What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
SecurityWeek.png 2019-01-11 21:03:05 Phishers Use Zero-Width Spaces to Bypass Office 365 Protections (lien direct)

A recently addressed vulnerability in Office 365 allowed attackers to bypass existing phishing protections and deliver malicious messages to victims\' inboxes. 

read more

ZDNet.png 2019-01-11 20:14:04 Hacker \'BestBuy\' sentenced to prison for operating Mirai DDoS botnet (lien direct)

Hacker knocked an entire country\'s internet connection offline.

TechRepublic.png 2019-01-11 19:04:00 How to create a Kanban Board in Nextcloud (lien direct)

Combining a Kanban board with Nextcloud creates a powerful, in-house collaboration tool that can ease your project management tasks.

SecureMac.png 2019-01-11 18:50:00 Checklist 120: New Year Old Worries (lien direct)

It’s a new year - but some old worries have followed us into 2019, still lingering and causing some concerns. That means it’s time to shake off the last of the sleepiness still hanging around from the holidays and get back down to business. We have phishers making calls looking for info, more issues with troublesome apps that evaded Apple’s notice, and an update to the unfolding story about how ...

The post Checklist 120: New Year Old Worries appeared first on SecureMac.

SecurityWeek.png 2019-01-11 18:25:04 UK Hacker Jailed for Attack on Liberian Telecoms Firm (lien direct)

A British computer hacker has been sentenced to 32 months in prison for a cyberattack that knocked out telecommunications services in Liberia.

Daniel Kaye was paid by an employee of a rival firm to launch a distributed denial of service attack on Liberian phone and internet provider Lonestar.

read more

TechRepublic.png 2019-01-11 18:04:05 Quantum computer components: Learn the basics (lien direct)

Quantum computers look nothing like regular computers. Here is a primer on what the parts are inside a quantum computer, with insights from an expert at IBM.

SecurityWeek.png 2019-01-11 18:03:05 Most People Expect a Serious Cyberattack Against Their Country (lien direct)

People across the world are expecting major cyber-attacks against their own country.

read more

MalwarebytesLabs.png 2019-01-11 18:00:00 Luas data ransom: the hacker who cried wolf? (lien direct) Irish tram firm Luas were recently compromised and told to pay 1 Bitcoin, or risk user data being fired into the void. The deadline for paying the ransom has now passed: So what happens next? And is anyone out there really at risk?

Categories:

Cybercrime Hacking

Tags:

(Read more...)

The post Luas data ransom: the hacker who cried wolf? appeared first on Malwarebytes Labs.

no_ico.png 2019-01-11 18:00:00 Security Experts Believe Skills Gap Can Be Bridged – Deloitte Disruption Index (lien direct)

Business leaders’ confidence in the digital skills of new entrants to the workplace has improved in the last six months, according to the latest Digital Disruption Index by Big Four accountant Deloitte. A growing number of business leaders think that school leavers and graduates have the right digital skills and experience, according to the new report. Experts …

The ISBuzz Post: This Post Security Experts Believe Skills Gap Can Be Bridged – Deloitte Disruption Index appeared first on Information Security Buzz.

Kaspersky.png 2019-01-11 17:49:02 TA505 Crime Gang Debuts Brand-New ServHelper Backdoor (lien direct)

The latest malware from TA505 has been seen targeting banks, retailers and restaurants with two different versions.

SecurityWeek.png 2019-01-11 17:09:01 Rapid7 Releases Metasploit 5.0 (lien direct)

Rapid7 on Friday announced the release of Metasploit 5.0. The latest major version of the popular penetration testing framework introduces several new important features, improved performance, and its developers say it should be easier to use.

read more

itsecurityguru.png 2019-01-11 17:03:02 2019 – The Birth Of The Passwordless Society. (lien direct)

By  Jesper Frederiksen, UK GM at Okta “You would have been hard pressed to remember a day in 2018 not marked by news of a data breach. What this highlighted was the diminishing importance and strength of password authentication, and the growing shift towards a passwordless society. Having more human signals such as biometrics, usage […]

The post 2019 – The Birth Of The Passwordless Society. appeared first on IT Security Guru.

WiredThreatLevel.png 2019-01-11 17:00:00 The Insane Numbers Behind Cycling\'s Most Masochistic Race (lien direct)

The hour is one of cycling\'s oldest and most prestigious records: How far can one person ride a bicycle in 60 minutes?

TechRepublic.png 2019-01-11 16:53:01 Autonomous ship market to hit $13.8B by 2030, driven by demand for trade, safety (lien direct)

Autonomous ships could increase safety and reduce human-caused maritime accidents, according to a MarketandMarkets report.

