What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
Kaspersky.png 2019-03-15 18:30:00 Lenovo Patches High-Severity Arbitrary Code Execution Flaws (lien direct)

Lenovo has issued patches for several serious vulnerabilities in its products stemming from Intel technology fixes.

bleepingcomputer.png 2019-03-15 18:00:04 18-Year Old Arrested in Japan for Stealing $130k in Cryptocurrency (lien direct)

A Japanese 18-year-old from Utsunomiya, Tochigi, faces criminal charges for stealing $130,000 (around ¥15 million) worth of cryptocurrency after hacking the Monappy social media network and Monacoin web-based wallet. [...]

WiredThreatLevel.png 2019-03-15 18:00:00 A Ferocious Shrimp Inspires a Robot Claw That Shoots Plasma (lien direct)

Researchers replicate the snapping shrimp\'s plasma-firing claw, which is powerful enough to knock prey out cold.

WiredThreatLevel.png 2019-03-15 17:50:04 Why Tech Didn\'t Stop the New Zealand Attack From Going Viral (lien direct)

Video from a shooting at two mosques in Christchurch popped up on Facebook, YouTube, Twitter, and Reddit, showing the limits of social media moderation.

SecurityWeek.png 2019-03-15 17:35:04 China Does Not Ask Firms to Spy on Others: Premier (lien direct)

China will "never" ask its firms to spy on other nations, Premier Li Keqiang said Friday, amid US warnings that Chinese telecommunications behemoth Huawei poses security risks.

read more

bleepingcomputer.png 2019-03-15 17:19:05 The Week in Ransomware - March 15th 2019 - STOP, Decryptors, and More (lien direct)

This week we have seen a new decryptor released by both Emsisoft and Avast for the BigBobRoss ransomware. We also saw a lot of new variants released for existing ransomware, expecially the STOP Ransomware. [...]

ZDNet.png 2019-03-15 17:00:00 Microsoft to fix \'novel bug class\' discovered by Google engineer (lien direct)

Fixes to be included with Windows 10 19H1, scheduled for release in a few weeks.

ArsTechnica.png 2019-03-15 16:43:01 Epic says its Game Store is not spying on you (lien direct)

But Sweeney says it will stop accessing Steam friends lists without permission.

TechRepublic.png 2019-03-15 16:34:05 How Tesla is helping girls learn about engineering (lien direct)

Tesla and Envirolution recently hosted an Introduce a Girl to Engineering Day and provided the students with hands-on engineering activities.

BBC.png 2019-03-15 16:34:04 Christchurch shootings: Social media races to stop attack footage (lien direct)

Why was a video of the shootings shared on social media and what can be done about the wider threat?

SecurityWeek.png 2019-03-15 15:50:03 Hackers Bypass MFA on Cloud Accounts via IMAP Protocol (lien direct)

Over the past several months, threat actors have been increasingly targeting Office 365 and G Suite cloud accounts that are using the legacy IMAP protocol, in an attempt to bypass multi-factor authentication (MFA), Proofpoint reports.

read more

SecurityWeek.png 2019-03-15 15:48:00 Uncovering the Data Security Triad (lien direct)

Data Must be Protected as it Exists at All Points in the Processing Lifecycle

read more

TechRepublic.png 2019-03-15 15:42:05 How an unsecured Elasticsearch server exposed customer order information and passwords (lien direct)

Chinese e-commerce giant Globalegrow left personally identifiable information and account credentials exposed, leading security researchers to call them "delusional."

bleepingcomputer.png 2019-03-15 15:36:03 257K Legal Documents Leaked By Unprotected Elasticsearch Server (lien direct)

An unprotected 4.7 GB Elasticsearch cluster found on a US-based Amazon AWS server exposed 257,287 legal documents that came with a "not designated for publication" label. [...]

TechRepublic.png 2019-03-15 15:23:02 Students create NCAA March Madness predictive analysis via Google Cloud (lien direct)

Google recruited students to produce tournament data analysis to illustrate how organizations can take advantage of its different tools for analytics, machine learning and more.

TechRepublic.png 2019-03-15 15:20:00 List lovers must-have: Listables, a cloud-based, crowd-sourced checklist app (lien direct)

If you\'re a lover of lists, you\'ll appreciate the cloud-powered Listables community and mobile app.

