What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
ESET.png 2018-02-13 12:56:02 Blockchain Hardened devices: Can they restore privacy with security by design? (lien direct)

These developments show that security technology is now keeping up, or outpacing other technological and regulatory developments. Thus, while users\' wants often continue to trump their appreciation of risk, the industry has responded and in many cases gotten ahead of popular demand.

The post Blockchain Hardened devices: Can they restore privacy with security by design? appeared first on WeLiveSecurity

ESET.png 2018-02-12 14:49:00 US and UK government websites hijacked to mine cryptocurrency on visitors\' machines (lien direct)

If undetected by a user\'s security solution or content- or ad-blocker, the script ran in the background unbeknown to the user until the webpage was closed. A number of the affected websites, including that of the ICO, were also offline for hours in the aftermath of the attack.

The post US and UK government websites hijacked to mine cryptocurrency on visitors\' machines appeared first on WeLiveSecurity

ESET.png 2018-02-12 10:51:04 All HTTP websites to soon be marked as “not secure” by Google Chrome (lien direct)

If you\'re still running a website that is still using insecure HTTP then it\'s time to wake up and drink the coffee. Because unless you take action soon, you\'re going to find many of your visitors are going to distrust your website.

The post All HTTP websites to soon be marked as “not secure” by Google Chrome appeared first on WeLiveSecurity

ESET.png 2018-02-09 10:04:08 How will WPA3 improve WiFi security? (lien direct)

This is aimed at improving security at the time of the handshake, which is when the key is being exchanged. As a result, WPA3 is poised to provide robust security even if short or weak passwords are used, i.e. those that don\'t contain a combination of letters, numbers and symbols.

The post How will WPA3 improve WiFi security? appeared first on WeLiveSecurity

ESET.png 2018-02-08 14:42:23 Global cybercrime behemoth busted, 36 people indicted (lien direct)

According to US authorities, the enterprise aimed at becoming the premier destination for the buying and selling of stolen payment card data and forged identification documents. It is believed that the losses that the Infraud Organization had intended to cause were north of $2.2 billion.

The post Global cybercrime behemoth busted, 36 people indicted appeared first on WeLiveSecurity

ESET.png 2018-02-07 14:19:08 UK-led police operation quashes Luminosity Link RAT (lien direct)

The investigation showed that the tool, which required little technical knowledge to deploy, had over 8,600 users in 78 countries. Victims are believed to be in the thousands.

The post UK-led police operation quashes Luminosity Link RAT appeared first on WeLiveSecurity

ESET.png 2018-02-06 13:11:11 FBI warns of email scams claiming to be from Bureau (lien direct)

Another template attempts to scare, rather than thrill, the recipients. Upon learning that “your IP address and other identifying information were used to commit multiple online crimes”, the mark is urged to contact the sender by phone immediately.

The post FBI warns of email scams claiming to be from Bureau appeared first on WeLiveSecurity

ESET.png 2018-02-06 10:56:11 Think you have a tracker on your phone? Learn how to make your device more resilient (lien direct)

While it certainly doesn\'t hurt to ask for help from local law enforcement, know that even major cities may not have the expertise or the bandwidth to investigate compromised mobile devices. The most important objective is to take steps to make sure you\'re safe. Ask for help, but do not wait for others to help you.

The post Think you have a tracker on your phone? Learn how to make your device more resilient appeared first on WeLiveSecurity

ESET.png 2018-02-05 10:07:27 Vulnerabilities reached a historic peak in 2017 (lien direct)

In 2017, the number of vulnerabilities smashed records set in previous years. According to CVE Details, more than 14,600 vulnerabilities were reported in 2017, compared to 6447 in 2016.

The post Vulnerabilities reached a historic peak in 2017 appeared first on WeLiveSecurity

ESET.png 2018-02-02 10:00:58 (Déjà vu) Smart, Smarter… Dumbest… (lien direct)

While the evolution of new smartphones creates more possibilities for the user, these new devices also creates more possibilities for hackers.

The post Smart, Smarter… Dumbest… appeared first on WeLiveSecurity

ESET.png 2018-02-02 10:00:05 Smart, Smarter… Dumbest… (lien direct)

While the evolution of new smartphones creates more possibilities for the user, these new devices also creates more possibilities for hackers.

The post Smart, Smarter… Dumbest… appeared first on WeLiveSecurity

ESET.png 2018-01-31 14:17:46 Google smashed over 700,000 bad Android apps last year (lien direct)

Google says that it is getting better than ever at protecting Android users against bad apps and malicious developers.

The post Google smashed over 700,000 bad Android apps last year appeared first on WeLiveSecurity

ESET.png 2018-01-30 11:44:09 Privacy of fitness tracking apps in the spotlight after soldiers\' exercise routes shared online (lien direct)

People exercising on far-flung military bases are being exposed by their fitness tracker.

