What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
no_ico.png 2019-03-15 11:15:00 Red Team Project Set Up To Help Secure Open-Source Software (lien direct)

It has been reported that at this week’s Open Source Leadership Summit, the Linux Foundation announced the Red Team Project. This has been set up as an incubator for open-source Red Team security tools. These include programs that support cyber range automation, containerised pentesting utilities, binary risk analysis, and standards validation programs.  Thomas Richards, Network and Red Team Practice Director at Synopsys: “This project is …

The ISBuzz Post: This Post Red Team Project Set Up To Help Secure Open-Source Software appeared first on Information Security Buzz.

itsecurityguru.png 2019-03-15 11:12:05 Database of around 33 million job profiles in China is accessible online. (lien direct)

A large database with approximately 33 million profiles for people seeking jobs in China has been fully accessible and unprotected online. This information included sensitive information that could have been used for scammers and identity theft. The database was discovered by Sanyam Jain, a security researcher and member of GDI.Foundation, who found the database using the Shodan […]

The post Database of around 33 million job profiles in China is accessible online. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-15 11:12:01 Majority of businesses exploring AI and machine learning. (lien direct)

The use of more artificial intelligence to improve security has been touted for a while. New research from Webroot reveals that a majority of business are now actively exploring the technology. It finds 71 percent of businesses surveyed in the United States plan to use more artificial intelligence and machine learning in their cybersecurity tools this year. […]

The post Majority of businesses exploring AI and machine learning. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-15 11:11:03 Iranian hackers hit personal phone of Benny Gantz. (lien direct)

Iranian hackers in recent months broke into the personal phone of Benny Gantz, a leading candidate in next month\'s elections, and obtained its entire contents, according to a report Thursday. Two senior Shin Bet security service officials approached the Blue and White party chairman last month to inform him that his cellular phone had been […]

The post Iranian hackers hit personal phone of Benny Gantz. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-15 11:10:01 New malware affects e-commerce sites to steal payment data. (lien direct)

The rash of e-commerce sites infected with card-skimming malware is showing no signs of abating. Researchers on Thursday revealed that seven sites-each with more than 500,000 collective visitors per month-have been compromised with a previously unseen strain of sniffing malware designed to surreptitiously swoop in and steal payment card data as soon as visitors make […]

The post New malware affects e-commerce sites to steal payment data. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-15 11:08:04 Chinese online shopping giant exposes millions of user profiles and shopping orders. (lien direct)

Gearbest, a Chinese online shopping giant, has exposed millions of user profiles and shopping orders, security researchers have found. Security researcher Noam Rotem found an Elasticsearch server leaking millions of records each week, including customer data, orders and payment records. The server wasn\'t protected with a password, allowing anyone to search the data. Gearbest ranks as […]

The post Chinese online shopping giant exposes millions of user profiles and shopping orders. appeared first on IT Security Guru.

DarkReading.png 2019-03-15 11:00:00 Proof-of-Concept Tracking System Finds RATs Worldwide (lien direct)

Using a combination of Shodan scans and data from partners, Recorded Future finds nearly 500 malware controllers for 14 different families of remote-access Trojans, as well as the corporate networks they have infected.

WiredThreatLevel.png 2019-03-15 11:00:00 How Hackers Pulled Off a $20 Million Mexican Bank Heist (lien direct)

Welcome to the world of fake accounts, phantom funds, and money mules.

WiredThreatLevel.png 2019-03-15 11:00:00 Caught in an Avalanche? The Right Gear Could Save Your Life (lien direct)

Tech tools and rescue equipment are helping more people survive avalanches. The best defense? Don\'t get caught in one.

WiredThreatLevel.png 2019-03-15 11:00:00 TV Review: \'Love, Death & Robots\' and the Rise of NSFW Netflix (lien direct)

The animated anthology isn\'t for the faint of heart-but it\'s a wild ride for the curious of spirit.