SecurityWeek.png 2019-03-15 15:18:04 Recently Patched WinRAR Flaw Exploited in APT Attacks (lien direct)

A recently patched WinRAR vulnerability has been exploited by several threat groups, including advanced persistent threat (APT) actors.

read more

TechRepublic.png 2019-03-15 15:13:02 How to create an out-of-office reply in Outlook (lien direct)

Don\'t leave your contacts hanging while you\'re on vacation. Create an automated message including information about when you\'ll return.

SecurityAffairs.png 2019-03-15 15:06:00 It is the first time in the history that civic groups hold a protest against a national CERT (lien direct)

Demonstration in front of the National CERT of Philippines for failing to act on cyber attacks targeting regime critical media and civil society organizations On March 12, the World Day Against Cyber-Censorship, media and civilsociety organizations in Philippines held a demonstration in front ofNCERT (National Computer Emergency Response Team) to protest against the negligence of […]

The post It is the first time in the history that civic groups hold a protest against a national CERT appeared first on Security Affairs.

Kaspersky.png 2019-03-15 14:46:05 Unpatched Fujitsu Wireless Keyboard Bug Allows Keystroke Injection (lien direct)

An unpatched high-severity vulnerability allows keystroke injections in Fujitsu wireless keyboards.

TechRepublic.png 2019-03-15 14:34:03 3 tips: How to create an innovation group (lien direct)

Introducing an innovation team to your organization? To ensure success, consider the three tips below.

no_ico.png 2019-03-15 14:30:01 The Three Big Ways iOS App Development Will Change In The Next Five Years (lien direct)

I have always loved Heraclitus\' teaching of, “No man ever steps in the same river twice.” It is a reminder of the impermanence of life. Though the Greek who lived 2500 years ago was speaking in broad terms, he very well could have been speaking about iOS app development. Although he finished his quote with, …

The ISBuzz Post: This Post The Three Big Ways iOS App Development Will Change In The Next Five Years appeared first on Information Security Buzz.

no_ico.png 2019-03-15 14:30:00 Gearbest Misconfiguration Exposes 1.5M Records (lien direct)

News broke that Gearbest, a Chinese online shopping giant, exposed 1.5 million records on an Elasticsearch server that was not protected with a password, allowing anyone to search the database. The exposed information includes names, addresses, phone numbers, email addresses, customer orders, products purchased, and in some cases, passport numbers and other national ID data. Gearbest ranks as one …

The ISBuzz Post: This Post Gearbest Misconfiguration Exposes 1.5M Records appeared first on Information Security Buzz.

SecurityAffairs.png 2019-03-15 14:00:04 Recently fixed WinRAR bug actively exploited in the wild (lien direct)

Several threat actors are still exploiting a recently patched critical vulnerability in the popular compression software WinRAR. Several threat actors are actively exploiting a critical remote code execution vulnerability recently addressed in WinRAR. The exploitation of the flaw in the wild is worrisome because the WinRAR software doesn’t have an auto-update feature, leaving millions of […]

The post Recently fixed WinRAR bug actively exploited in the wild appeared first on Security Affairs.

WiredThreatLevel.png 2019-03-15 14:00:00 Ninja Made More Streaming \'Apex Legends\' Than You Make All Year (lien direct)

Unless you\'re a basketball player or something.

WiredThreatLevel.png 2019-03-15 14:00:00 Meet Romania\'s Very Internet-Savvy Witch Community (lien direct)

Photographer Lucia Sekerková Bláhová\'s series *Vrăjitoare* documents the digital revolution of Romanian witches, a mystical group that uses social media to advertise services and reach new clients.

TechRepublic.png 2019-03-15 13:58:05 How to view passwords in Android Chrome (lien direct)

If you can\'t remember a password for a website you know Chrome saved, you can view it with these tips.

TechRepublic.png 2019-03-15 13:56:00 How PC/GEOS found a 5th life as an open source DOS shell (lien direct)

The high-performance DOS shell and erstwhile Windows competitor is now open source, with plans underway to create a modern SDK for Windows and Linux.

securityintelligence.png 2019-03-15 13:55:01 Will We See the Rise of Vaporworms and Other New Fileless Attacks in 2019? (lien direct)

>The evolution of the new and difficult-to-detect category of fileless malware may soon take an insidious turn with the development of what some researchers are calling vaporworms.

The post Will We See the Rise of Vaporworms and Other New Fileless Attacks in 2019? appeared first on Security Intelligence.

TechRepublic.png 2019-03-15 13:43:01 Top 3 business travel pain points (lien direct)

While companies understand the benefits of corporate travel, a disconnect between what travelers want and company policies still exists, according to a Lola.com report.

