What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
TechRepublic.png 2019-09-13 15:30:56 Nest Hub Max could be a better fit for work than home (lien direct)

Features that could be creepy or simply overkill for home users could make sense for small businesses.

DarkReading.png 2019-09-13 15:00:00 US Sanctions 3 Cyber Attack Groups Tied to DPRK (lien direct)

Lazarus Group, Bluenoroff, and Andariel were named and sanctioned by the US Treasury for ongoing attacks on financial systems.

TechRepublic.png 2019-09-13 14:30:00 Cybercriminals set sights on bot attacks and mobile apps (lien direct)

The past six months have seen a 13% increase in human-initiated cyberattacks. Here\'s what cybercriminals are targeting.

SecurityWeek.png 2019-09-13 14:25:03 Shape Security Raises $51 Million at $1 Billion Valuation (lien direct)

Shape Security has raised a further $51 million in Series F growth funding, valuing the company at $1 billion. The total capital raised to date is now $183 million.

read more

SecurityWeek.png 2019-09-13 14:10:04 WiryJMPer Dropper Employs Heavy Obfuscation to Deliver Netwire (lien direct)

A recently discovered malware dropper employs heavy obfuscation and poses as a virtual coin wallet, in an attempt to deliver a Netwire payload, Avast\'s security researchers reveal.

read more

Malware
TechRepublic.png 2019-09-13 14:03:29 How ChocoPy uses Python and RISC-V to teach compiler creation (lien direct)

ChocoPy uses a modern, well-known languages and platforms for computer science instruction, avoiding legacy cruft from aging CISC assembly.

bleepingcomputer.png 2019-09-13 13:52:35 \'N1ghTm4r3\' Scam Threatens to Expose Victims Watching Illegal Porn (lien direct)

A new sextortion scam campaign is aiming for the inboxes of targets from Ireland, with the scammers using fictitious recordings of their victims watching child pornography to scare them into sending payments of £5,000 worth of Bitcoins. [...]

SecurityWeek.png 2019-09-13 13:32:06 Sophos Makes Sandboxie Free in Transition to Open Source (lien direct)

Sophos this week removed the license check and activation requirements from Sandboxie, essentially making the isolation tool free.

The move, the cybersecurity firm says, is the first step it makes toward releasing the sandbox-based isolation program open source.

read more

Tool
no_ico.png 2019-09-13 13:31:53 Instagram Confirmed Security Vulnerability – Commentary (lien direct)

Instagram\'s parent company Facebook has confirmed that a newly discovered security vulnerability may have put data at risk, leaving users open to attack by threat actors. A security researcher ran tests on the platform and he successfully retrieved “secure” user data. This data included users\' real names, Instagram account numbers and handles, and full phone numbers. The …

The ISBuzz Post: This Post Instagram Confirmed Security Vulnerability – Commentary appeared first on Information Security Buzz.

Vulnerability,Threat
DarkReading.png 2019-09-13 13:30:00 6 Questions to Ask Once You\'ve Learned of a Breach (lien direct)

With GDPR enacted and the California Consumer Privacy Act on the near horizon, companies have to sharpen up their responses. Start by asking these six questions.

TechRepublic.png 2019-09-13 13:02:00 Want to get new Python features sooner? Proposal to update programming language every 12 months (lien direct)

The proposal by Python Core Developer Lukasz Langa suggests updating Python every 12 months, but making releases smaller to compensate.

TechRepublic.png 2019-09-13 13:02:00 (Déjà vu) Top desktop as a service (DaaS) providers: Amazon, Citrix, Microsoft, VMware, and more (lien direct)

Desktop as a service adoption lags behind on-premise VDI, but the popularity of cloud-hosted desktops is growing. Here\'s a look at the top DaaS providers and their services.

WiredThreatLevel.png 2019-09-13 13:00:00 Mass Graves in Russia Tell the Grim Story of Mongol Invasion (lien direct)

After years of digging, archaeologists discover nine medieval graves holding the remains of at least 300 people.