WiredThreatLevel.png 2019-03-15 11:00:00 This Guy Predicted Society\'s Thirst for Internet Fame-in 1999 (lien direct)

Early dot-com millionaire Josh Harris spent his fortune on a series of lurid social experiments to prove his point that people didn\'t want just 15 minutes of fame in their lives. They wanted it every day.

itsecurityguru.png 2019-03-15 10:59:05 Ransomware attack causes students to lose GCSE coursework. (lien direct)

Hackers have used ransomware to encrypt files at a school, causing it to lose some students’ GCSE coursework. The Sir John Colfox Academy in Bridport, Dorset, said a member of staff mistakenly opened an email containing a virus. The email claimed to be from a colleague at another Dorset school and infected the computer network. […]

The post Ransomware attack causes students to lose GCSE coursework. appeared first on IT Security Guru.

TechRepublic.png 2019-03-15 10:20:01 Microsoft Launcher and Your Phone: Bringing Windows to Android (lien direct)

Way back when, Steve Ballmer talked about "Three screens and the cloud". With its latest tools, Microsoft has finally delivered on that vision.

TechRepublic.png 2019-03-15 09:29:01 Georgia homeland security: We rely on IoT and FirstNet for emergencies and disasters (lien direct)

From law enforcement to hurricanes and even the Super Bowl, Georgia Emergency Management Agency and Homeland Security is relying on smart cities and IoT technology backed up by AT&T\'s FirstNet.

ZDNet.png 2019-03-15 09:24:02 Former Mt. Gox CEO found guilty of record tampering, but likely to avoid prison (lien direct)

Mark Karpeles has been found guilty of fiddling accounts but not embezzlement in the Mt. Gox case.

SecurityAffairs.png 2019-03-15 08:48:01 Experts published details of the actively exploited CVE-2019-0808 Windows Flaw (lien direct)

Experts from Qihoo 360 disclosed technical details of the actively exploited Windows zero-day flaw CVE-2019-0808 recently patched by Microsoft. Researchers at the security firm Qihoo 360 disclosed technical details of the zero-day vulnerability CVE-2019-0808 that was recently patched by Microsoft. The vulnerability was reported to Microsoft by researchers from Google\'s Threat Analysis Group that observed […]

The post Experts published details of the actively exploited CVE-2019-0808 Windows Flaw appeared first on Security Affairs.

Korben.png 2019-03-15 08:06:05 Liens de la semaine #11 (lien direct)

Yooo Alors comment s’est déroulée votre semaine ? La mienne est passée à la vitesse de l’éclair, mais j’ai pu boucler mon 1er livre (en tant qu’auteur, hein, pas lecteur ^^) alors je suis heureux. Je vous en reparlerai bientôt. N’ayant dormi que 5h cette nuit, il n’y aura pas … Suite

SecurityAffairs.png 2019-03-15 07:53:04 A few binary plating 0-days for Windows (lien direct)

While we were thinking about a way to escalate privileges during a pen-test, we discovered that most Windows installations were vulnerable to binary planting. A long time ago, while we were thinking about a way to escalate privileges during a pen-test, we discovered that most Windows installations were vulnerable to binary planting. We contacted Microsoft, but […]

The post A few binary plating 0-days for Windows appeared first on Security Affairs.

SecurityAffairs.png 2019-03-15 07:34:03 GlitchPOS PoS Malware appears in the cybercrime underground (lien direct)

A new piece of PoS malware appeared in the threat landscape, the malicious code dubbed GlitchPOS has been found on a crimeware forum. The GlitchPOS malware is able to steal credit card numbers (Track1 and Track2) from the memory of the infected system, it uses a regular expression to perform this task. The malicious code […]

The post GlitchPOS PoS Malware appears in the cybercrime underground appeared first on Security Affairs.