WiredThreatLevel.png 2019-01-11 16:34:00 A Worldwide Hacking Spree Uses DNS Trickery to Nab Data (lien direct)

Security researchers suspect that Iran has spent the last two years pilfering data from telecoms, governments, and more.

TechRepublic.png 2019-01-11 16:33:01 How to install Magento on Ubuntu 18.04 (lien direct)

Need a powerful and flexible e-commerce solution in your data center? Look no further than Magento.

Kaspersky.png 2019-01-11 16:23:05 U.S. Government Shutdown Leaves Dozens of .Gov Websites Vulnerable (lien direct)

As the shutdown continues into its 21st day, dozens of .gov websites haven\'t renewed their TLS certificates.

TechRepublic.png 2019-01-11 16:16:03 Self-driving cars will create 30,000 engineering jobs that the US can\'t fill (lien direct)

Demand for engineers with computer-related degrees could be up to six times more than the number of graduates, worsening the industry\'s talent shortage.

TechRepublic.png 2019-01-11 16:15:00 Here\'s Microsoft\'s fix for legit Windows 7 PCs labelled \'not genuine\' after latest update mishap (lien direct)

The company revealed the error stemmed from an update to its Microsoft Activation and Validation servers on January 8th.

Blog.png 2019-01-11 16:14:02 That Other Moscow: Sketchy LinkedIn Job Posts Mix US, Russian Locales (lien direct)

Bogus LinkedIn job postings for leading US organizations, including the US Army, the State of Florida and defense contractor General Dynamics, are popping up for Russian locales like St. Petersburg and Moscow, the firm Evolver has found. Is it AI-Gone-Wild, or is something more nefarious afoot?  Moscow, on the border between Idaho and Washington...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/591659398/0/thesecurityledger -->»

TechRepublic.png 2019-01-11 16:09:05 CES 2019: Canon Rayo S1 mini projector appeals to on-the-go lifestyle (lien direct)

Ultra-portable, lightweight device perfect for professionals, photographers, and everyone in-between.

no_ico.png 2019-01-11 16:00:04 Orphaned Accounts: Did The Quora Hack Reveal Hidden Dangers? (lien direct)

From watching funny cat videos to checking the latest news, we are all familiar with the exchange of personal data (email address information, and the like) for services. But, could we be becoming dangerously complacent? Studies reveal that 57 per cent of British consumers are concerned about how much personal data they have previously shared …

The ISBuzz Post: This Post Orphaned Accounts: Did The Quora Hack Reveal Hidden Dangers? appeared first on Information Security Buzz.

bleepingcomputer.png 2019-01-11 15:55:03 Del Rio City Hall Forced to Use Paper After Ransomware Attack (lien direct)

The City Hall of Del Rio, Texas was hit by a ransomware attack on the morning of January 10, which led to dozens of computers on the network being turned off and disconnected from the Internet to contain and analyze the malware [...]

Kaspersky.png 2019-01-11 15:44:05 Yet Another Bypass: Is 2FA Broken? Authentication Experts Weigh In (lien direct)

A penetration testing tool called Modlishka can defeat two-factor authentication in the latest 2FA security issue. We asked a roundtable of experts what it all means.

no_ico.png 2019-01-11 15:40:04 Vietnam Says That Facebook Has Violated Controversial Cyber Security Law (lien direct)

Facebook has violated Vietnam’s new cyber-security law by allowing users to post anti-government comments on the platform, the country’s state media said on Wednesday (Jan 9), days after the controversial legislation took effect in the communist-ruled country. Expert Comments below: Ilia Kolochenko, CEO at High-Tech Bridge: “The problem of many emerging cyber laws is that …

The ISBuzz Post: This Post Vietnam Says That Facebook Has Violated Controversial Cyber Security Law appeared first on Information Security Buzz.

no_ico.png 2019-01-11 15:37:05 NCSC Starts Campaign To Help Industry Fight Foreign State Threats (lien direct)

It has been reported that the National Counterintelligence and Security Center (NCSC) has launched a program aimed at helping U.S. companies protect themselves from cyber-attacks or other threats from foreign nation-state actors. The NCSC is now sharing materials on how firms can guard themselves against threats to the supply chain - or components manufactured outside of the U.S. …

The ISBuzz Post: This Post NCSC Starts Campaign To Help Industry Fight Foreign State Threats appeared first on Information Security Buzz.

TechRepublic.png 2019-01-11 15:24:02 The 6 biggest tech myths Americans still believe (lien direct)

With new technology constantly surfacing, it can be hard to know what information is true or false. Here is the truth behind some of the biggest tech myths.