WiredThreatLevel.png 2019-09-13 13:00:00 The Danger of Thinking We\'re All \'Addicted\' to Tech (lien direct)

Opinion: Telling ourselves that devices and platforms “hijack” our brains plays right into Big Tech\'s hands.

itsecurityguru.png 2019-09-13 12:58:04 10 Steps To Get Started In Cybersecurity Careers: What High-Achievers Do While Others Don\'t. (lien direct)

By: Emin Caliskan, Cybersecurity Trainer, Career Mentor and a finalist in the Security Leader/Mentor category in the Security Serious Unsung Heroes Awards 2019. When it comes to cybersecurity skills shortage discussions, I genuinely admire our colleagues & academics when they advise “companies” to stop looking for best-of-the-best and give opportunities to job seekers (internship, entry-level […]

The post 10 Steps To Get Started In Cybersecurity Careers: What High-Achievers Do While Others Don’t. appeared first on IT Security Guru.

Pirate.png 2019-09-13 12:44:05 IOS/Android même combat – Le risque zéro n\'existe pas – Soyons vigilants ! (lien direct)
Alors qu\'Apple annonçait il y a quelques jours la sortie de leur dernière génération d\'iPhone: l\'iPhone 11, le monde de la sécurité analysait en détails les révélations des équipes Google Project Zero concernant une campagne de hacking ciblant à distance  ces mêmes équipements mobiles d\'Apple.
itsecurityguru.png 2019-09-13 12:41:00 (Déjà vu) South African Shopping Portal Breach Leads to Theft of Payment Data. (lien direct)

Garmin Southern Africa (Garmin SA) disclosed today in a series of notifications sent to its customers that payment and sensitive personal information were stolen from orders placed on the shop.garmin.co.za shopping portal. Garmin SA was previously a Garmin distributor named Garmin Distribution Africa (GDA) before being acquired by Garmin, a global leader in satellite navigation, on September 2011.  In a press […]

The post South African Shopping Portal Breach Leads to Theft of Payment Data. appeared first on IT Security Guru.

itsecurityguru.png 2019-09-13 12:40:01 \'SimJacker\' Surverillance Attack causing Vunerabilities to 1B Mobile Users. (lien direct)

More than one billion mobile users are at risk from a SIM card flaw being currently exploited by threat actors, researchers warn. A vulnerability discovered in mobile SIM cards is being actively exploited to track phone owners\' locations, intercept calls and more – all merely by sending an SMS message to victims, researchers say. Researchers […]

The post \'SimJacker\' Surverillance Attack causing Vunerabilities to 1B Mobile Users. appeared first on IT Security Guru.

Vulnerability,Threat
itsecurityguru.png 2019-09-13 12:39:03 8,000 UNICEF Accounts Leaked Personal Data via Email Blunder. (lien direct)

The organization accidentally sent the names, email addresses, gender and professional information of users of its portal Agora in an email sent in August. The charity organization UNICEF inadvertently leaked the personal details of thousands of people who use its online learning portal Agora by way of an errant email sent to 20,000 inboxes. The email was accidentally sent […]

The post 8,000 UNICEF Accounts Leaked Personal Data via Email Blunder. appeared first on IT Security Guru.

itsecurityguru.png 2019-09-13 12:38:05 Brazilian phishing scheme using Facebook and YouTube. (lien direct)

A cybercriminal gang has put together a phishing campaign that utilizes several trusted sources, along with insider help from a top tier security company service to convince its victims to open and download a malicious attachment. Cofense Intelligence found the malicious actors, who are only targeting Brazilians, are extensively using trusted names, legitimate Windows services and the Cloudflare […]

The post Brazilian phishing scheme using Facebook and YouTube. appeared first on IT Security Guru.

itsecurityguru.png 2019-09-13 12:37:05 Account Details at Risk from Instagram Bug. (lien direct)

The vulnerability, now patched, is the latest in a series of bad news for Facebook. A now-patched Instagram vulnerability could have exposed users’ account data and phone numbers to cyberattackers, parent company Facebook confirmed in a new report from Forbes. The bug was discovered by an Israeli hacker who goes by the handle @ZHacker13. It […]

The post Account Details at Risk from Instagram Bug. appeared first on IT Security Guru.