SecurityWeek.png 2019-03-15 07:05:05 Details of Actively Exploited Windows Flaw Made Public (lien direct)

Researchers from Chinese cybersecurity firm Qihoo 360 have made public technical details that can be used to construct a proof-of-concept (PoC) exploit for CVE-2019-0808, a recently patched Windows vulnerability that has been involved in targeted attacks.

read more

SecurityWeek.png 2019-03-15 06:06:04 NATO Takes Huawei Security Concerns Seriously: Stoltenberg (lien direct)

Security concerns about the role of Huawei in Western 5G telecom infrastructure are to be taken seriously, the head of NATO said Thursday, as Washington steps up pressure on Europe not to use the Chinese firm.

read more

WiredThreatLevel.png 2019-03-15 04:59:01 Elon Musk\'s Model Y SUV Brings More Tesla to More Masses (lien direct)

It has up to 300 miles of range, starts at $39,000, and is due out in fall 2020. Oh, and it has a panoramic glass roof.

bleepingcomputer.png 2019-03-15 04:01:00 New Tune Extension Turns Google Chrome Into a Safe Space (lien direct)

Are you annoyed with all the vitriolic and angry comments that you see on social media? If so, then a new and experimental Chrome extension called Tune is hoping to help you dial it down. [...]

WiredThreatLevel.png 2019-03-15 02:47:01 LIVE: Tesla Debuts the Model Y, Its Baby SUV (lien direct)

Follow along with us as Elon Musk takes the stage to show off Tesla\'s latest creation.

The_Hackers_News.png 2019-03-15 01:17:00 Patched WinRAR Bug Still Under Active Attack-Thanks to No Auto-Updates (lien direct)

Various cyber criminal groups and individual hackers are still exploiting a recently patched critical code execution vulnerability in WinRAR, a popular Windows file compression application with 500 million users worldwide. Why? Because the WinRAR software doesn\'t have an auto-update feature, which, unfortunately, leaves millions of its users vulnerable to cyber attacks. The critical

no_ico.png 2019-03-14 23:21:04 US IoT Cybersecurity Bill (lien direct)

Legislation was introduced Monday that would create cybersecurity standards for internet-connected devices, the “internet of things.” The Internet of Things (IoT) Cybersecurity Improvement Act of 2019, introduced in the Senate by Sens. Mark Warner (D-Va.) and Cory Gardner (R-Colo.) and in the House by Reps. Will Hurd (R-Texas) and Robin Kelly (D-Ill.), would require established standards …

The ISBuzz Post: This Post US IoT Cybersecurity Bill appeared first on Information Security Buzz.

WiredThreatLevel.png 2019-03-14 22:34:04 How to Watch Tesla\'s Model Y Reveal Tonight (lien direct)

Elon Musk takes the stage tonight to show off his automaker\'s new baby SUV-here\'s what we know and how to stay up to speed.

SecurityAffairs.png 2019-03-14 22:03:00 Payment data of thousands of customers of UK and US online stores could have been compromised (lien direct)

Group-IB, an international company that specializes in preventing cyberattacks, has uncovered a malicious code designed to steal customers\' payment data on seven online stores in the UK and the US. The injected code has been identified as a new JavaScript Sniffer (JS Sniffer), dubbed by Group-IB as GMO. Group-IB Threat Intelligence team first discovered the GMO JS Sniffer on the […]

The post Payment data of thousands of customers of UK and US online stores could have been compromised appeared first on Security Affairs.

no_ico.png 2019-03-14 21:16:00 Ransomware Attack On The US Committee For Public Counsel Services (lien direct)

A ransomware attack on the Committee for Public Counsel Services (CPCS), the agency overseeing public defenders in the US, has caused a major slowdown – disabling email systems, delaying some hearings, and holding up payments for the private attorneys who represent clients.  They are not alone, Jackson County Georgia also reported paying out $400,000 in ransom …

The ISBuzz Post: This Post Ransomware Attack On The US Committee For Public Counsel Services appeared first on Information Security Buzz.

DarkReading.png 2019-03-14 20:45:00 Criminals Use One Line of Code to Steal Card Data from E-Commerce Sites (lien direct)

New JavaScript sniffer is similar to malware used in the Magecart campaign last year that affected over 800 sites.