SecurityWeek.png 2019-01-11 15:17:05 Was North Korea Wrongly Accused of Ransomware Attacks? (lien direct)

Ryuk Ransomware\'s Attribution to North Korea Likely Incorrect, Multiple Security Firms Believe

read more

no_ico.png 2019-01-11 14:59:05 Bypassing 2-Factor Authentication (lien direct)

Phishing attacks can be automated through a new penetration testing tool published by security researcher Piotr DuszyÅ„ski. Modlishka is the name of the tool and it can bypass login operations for accounts protected by two-factor authentication (2FA). Don Duncan, Security Engineer at NuData Security: “While cybercriminals can get past two-factor authentication (2FA), this should only be …

The ISBuzz Post: This Post Bypassing 2-Factor Authentication appeared first on Information Security Buzz.

SecurityAffairs.png 2019-01-11 14:59:03 Victims of Pylocky ransomware can decrypt their files for free (lien direct)

Victims of the PyLocky Ransomware can use a tool released by security researcher Mike Bautista at Cisco Talos group to decrypt their files for free. I have good and bad news for the victims of the PyLocky Ransomware. The good news is that security researcher Mike Bautista at Cisco Talos group released a decryption tool […]

The post Victims of Pylocky ransomware can decrypt their files for free appeared first on Security Affairs.

SecurityWeek.png 2019-01-11 14:56:00 Medical Device Security Firm Cynerio Raises $7 Million (lien direct)

Cynerio, a provider of medical device and Internet of Medical Things (IoMT) solutions, this week announced that it has raised $7 million in funding.

read more

SecurityWeek.png 2019-01-11 14:43:01 Juniper Networks Patches Over 60 Flaws in Junos, ATP Products (lien direct)

Juniper Networks this week released patches for more than 60 vulnerabilities in its Juniper Advanced Threat Prevention (ATP) appliance, Junos OS operating system, and Junos Space network management platform. Many of the security holes impact third-party components.

read more

DarkReading.png 2019-01-11 14:35:00 SCOTUS Says Suit Over Fiat-Chrysler Hack Can Move Forward (lien direct)

A class-action suit over a 2015 attack demonstration against a Jeep Cherokee can move forward, US Supreme Court rules.

no_ico.png 2019-01-11 14:30:02 Weaponised Emails Pose Biggest Threat To Cyber Security In 2019 (lien direct)

UK cyber security innovator Glasswall Solutions predicts decline of mass cyber-attacks as criminals opt for more tailored methods, with awareness growing that anti-virus technology fails to provide full protection Glasswall Solutions, the pioneering UK-based cyber security company, today reveals its five top predictions for 2019. The list covers the developments that Glasswall\'s team of experts …

The ISBuzz Post: This Post Weaponised Emails Pose Biggest Threat To Cyber Security In 2019 appeared first on Information Security Buzz.

itsecurityguru.png 2019-01-11 14:23:05 Forcepoint Names Matt Preschern As Chief Marketing Officer. (lien direct)

Global cybersecurity leader Forcepoint today announced that veteran technology marketing executive Matt Preschern has joined the company as chief marketing officer (CMO). Preschern reports to CEO Matthew Moynahan and will be based in Forcepoint\'s Austin, Texas headquarters. As CMO, Preschern will lead all aspects of global marketing including driving brand awareness, revenue generation, and sales […]

The post Forcepoint Names Matt Preschern As Chief Marketing Officer. appeared first on IT Security Guru.

TechRepublic.png 2019-01-11 14:19:00 Redis and Intel partner for Optane in-memory database solutions to increase performance (lien direct)

Redis Enterprise is now available on the hardware preview of Intel\'s Optane non-volatile DIMMs, which can be configured at up to 512GB per module.

AlienVault.png 2019-01-11 14:00:00 Things I Hearted This Week, 11th Jan 2019 (lien direct)

And we’re back into the swing of things with a proper first week on the books and plenty to talk about as to the weird and wonderful goings on in the world of security, technology and beyond.

International Security of Mystery

Joe Gray hasn’t really flown outside of the US other than Canada, so when presented with an opportunity to speak at conferences in Switzerland and Paris, he went about trying to find what a security professional should do when travelling internationally.

Lesley Carhart’s blog which is referenced in Joe’s article probably has one of the most comprehensive posts on the topic

Mondelez Sues Zurich in Rest for Cyber Hack Insurance

And so it begins…

Mondelez, the US food company that owns the Oreo and Cadbury brands, is suing its insurance company, Zurich, for refusing to pay out on a $100m claim for damage caused by the NotPetya cyber attack.

