents are not exclusive to PCs and also highlight the importance of knowing what to look out for so you do not unintentionally take part.

The post Cryptocurrency scams on Android: do you know what to watch out for? appeared first on WeLiveSecurity

ESET.png 2018-02-27 12:07:05 SEC says insider trading is not the right response to cyber risk (lien direct)

The SEC has warned public companies that they not only need to do more to fulfil their obligations to transparency and openness with investors about cybersecurity breaches, but they also must disclose other infosecurity risks.

The post SEC says insider trading is not the right response to cyber risk appeared first on WeLiveSecurity

ESET.png 2018-02-27 10:21:01 One-third of organizations sacrifice mobile security for business performance (lien direct)

Only one in seven organizations have put in place all four basic cybersecurity practices specified by Verizon – changing all default passwords, encrypting data transmitted over public networks, granting employee access on a need-to-know basis, and testing security systems regularly.

The post One-third of organizations sacrifice mobile security for business performance appeared first on WeLiveSecurity

ESET.png 2018-02-26 13:47:04 Over 40% of online login attempts are attackers trying to invade accounts (lien direct)

Bots that traverse the internet on behalf of their human operators can fulfill both legitimate and malicious automated tasks. Statistics indicate that bot-driven internet traffic, by helper and harmful bots combined, surpasses human traffic.

The post Over 40% of online login attempts are attackers trying to invade accounts appeared first on WeLiveSecurity

ESET.png 2018-02-26 10:00:02 Privacy by Design: Can you create a safe smart home? (lien direct)

The Internet of Things (IoT) can be a network of connected convenience but this should not come at the expense of safeguarding your privacy and the personal data that connected devices collect and share.

The post Privacy by Design: Can you create a safe smart home? appeared first on WeLiveSecurity

ESET.png 2018-02-23 10:10:05 Six tips to help you avoid targeted marketing (lien direct)

If you get sick of shopping sites sending you “I see you stared at this item, here\'s some similar stuff” messages, you may be able to modify your subscriptions or notifications to make this stop.

The post Six tips to help you avoid targeted marketing appeared first on WeLiveSecurity

ESET.png 2018-02-22 15:08:05 Survey shows sloppy password habits among young Brits (lien direct)

Young people were singled out as increasingly likely victims of internet-borne fraud, including because of their penchant for liberal sharing of personal information.

The post Survey shows sloppy password habits among young Brits appeared first on WeLiveSecurity

ESET.png 2018-02-22 13:01:04 Friendly warnings left in unsecured Amazon S3 buckets which expose private data (lien direct)

Ethical hackers are warning businesses who use Amazon S3 cloud storage if they have left data exposed for anyone to access... by leaving "friendly warnings" on the servers.

The post Friendly warnings left in unsecured Amazon S3 buckets which expose private data appeared first on WeLiveSecurity

ESET.png 2018-02-21 14:51:05 Apple defuses \'text bomb\' bug (lien direct)

A number of text-based apps crashed, became unresponsive or entered an endless bootloop when attempting to show the otherwise little-used character from a language that is spoken by some 75 million people.

The post Apple defuses \'text bomb\' bug appeared first on WeLiveSecurity

ESET.png 2018-02-20 15:19:00 Cybercrime weighs most heavily on financial service firms (lien direct)

A further breakdown of the overall figures shows that, in all, the actual cost hinges on a number of variables. The factors that enter heavily into the equation include attack types and their frequency, along with the organization\'s size and even the country in which an organization is based.

The post Cybercrime weighs most heavily on financial service firms appeared first on WeLiveSecurity

ESET.png 2018-02-19 15:22:02 Millions bagged in two bank cyber-heists (lien direct)

This hack is said to be reminiscent of a particularly brazen bank cyber-heist from February 2016, in which hackers successfully pilfered $81 million from the account of the central bank of Bangladesh at the Federal Reserve Bank of New York.

The post Millions bagged in two bank cyber-heists appeared first on WeLiveSecurity

ESET.png 2018-02-16 14:17:04 US forms dedicated office to help avert cyberattacks at infrastructure (lien direct)

The vulnerability of critical infrastructure, including energy grids, to cyberattacks has been a growing concern worldwide. Many nations have been scrambling to improve their defenses vis-à-vis threats faced by services that are critical to the continuity of our daily lives.

The post US forms dedicated office to help avert cyberattacks at infrastructure appeared first on WeLiveSecurity

ESET.png 2018-02-15 13:47:05 Concerns about data breaches hitting all-time high (lien direct)

A record-high proportion of organizations worldwide (67%) said that they had been breached at some point, up from 56% in the report\'s previous edition.

The post Concerns about data breaches hitting all-time high appeared first on WeLiveSecurity

ESET.png 2018-02-15 10:00:04 Android ransomware in 2017: Innovative infiltration and rougher extortion (lien direct)

Ransomware in 2017 saw users and businesses across the globe trying to cope with campaigns such as Petya and WannaCryptor. Not to be outdone, Android ransomware had a year full of innovative infiltration and rougher extortion as highlighted by the latest ESET research whitepaper.

The post Android ransomware in 2017: Innovative infiltration and rougher extortion appeared first on WeLiveSecurity

ESET.png 2018-02-14 14:30:05 Patch now! Microsoft fixes over 50 serious security flaws (lien direct)

This week saw the second Tuesday of the month, and everyone who is responsible for protecting Windows computers knows what that means: another bundle of security patches have been released by Microsoft.

The post Patch now! Microsoft fixes over 50 serious security flaws appeared first on WeLiveSecurity

ESET.png 2018-02-14 12:58:01 How safe are you around your smart TV? (lien direct)

Smart TVs afford us the opportunity to use them for purposes that are more commonly associated with computers. In fact, that\'s what these TVs have become – internet-connected \'computers\', much like mobile phones. It would no doubt help if we thought of them as such and treated them accordingly.

The post How safe are you around your smart TV? appeared first on WeLiveSecurity

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21

Information mise à jours le: 2019-10-23 00:08:01
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Notre RSS (filtré) Twitter