Vulnerability
SecurityWeek.png 2019-09-13 12:20:21 IBM Launches z15 Mainframe With New Data Protection Capabilities (lien direct)

IBM z15 mainframe

IBM on Thursday unveiled the IBM z15, a mainframe that provides enterprises new capabilities for protecting sensitive customer data across hybrid multi-cloud environments.

read more

SecurityWeek.png 2019-09-13 12:06:20 Netanyahu, Trump Deny Report of Israeli Spying Near White House (lien direct)

President Benjamin Netanyahu on Thursday denied a media report that Israel spied on cell phones in the vicinity of the White House -- and President Donald Trump said he believed him.

Speaking on a trip to Russia, Netanyahu said there was no eavesdropping on cell phones around the US presidency because he had forbidden spying against the United States.

read more

Trend.png 2019-09-13 12:02:18 Hacking LED Wristbands: A \'Lightning\' Recap of RF Security Basics (lien direct)

We\'re always eager for new research and learning opportunities, but this time, serendipitously, the opportunity found us. At the closing party of the Hack In The Box Amsterdam conference - where we presented our industrial radio research and ran a CTS contest - we were given LED wristbands to wear. They\'re flashing wristbands meant to enhance the experience of an event, party, or show. At the beginning, we were not interested in the security impact; we just wanted to learn. Later on, however, we discovered that the RF link was used to transport an industrial protocol: DMX512 (Digital MultipleX 512), the same protocol used to pilot large light exhibitions.

The post Hacking LED Wristbands: A \'Lightning\' Recap of RF Security Basics appeared first on .

Hack
WiredThreatLevel.png 2019-09-13 12:00:00 Gadget Lab Podcast: Unpacking Apple\'s Big iPhone Launch Event (lien direct)

We ask WIRED senior writer Lauren Goode to give her impressions of the iPhone launch in Cupertino this week.

WiredThreatLevel.png 2019-09-13 12:00:00 \'Remnant: From the Ashes\' Makes Post-Apocalyptic Feel Real (lien direct)

Living in the aftermath is a common trope in games. This one makes it beautiful.

ZDNet.png 2019-09-13 11:58:02 InnfiRAT malware lurks in your machine to steal cryptocurrency wallet data (lien direct)

The new Trojan will also harvest information from open browser sessions.

Malware
TechRepublic.png 2019-09-13 11:40:01 Phishing scams targeting Mac users on the rise with 1.6 million attacks in 2019 (lien direct)

Kaspersky caught 1.6 million phishing attacks disguised as the Apple brand in the first six months of 2019.

TechRepublic.png 2019-09-13 11:30:00 IoT will dominate Bluetooth market in 2024 (lien direct)

By 2024, more Bluetooth shipments will be for IoT devices than for smartphones, according to a new survey.

The_Hackers_News.png 2019-09-13 11:06:09 Yikes! iOS 13 Coming Next Week With iPhone LockScreen Bypass Bug (lien direct)

Good news... next week, on September 19, Apple will roll out iOS 13, the latest version of its mobile operating system. Yes, we\'re excited about, but here comes the bad news... iOS 13 contains a vulnerability that could allow anyone to bypass the lockscreen protection on your iPhone and access some sensitive information. Jose Rodriguez, a Spanish security researcher, contacted The Hacker

Vulnerability
SecurityWeek.png 2019-09-13 11:02:01 Ukrainian Man Pleads Guilty to Hacking, Wire Fraud Charges (lien direct)

A member of a sophisticated international hacking group that authorities say targeted businesses in 47 states to steal credit and debit card records pleaded guilty to hacking and wire fraud charges in Seattle.

read more

WiredThreatLevel.png 2019-09-13 11:00:00 This Week\'s Cartoons: Apples, Dark Matter, and Procrastination (lien direct)

Do you hear the people tweet, tweeting a song of angry men …

Blog.png 2019-09-13 11:00:00 Five Thoughts on the Internet Freedom League (lien direct)
In the September/October issue of Foreign Affairs magazine, Richard Clarke and Rob Knake published an article titled "The Internet Freedom League: How to Push Back Against the Authoritarian Assault on the Web," based on their recent book The Fifth Domain. The article proposes the following:

The United States and its allies and partners should stop worrying about the risk of authoritarians splitting the Internet. 