The post Privacy of fitness tracking apps in the spotlight after soldiers’ exercise routes shared online appeared first on WeLiveSecurity

ESET.png 2018-01-26 15:15:20 Babies\' personal data hawked on dark web (lien direct)

The price puts the data records at a significant premium when compared to other stolen datasets. While, in general, many adverts in the dark recesses of the internet are fake, children\'s personally identifiable information (PII) has for long been viewed as a particularly valuable commodity.

The post Babies\' personal data hawked on dark web appeared first on WeLiveSecurity

ESET.png 2018-01-26 13:57:43 FriedEx: BitPaymer ransomware the work of Dridex authors (lien direct)

ESET research has found that the ransomware FriedEx, also known as BitPaymer, is actually the work of the notorious gang responsible for the Dridex banking trojan.

The post FriedEx: BitPaymer ransomware the work of Dridex authors appeared first on WeLiveSecurity

ESET.png 2018-01-26 13:02:13 Jail for man who hacked 1000 student email accounts in search for sexually explicit images (lien direct)

A poorly-secured password reset utility allowed a man to access more than 1,000 email accounts at a New York City-area university in a hunt for sexually explicit photographs and videos.

The post Jail for man who hacked 1000 student email accounts in search for sexually explicit images appeared first on WeLiveSecurity

ESET.png 2018-01-25 14:58:00 How well can bug hunting pay? (lien direct)

In some countries, the financial allure of looking for security vulnerabilities is (even) more striking, according to the findings of a survey released recently by bug bounty platform provider HackerOne.

The post How well can bug hunting pay? appeared first on WeLiveSecurity

ESET.png 2018-01-25 12:58:21 Data Privacy vs. Data Protection: Reflections on Privacy Day and GDPR (lien direct)

Data privacy is also a topic that can spark big debates, like the one between the US and the EU as to what protections should be accorded to data pertaining to people, specifically by those who collect, control, or process such data.

The post Data Privacy vs. Data Protection: Reflections on Privacy Day and GDPR appeared first on WeLiveSecurity

ESET.png 2018-01-24 12:43:47 10 Linux distributions recommended for 2018 (lien direct)

The new features included all the patches, fixes, and updates to the tools and Kernel that were released over the preceding period, which is no small matter, especially if you use Maltego or SET.

The post 10 Linux distributions recommended for 2018 appeared first on WeLiveSecurity

ESET.png 2018-01-23 17:50:20 ESET\'s guide makes it possible to peek into FinFisher (lien direct)

To help malware analysts and security researchers overcome FinFisher\'s advanced anti-disassembly obfuscation and virtualization features, ESET researchers have framed some clever tricks into a whitepaper, “ESET\'s guide to deobfuscating and devirtualizing FinFisher”.

The post ESET\'s guide makes it possible to peek into FinFisher appeared first on WeLiveSecurity

ESET.png 2018-01-23 14:59:13 South Korea moves to ban anonymous cryptocurrency trading (lien direct)

As part of the policy, underage individuals and foreigners without local bank accounts will be barred from trading in virtual currencies. Banks will be required to share information about cryptocurrency exchanges with each other.

The post South Korea moves to ban anonymous cryptocurrency trading appeared first on WeLiveSecurity

ESET.png 2018-01-23 12:58:32 Five ways to check if your router is configured securely (lien direct)

In a dynamic environment where threats continually evolve and new vulnerabilities are identified almost daily, it is necessary to use the most up-to-date security tools, since they deal with protection measures for new and ever-shifting attack vectors.

The post Five ways to check if your router is configured securely appeared first on WeLiveSecurity

ESET.png 2018-01-22 14:28:14 Up to 40,000 OnePlus customers potentially hit by credit card hack (lien direct)

The breach put at risk \'only\' the customers who entered their payment data on oneplus.net between the middle of November 2017 and January 11, 2018. Those who paid with previously saved credit card details or via PayPal are believed to be out of harm\'s way.

The post Up to 40,000 OnePlus customers potentially hit by credit card hack appeared first on WeLiveSecurity

ESET.png 2018-01-22 09:53:34 World Economic Forum: Cyberthreats rising in prominence in global risk landscape (lien direct)

The latest survey marks a shift from optimism regarding technological risks in the previous years. The heightened levels of worry come on the back of an escalation in cybersecurity threats, which, as noted by the WEF, are growing in prevalence and in disruptive potential alike.

The post World Economic Forum: Cyberthreats rising in prominence in global risk landscape appeared first on WeLiveSecurity

ESET.png 2018-01-19 10:00:14 Are mobile devices insecure by nature? (lien direct)

Granted, not all that glitters is gold, and mobiles also come with some drawbacks in terms of the protection of information. There are a number of risks that users may face when trying to secure their information on mobiles and tablets.