SecurityWeek.png 2019-03-15 13:35:05 G Suite Admins Can Now Disable Phone 2-SV (lien direct)

Google is making G Suite accounts more secure by allowing administrators to remove phone-based 2-step verification (2-SV) from the available multi-factor verification options.

read more

TechRepublic.png 2019-03-15 13:14:02 3 mistakes tech companies make retaining women (lien direct)

It\'s no secret that women are underrepresented in the tech community. Here\'s what companies need to do to retain female tech talent.

bleepingcomputer.png 2019-03-15 13:08:03 Insecure Database Exposes 800,000 Singapore Blood Donors (lien direct)

The personal information of 808,201 blood donors who registered to donate since 1986 in Singapore was exposed after the database which contained it was left unprotected on an Internet-facing server for more than two months. [...]

Blog.png 2019-03-15 13:02:02 MY TAKE: Microsoft\'s Active Directory lurks as a hackers\' gateway in enterprise networks (lien direct)

Many of our online activities and behaviors rely on trust. From the consumer side, for example, we trust that the business is legitimate and will take care of the sensitive personal information we share with them. But that level of trust goes much deeper on the organizational side. Related: The case for ‘zero-trust’ authentication Employees […]

AlienVault.png 2019-03-15 13:00:00 RSA 2019 - A Case of the Blues (lien direct)

RSA is arguably the biggest business-focussed cyber security event of the year. As over 40,000 security professionals completely take over the Moscone Centre in San Francisco.

Of course, one of the biggest changes this year was a case of the blues - as AlienVault made its transition into AT&T Cybersecurity. There were smiles all around, and the now blue blinky sunglasses remained a favourite across our two booths. 

However, it’s not the last we’ll see of our little Alien mascot, who will live on in Alien Labs.

There was also a ‘bullet time’ camera setup in the South Booth. I’m sure there’s a technical term for it, but I only know it as bullet time - the technique popularised by the Matrix movies, where multiple cameras are setup and take a photo at the same time, giving attendees the chance to have their photo taken while being beamed up by the UFO above.

The Trends

RSA is a huge event with thousands of vendors, and hundreds of talks, which naturally bring about some common topics and trends.

Stop, Collaborate, and Listen

No, Vanilla Ice wasn’t a keynote speaker, but a common thread from the keynote to the show floor was one of collaboration and working better together.

I attended a great presentation by Wade Baker and Jay Jacobs if Cyentia Institute entitled “NONE of Us Are as Smart as All of Us” in which they take a scientific approach to proving why many is better than one for learning in the security industry.

Don’t call it a comeback

There was a lot of discussion around security fundamentals. While there are many new threats and attacks in the wild, they are not worth focussing on if the foundations are shaky. Industry luminaries HD Moore and Jeremiah Grossman are working on asset discovery, and Cybersecurity Asset management firm Axoni

WiredThreatLevel.png 2019-03-15 13:00:00 What Hulu\'s Shrill Gets Right-and So Wrong-About Trolling (lien direct)

In her new series, SNL\'s Aidy Bryant is an aspiring journalist beset by trolls.

SecurityWeek.png 2019-03-15 12:46:00 Leading Israeli Candidate for PM Targeted by Iranian Hackers (lien direct)

Israeli PM candidate targeted by Iranian hackers

read more

ZDNet.png 2019-03-15 12:41:03 \'100 unique exploits and counting\' for latest WinRAR security bug (lien direct)

As expected, the recent WinRAR vulnerability is now being abused en-masse by multiple threat actors.

bleepingcomputer.png 2019-03-15 12:13:02 Over 100 Exploits Found for 19-Year Old WinRAR RCE Bug (lien direct)

A code execution vulnerability in WinRAR generated over a hundred distinct exploits in the first week since its disclosure, and the number of exploits keeps on swelling. [...]

itsecurityguru.png 2019-03-15 12:04:04 Cyberfort Group Acquires Defensive Cyber Specialist Auriga Consulting. (lien direct)

The Cyberfort Group has strengthened its end-to-end data security proposition with the acquisition of Auriga Consulting for an undisclosed sum. As a centre of excellence in cyber security, assurance and monitoring services, Auriga offers bespoke solutions in risk and compliance management, cyber design and implementation and cyber monitoring and intelligence. With a track record of […]

The post Cyberfort Group Acquires Defensive Cyber Specialist Auriga Consulting. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-15 12:04:01 New Kaspersky Endpoint Security For Business Provides Security Teams With Greater Control And Automatic Anomaly Detection. (lien direct)