Instead, they should split it themselves, by creating a digital bloc within which data, services, and products can flow freely, excluding countries that do not respect freedom of expression or privacy rights, engage in disruptive activity, or provide safe havens to cybercriminals...

The league would not raise a digital Iron Curtain; at least initially, most Internet traffic would still flow between members and nonmembers, and the league would primarily block companies and organizations that aid and abet cybercrime, rather than entire countries. 

Governments that fundamentally accept the idea of an open, tolerant, and democratic Internet but that struggle to live up to such a vision would have an incentive to improve their enforcement efforts in order join the league and secure connectivity for their companies and citizens. 

Of course, authoritarian regimes in China, Russia, and elsewhere will probably continue to reject that vision. 

Instead of begging and pleading with such governments to play nice, from now on, the United States and its allies should lay down the law: follow the rules, or get cut off.

My initial reaction to this line of thought was not encouraging. Rather than continue exchanging Twitter messages, Rob and I had a very pleasant phone conversation to help each other understand our points of view. Rob asked me to document my thoughts in a blog post, so this is the result.

Rob explained that the main goal of the IFL is to create leverage to influence those who do not implement an open, tolerant, and democratic Internet (summarized below as OTDI). I agree that leverage is certainly lacking, but I wondered if the IFL would accomplish that goal. My reservations included the following.

1. Many countries that currently reject the OTDI might only be too happy to be cut off from the Western Internet. These countries do not want their citizens accessing the OTDI. Currently dissidents and others seeking news beyond their local borders must often use virtual private networks and other means to access the OTDI. If the IFL went live, those dissidents and others would be cut off, thanks to their government\'s resistance to OTDI principles.

2. Elites in anti-OTDI countries would still find ways to access the Western Internet, either for personal, business, political, military, or intelligence reasons. The common person would be mostly likely to suffer.

3. Segregating the OTDI would increase the incentives for "network traffic smuggling," whereby anti-OTDI elites would compromise, bribe, or otherwise corrupt Western Internet resources to establish surreptitious methods to access the OTDI. This would increase the intrusion pressure upon o
WiredThreatLevel.png 2019-09-13 11:00:00 Meet a Mad Scientist Who Flies Into Hurricanes (lien direct)

A hurricane bounces NOAA\'s sensor-packed plane around with such violence, the crew spends a good amount of time in zero G.

ZDNet.png 2019-09-13 10:54:00 Scammer behind sextortion campaigns arrested in France (lien direct)

Twenty-year-old Frenchman arrested at Paris Airport on Monday for extorting tens of victims.

SecurityWeek.png 2019-09-13 10:53:00 Israeli Spyware Firm Adopts \'Human Rights Policy\' (lien direct)

An Israeli spyware company that has been accused of helping authoritarian governments stifle dissent says it has adopted "a new human rights policy" to ensure its software is not misused.

read more

ZDNet.png 2019-09-13 10:45:02 France will attempt to block Facebook\'s Libra cryptocurrency on European soil (lien direct)

Country officials say unresolved privacy issues could pose a risk to consumers.

no_ico.png 2019-09-13 10:42:01 IoT Attacks On Internet-Connected Gas Pumps – Expert Commentary (lien direct)

A recent report shows an increase in discussion on dark web forums about compromising internet-connected gas pumps. One way this is already being achieved is by hackers selling modified smart meters, following on from Russian government legislation mandating that all electricity meters in the country should be replaced by online smart meters. However, users of Russian underground …

The ISBuzz Post: This Post IoT Attacks On Internet-Connected Gas Pumps – Expert Commentary appeared first on Information Security Buzz.

securityintelligence.png 2019-09-13 10:30:02 How to Select the Right IDaaS Vendor and Avoid Deployment Pain Points (lien direct)

>Reading Time: 4 minutes Companies of all sizes are turning to IDaaS vendors to help them protect systems, applications, identities and data wherever they reside - whether in the cloud, on-premises or on mobile devices.

The post How to Select the Right IDaaS Vendor and Avoid Deployment Pain Points appeared first on Security Intelligence.