The post Are mobile devices insecure by nature? appeared first on WeLiveSecurity

ESET.png 2018-01-18 12:58:15 CES 2018 cybersecurity: Now in every single \'whatchamacallit\' (lien direct)

Not content anymore to just have a bed made of soft plushy stuff, now you can adjust everything about the bed, from electronically sitting up in bed to the lighting surrounding your nap: connected digital technology everywhere.

The post CES 2018 cybersecurity: Now in every single ‘whatchamacallit’ appeared first on WeLiveSecurity

ESET.png 2018-01-18 10:58:32 Trends 2018: Personal data in the new age of technology and legislation (lien direct)

The depth of data collected from our online habits could easily allow profiles to be constructed, showing what may be considered extremely personal interests, drawing on information that we don\'t realize someone is collecting.

The post Trends 2018: Personal data in the new age of technology and legislation appeared first on WeLiveSecurity

ESET.png 2018-01-17 13:15:43 Carphone Warehouse faces hefty fine for 2015 breach (lien direct)

The attackers gained access to a range of customer data such as names, addresses, phone numbers, dates of birth, and marital status. Making matters worse, the historical payment card details of some 18,000 customers were also compromised.

The post Carphone Warehouse faces hefty fine for 2015 breach appeared first on WeLiveSecurity

ESET.png 2018-01-17 10:55:03 CES 2018: Blockchain will solve everything (lien direct)

The first obvious candidate was banking, a sector that has been hard at work trying to implement blockchain to secure the vast troves of digital transactions that happen every microsecond of every day.

The post CES 2018: Blockchain will solve everything appeared first on WeLiveSecurity

ESET.png 2018-01-16 12:59:05 Scammers and jobhunters (lien direct)

It\'s easier to have scruples about how you earn your living when you\'re not one of millions of people chasing just a few thousand jobs.

The post Scammers and jobhunters appeared first on WeLiveSecurity

ESET.png 2018-01-15 13:01:06 CES 2018: Why doesn\'t everyone use VR already? (lien direct)

One side effect of slower than expected uptake of VR is that virtual reality application developers have been slow to invest in creating content. In this sort of chicken-and-egg cycle, growth tends to be slow, not explosive.

The post CES 2018: Why doesn\'t everyone use VR already? appeared first on WeLiveSecurity

ESET.png 2018-01-13 02:43:23 Fruitfly malware spied on Mac users for 13 years – man charged (lien direct)

US authorities have charged a 28-year-old Ohio man who is alleged to have created and installed creepy spyware on thousands of computers for 13 years.

The post Fruitfly malware spied on Mac users for 13 years – man charged appeared first on WeLiveSecurity

ESET.png 2018-01-12 09:29:13 Security event in Taiwan \'rewards\' quiz winners with malware-laden USB drives (lien direct)

The distribution of the USB sticks was halted on December 12 after some of the quiz\'s successful entrants reported that their rewards had been flagged by their security software as containing malware.

The post Security event in Taiwan \'rewards\' quiz winners with malware-laden USB drives appeared first on WeLiveSecurity

ESET.png 2018-01-11 10:22:16 CES 2018: The price of tech is dropping, kids can do this! (lien direct)

Row after row of startup tech here has tiny modules designed to be mashed up into the next big thing if their founders have anything to say about it, and the trend continues.

The post CES 2018: The price of tech is dropping, kids can do this! appeared first on WeLiveSecurity

ESET.png 2018-01-10 12:58:23 Tank-traps versus trappings in virtual currencies: A cybersecurity minefield (lien direct)

Bitcoin, the progenitor of the entire cryptocurrency boom and still the most popular virtual currency, experienced a truly heady run-up in value. Its price surge was punctuated with a crescendo midway through December, when a single bitcoin approached $20,000.

The post Tank-traps versus trappings in virtual currencies: A cybersecurity minefield appeared first on WeLiveSecurity

ESET.png 2018-01-09 14:00:15 ESET research: Appearances are deceiving with Turla\'s backdoor-laced Flash Player installer (lien direct)

In order to establish persistence on the system, the installer tampers with the operating system\'s registry. It also creates an administrative account that allows remote access.

The post ESET research: Appearances are deceiving with Turla\'s backdoor-laced Flash Player installer appeared first on WeLiveSecurity

ESET.png 2018-01-08 10:58:16 MADIoT – The nightmare after XMAS (and Meltdown, and Spectre) (lien direct)

It is not feasible, in fact not even possible, to replace all CPUs in all devices. It would be too costly, besides the success rate for unsoldering and resoldering pin-throughs in multi-layer boards will never be 100%.

The post MADIoT – The nightmare after XMAS (and Meltdown, and Spectre) appeared first on WeLiveSecurity

ESET.png 2018-01-05 09:14:21 Meltdown and Spectre CPU Vulnerabilities: What You Need to Know (lien direct)

The first few days of 2018 have been filled with anxious discussions concerning a widespread and wide-ranging vulnerability in the architecture of processors based on Intel\'s Core architecture used in PCs for many years, and also affecting ARM processors commonly used in tablets and smartphones.