Kaspersky Lab has unveiled the next generation of its endpoint protection with new Kaspersky Endpoint Security for Business. The product features Adaptive Anomaly Control, which intelligently perceives and blocks anomalous applications and user behavior, and offers improved protection from miners and network threats. Kaspersky Endpoint Security for Business now also provides users with a web-based […]

The post New Kaspersky Endpoint Security For Business Provides Security Teams With Greater Control And Automatic Anomaly Detection. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-15 12:03:04 Media Alert: Proofpoint Research Reveals 65% Increase In Cloud Application Attacks In Q1 2019; 40% Of Attacks Originating From Nigeria. (lien direct)

Proofpoint, Inc., a leading cybersecurity and compliance company, today released its Cloud Application Attack Snapshot: Q1 2019 research, which examined over one hundred thousand cloud application attacks aimed at global organizations between September 2018 and February 2019. Overall, targeting attempts increased by 65 percent during that time period with 40 percent originating in Nigeria. China […]

The post Media Alert: Proofpoint Research Reveals 65% Increase In Cloud Application Attacks In Q1 2019; 40% Of Attacks Originating From Nigeria. appeared first on IT Security Guru.

WiredThreatLevel.png 2019-03-15 12:00:00 The Side Effects of Solar Geoengineering Could Be Minimal (lien direct)

Results from a Harvard study don\'t “support the common claims that [solar geoengineering] would inevitably lead to significant harms to some regions.”

ZDNet.png 2019-03-15 12:00:00 Facebook debuts AI tool to tackle revenge porn (lien direct)

A new support service has also been launched to tackle the spread of intimate images without consent.

WiredThreatLevel.png 2019-03-15 12:00:00 Movie Review: The Alien Overlords of Captive State Might Be Coming-For Us (lien direct)

Aliens invade the US in Rupert Wyatt\'s Captive State, a movie that has our present-day struggles in mind.

WiredThreatLevel.png 2019-03-15 12:00:00 The Arctic\'s \'Carbon Bomb\' Could Screw the Climate Even More (lien direct)

Arctic permafrost, a “sleeping giant” of greenhouse gases, is melting faster than expected and could release 1.5 trillion tons of carbon dioxide.

no_ico.png 2019-03-15 11:45:02 New PoS Malware Discovered Targeting The Hospitality And Entertainment Industry (lien direct)

Researchers have uncovered a new cybercrime campaign that is targeting restaurants, cinemas and other retailers in the entertainment and hospitality industries with point-of-sale (POS) malware, with the aim to steal credit card information from customers. Going by the name of DMSniff, the malware is thought to have originated in 2016 but has managed to keep a low profile since. The key targets of DMSniff are small- and medium-sized companies …

The ISBuzz Post: This Post New PoS Malware Discovered Targeting The Hospitality And Entertainment Industry appeared first on Information Security Buzz.

no_ico.png 2019-03-15 11:30:02 New Malware Plaguing Hospitality & Entertainment Industries (lien direct)

A new, stealth, point-of-sale malware campaign has been discovered by Flashpoint that targets the hospitality and entertainment industries to skim credit card information.  Don Duncan, Security Engineer at NuData Security:  “The hospitality and entertainment industries have been hit particularly hard this year by cybercriminals. Point of sale (POS) devices on the network have been the bullseye for hackers …

The ISBuzz Post: This Post New Malware Plaguing Hospitality & Entertainment Industries appeared first on Information Security Buzz.

bleepingcomputer.png 2019-03-15 11:24:02 EPIC Promises to Fix Game Launcher after Privacy Concerns (lien direct)

Epic Games has responded to multiple accusations saying that their Epic Games Launcher is scanning for and collecting users\' Steam information without first requesting permission. [...]

itsecurityguru.png 2019-03-15 11:20:00 Collaborative Work Management Platform Wrike Bolsters Security Offering. (lien direct)

Collaborative work management (CWM) platform Wrike has announced seven new security features, including encryption key management, customized access management and cloud access security broker (CASB) integration support. The company has also earned the ISO/IEC 27001:2013 certification from the British Standards Institution, which ensures that Wrike has an end-to-end security framework and a risk-based approach to […]

The post Collaborative Work Management Platform Wrike Bolsters Security Offering. appeared first on IT Security Guru.

3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23

Information mise à jours le: 2019-03-26 04:01:32
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Notre RSS (filtré) Twitter