SecurityWeek.png 2019-09-13 10:10:01 Android Flashlight Apps Request up to 77 Permissions (lien direct)

An analysis of Android flashlight applications available in Google Play has revealed that they request an average of 25 permissions, with some requesting up to 77 permissions when installed.

read more

bleepingcomputer.png 2019-09-13 10:00:11 Windows 10 1903 KB4515384 Update Affects Audio Quality in Games (lien direct)

The KB4515384 Cumulative Update for Windows 10, version 1903 is causing audio quality downgrade issues in multiple games according to numerous user reports. [...]

SecurityWeek.png 2019-09-13 09:49:01 DoS Vulnerabilities Patched in NETGEAR N300 Routers (lien direct)

A firmware update NETGEAR recently released for the N300 series routers addresses two denial-of-service (DoS) vulnerabilities found by security researchers at Cisco\'s Talos group.

Tracked as CVE-2019-5054, the first of the two bugs resides in the session handling functionality of the NETGEAR N300 (WNR2000v5) HTTP server.

read more

SecurityWeek.png 2019-09-13 09:27:05 Russian Hackers Behind Ukraine Power Outage May Have Sought More Damage (lien direct)

The Russia-linked hackers who triggered a power outage in Ukraine back in 2016 may have hoped to cause much more damage, according to a report published recently by U.S.-based industrial cybersecurity firm Dragos.

read more

silicon.fr.png 2019-09-13 09:20:04 Google One : vers un " guichet unique " pour les backups Android (lien direct)

Consolidation progressive, au sein de l\'application Google One, des fonctionnalités de sauvegarde automatique des appareils Android.

01net.png 2019-09-13 07:28:00 Ces SMS " invisibles " pourraient géolocaliser plus d\'un milliard de mobiles (lien direct)

Une faille dans certaines cartes SIM permet de prendre le contrôle d\'un téléphone portable par l\'envoi d\'un simple SMS " caché ". Baptisée " Simjacker ", cette attaque utilisée activement sur le terrain, sans doute par des agences gouvernementales, pourrait potentiellement toucher un milliard d\'abonnés.

Pirate.png 2019-09-13 07:18:04 Protection de la vie privée – Les sujets à suivre de près (lien direct)
Avec la technologie, impossible de baisser la garde. Si la course aux changements et à l\'innovation fascine, elle peut être à double tranchant. La protection de la vie privée est en effet le plus gros défi auquel sont aujourd\'hui confrontées les entreprises.
Korben.png 2019-09-13 07:00:37 FPS dans le navigateur #2 : Rush Team (lien direct)

De retour ce vendredi avec l’épisode 2 de ma série de la rentrée sur les FPS par navigateur. Vous n’avez le droit de lire la suite que si vous avez terminé Wolfenstein 3D comme demandé … mais nan j’déconne 😉 Cette semaine, place à Rush Team, un de mes jeux … Suite

SecurityAffairs.png 2019-09-13 06:51:03 Poland to establish Cyberspace Defence Force by 2024 (lien direct)

Poland announced it will launch a cyberspace defense force by 2024 composed of around 2,000 soldiers with a deep knowledge in cybersecurity. The Polish Defence Ministry Mariusz Blaszczak has approved the creation of a cyberspace defence force by 2024, it will be composed of around 2,000 soldiers with deep expertise in cybersecurity. The news was […]

The post Poland to establish Cyberspace Defence Force by 2024 appeared first on Security Affairs.

Pirate.png 2019-09-13 06:22:03 Comment mettre la nouvelle technologie au service de notre planète ? (lien direct)
Tous les jours, les innovations technologiques nous offrent de nouveaux moyens de résoudre les problèmes environnementaux.
bleepingcomputer.png 2019-09-13 05:56:05 Giant Entercom Radio Network Deals with Ransomware-Like Incident (lien direct)

Entercom Communications, one of the largest radio station owners in the U.S. has been dealing with a cyberattack that looks very much like a ransomware incident. The issue occurred over the past weekend and affects all offices the company has across the country. [...]

Ransomware
3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23

Information mise à jours le: 2019-09-22 08:07:45
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Notre RSS (filtré) Twitter