2019 - The Year of Cloud-Based Cybersecurity

Yes, it’s a prediction piece, but a rather specific one talking about how we’re seeing a rise in cloud-based security analytics and operations.

The Cyber-Attack That Sent an Alaskan Community Back in Time

They still don’t know where it c

WiredThreatLevel.png 2019-01-11 14:00:00 The Exaggerated Promise of So-Called Unbiased Data Mining (lien direct)

Data Mining for Random Patterns Invites Bias and Lacks Value

WiredThreatLevel.png 2019-01-11 14:00:00 Steam\'s Platform Dominance Takes an Epic Hit (lien direct)

Plus, a Bungie breakaway, overenthusiastic algorithms, and the rest of the week in gaming news.

TechRepublic.png 2019-01-11 13:54:01 How to Install MS SQL on Ubuntu Server 18.04 (lien direct)

Wouldn\'t you love to have a MS SQL database server combined with the power, reliability, and security of Linux? Now you can.

TechRepublic.png 2019-01-11 13:51:05 69% of enterprises moving business-critical applications to the cloud (lien direct)

Security concerns top the list of challenges to cloud migration, according to a Cloud Security Alliance report.

WiredThreatLevel.png 2019-01-11 13:00:00 A Strange Kind of Data Tracks the Weather-and Pirate Ships (lien direct)

Weather forecasters may soon use a technique called radio occultation, which infers the state of the atmosphere from various broadcasts.

itsecurityguru.png 2019-01-11 12:55:02 Semafone Looks On The Bright Side For 2019 – With A Brexit Boom And A Bitcoin Bounce. (lien direct)

Semafone, the leading provider of data security and compliance solutions for contact centres, takes an optimistic view of the outlook for the technology industry in 2019. CEO Tim Critchley, global solutions director Ben Rafferty and head of information security Shane Lewis, share their top tech predictions for this year. 1) Brexit – the voice of […]

The post Semafone Looks On The Bright Side For 2019 – With A Brexit Boom And A Bitcoin Bounce. appeared first on IT Security Guru.

SecurityAffairs.png 2019-01-11 12:54:01 The \'AVE_MARIA\' Malware (lien direct)

Ave Maria Malware – Phishing attempts spreading in the last days of the past year against an Italian organization operating in the Oil&Gas sector The  Cybaze-Yoroi ZLab researchers analyzed phishing attempts spreading in the last days of the past year against an Italian organization operating in the Oil&Gas sector. The malicious emails try to impersonate […]

The post The ‘AVE_MARIA’ Malware appeared first on Security Affairs.

ZDNet.png 2019-01-11 12:46:01 Ryuk ransomware gang probably Russian, not North Korean (lien direct)

Evidence doesn\'t warrant nation-state attribution. Ryuk is just another Russian-based cyber-crime operation.

ZDNet.png 2019-01-11 12:36:02 These are the courses UK police are set to take in cybersecurity (lien direct)

Is the cybersecurity training due to roll out to thousands of police officers of value? ZDNet finds out.

securityintelligence.png 2019-01-11 12:35:02 Maturing Your Security Operations Center With the Art and Science of Threat Hunting (lien direct)

>By combining repeatable processes for threat hunting with intelligent solutions and skilled analysts, organizations can improve threat response and protect their most critical assets.

The post Maturing Your Security Operations Center With the Art and Science of Threat Hunting appeared first on Security Intelligence.

securityintelligence.png 2019-01-11 12:20:02 FBI Warns EdTech Needs Stronger Defenses for Students\' Personal Data (lien direct)

EdTech today stores more personally identifiable information on K-12 students than ever, but the FBI warns that much of that data is severely exposed to threat actors.

The post FBI Warns EdTech Needs Stronger Defenses for Students’ Personal Data appeared first on Security Intelligence.

SecurityWeek.png 2019-01-11 12:08:02 Poland Charges Huawei Manager, Ex-spy With Spying for China (lien direct)

Poland has arrested a Chinese manager at tech giant Huawei in Poland and one of its own former counter-espionage officers and charged them with spying on Poland for China, state television and officials reported Friday.

read more

TechRepublic.png 2019-01-11 12:00:00 3 basic things to know about your data, according to Xerox\'s CISO (lien direct)

Dan Patterson interviews Xerox CISO Alissa Abdullah about protecting sensitive data from adversaries. They also discuss the recent Marriott hack, privacy, ransomware, machine learning, and IoT.

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22

Information mise à jours le: 2019-01-19 06:03:28
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Notre RSS (filtré) Twitter