The post Meltdown and Spectre CPU Vulnerabilities: What You Need to Know appeared first on WeLiveSecurity

ESET.png 2018-01-04 12:59:36 ESET Research: Wauchos now headed for extinction? (lien direct)

As Wauchos was sold on underground forums, there were various monetization schemes. One of them was to use the form grabber plugin to steal passwords for online accounts.

The post ESET Research: Wauchos now headed for extinction? appeared first on WeLiveSecurity

ESET.png 2018-01-03 10:58:24 Now is the best time to craft your breach response (lien direct)

Taking time to think logically and deliberately about your assets can help you determine what needs to be secured. Preparing for the worst can help you see the best course of action to prevent those emergencies in the present.

The post Now is the best time to craft your breach response appeared first on WeLiveSecurity

ESET.png 2017-12-28 12:58:53 Cybersecurity review of 2017: The year of wake-up calls – part 2 (lien direct)

Courtesy of its highly customizable nature – along with its ability to persist in the system and to provide valuable information for fine-tuning the highly configurable payloads – the malware can be adapted for attacks against any environment, making it extremely dangerous.

The post Cybersecurity review of 2017: The year of wake-up calls – part 2 appeared first on WeLiveSecurity

ESET.png 2017-12-27 14:49:04 The worst passwords of the year revealed (lien direct)

Need a New Year\'s resolution? How about this one?

Start taking password security more seriously.

The post The worst passwords of the year revealed appeared first on WeLiveSecurity

ESET.png 2017-12-27 12:58:52 Cybersecurity review of 2017: The year of wake-up calls – part 1 (lien direct)

Ransomware and data breaches remain major thorns in the sides of users and organizations across the world, often piercing their defenses without too much effort.

The post Cybersecurity review of 2017: The year of wake-up calls – part 1 appeared first on WeLiveSecurity

ESET.png 2017-12-21 13:58:28 Sednit update: How Fancy Bear Spent the Year (lien direct)

Over the past few years the Sednit group has used various techniques to deploy their various components on targets computers. The attack usually starts with an email containing either a malicious link or malicious attachment.

The post Sednit update: How Fancy Bear Spent the Year appeared first on WeLiveSecurity

ESET.png 2017-12-21 10:07:16 What does revoking Net Neutrality mean for security? (lien direct)

Imagine the scenario where an Internet Service Provider (ISP) allows a security company providing malware protection the option to pay for their traffic to be prioritized and a lower the priority level imposed on all other providers.

The post What does revoking Net Neutrality mean for security? appeared first on WeLiveSecurity

ESET.png 2017-12-20 16:57:24 Adventures in cybersecurity research: risk, cultural theory, and the white male effect – part 2 (lien direct)

Armed with the cultural theory described in part one as a possible explanation for why some people do not heed expert advice, we fielded a survey that queried US adults about their attitudes to 15 different technology hazards, including six that were cyber-related.

The post Adventures in cybersecurity research: risk, cultural theory, and the white male effect – part 2 appeared first on WeLiveSecurity

ESET.png 2017-12-19 12:57:10 Why we should fight for Net Neutrality (lien direct)

Granting ISPs the right to shape traffic, allowing for some traffic to be prioritized due to a commercial agreement, may have a negative effect on the outcome of using the service for both the consumer and the company providing the service.

The post Why we should fight for Net Neutrality appeared first on WeLiveSecurity

ESET.png 2017-12-18 16:58:41 Adventures in cybersecurity research: risk, cultural theory, and the white male effect (lien direct)

Again and again we have seen security breaches occur because people did not heed advice that we and other people with expertise in security have been disseminating for years, advice about secure system design, secure system operation, and appropriate security strategy.

The post Adventures in cybersecurity research: risk, cultural theory, and the white male effect appeared first on WeLiveSecurity

ESET.png 2017-12-15 10:00:25 UK banks urged to do more to tackle rampant online fraud (lien direct)

Banks are being urged to step up to the plate and to “work together to tackle this problem head on”, as their response has been found to be disproportionate to the scale of the problem.

The post UK banks urged to do more to tackle rampant online fraud appeared first on WeLiveSecurity

ESET.png 2017-12-14 13:55:37 Cybersecurity Trends 2018: The costs of connection (lien direct)

To help the reader navigate through the maze of such threats, ESET\'s thought leaders have zeroed in on several areas that top the priority list in our exercise in looking forward.

The post Cybersecurity Trends 2018: The costs of connection appeared first on WeLiveSecurity

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22

Information mise à jours le: 2019-10-23 00:08:01
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Notre RSS (filtré) Twitter