ZDNet.png 2019-03-14 20:24:00 Two-thirds of all Android antivirus apps are frauds (lien direct)

Only 23 Android antivirus apps had a 100 percent detection rate with no false positives.

Kaspersky.png 2019-03-14 20:19:01 Threatlist: IMAP-Based Attacks Compromising Accounts at \'Unprecedented Scale\' (lien direct)

Attackers are increasingly targeting insecure legacy protocols, like IMAP, to avoid running into multi-factor authentication in password-spraying campaigns.

WiredThreatLevel.png 2019-03-14 20:02:00 Facebook\'s Head of Product Leaves After Privacy Pivot (lien direct)

Chris Cox announced he\'s leaving the company one week after Mark Zuckerberg published his privacy manifesto. WhatsApp VP Chris Daniels is also out.

Kaspersky.png 2019-03-14 19:43:05 Zero-Days in Counter-Strike Client Used to Build Major Botnet (lien direct)

A full 39 percent of Counter-Strike 1.6 game servers on Steam were found to be malicious.

no_ico.png 2019-03-14 19:30:04 Phishing Attacks Hook Half Of UK Organisation Over The Past Two Years (lien direct)

Research by Sophos has revealed that almost half of UK businesses have been compromised by phishing attacks in the last two years.  The research explained that bigger firms (those with between 500 and 1,000 employees) are more likely to be affected by such attacks, despite 78% of them offering their staff enhanced cybersecurity training, compared …

The ISBuzz Post: This Post Phishing Attacks Hook Half Of UK Organisation Over The Past Two Years appeared first on Information Security Buzz.

SecurityAffairs.png 2019-03-14 19:27:03 Torrent Risks: How to get infected through torrent with a good reputation (lien direct)

Experts at Z-Lab Yoroi/Cybaze have conducted an interesting analysis on the risks for users downloading films, games, and software through Torrent. Digital media sharing is one of the most relevant phenomena since the advent of the internet. During the 80\'s and 90\'s, with the rapid growth the Internet, people around the world started sharing digital […]

The post Torrent Risks: How to get infected through torrent with a good reputation appeared first on Security Affairs.

mcafee.png 2019-03-14 19:00:05 Attackers Exploiting WinRAR UNACEV2.DLL Vulnerability (CVE-2018-20250) (lien direct)

Earlier this month Check Point Research reported discovery of a 19 year old code execution vulnerability in the wildly popular WinRAR compression tool. Rarlab reports that that are over 500 million users of this program. While a patched version, 5.70, was released on February 26, attackers are releasing exploits in an effort to reach vulnerable […]

The post Attackers Exploiting WinRAR UNACEV2.DLL Vulnerability (CVE-2018-20250) appeared first on McAfee Blogs.

TechRepublic.png 2019-03-14 18:51:00 ​Securing the mobile enterprise means thinking outside the VPN box (lien direct)

As employees access clouds and apps untethered to corporate networks, managers must create new security architectures.

DarkReading.png 2019-03-14 18:45:00 Ransomware\'s New Normal (lien direct)

GandCrab\'s evolution underscores a shift in ransomware attack methods.

WiredThreatLevel.png 2019-03-14 18:17:04 Facebook\'s Sloppy Data-Sharing Deals Might Be Criminal (lien direct)

Prosecutors in New York reportedly are investigating the company\'s sharing agreements with other firms, which may have exposed personal information without user consent.

securityintelligence.png 2019-03-14 18:15:02 Application Security Has Nothing to Do With Luck (lien direct)

>If a safe, secure product and a satisfied customer base is the pot of gold at the end of your rainbow, it\'s time to build application security processes into your development cycle.

The post Application Security Has Nothing to Do With Luck appeared first on Security Intelligence.

bleepingcomputer.png 2019-03-14 17:41:05 Google Chrome Adding Support For Nintendo Switch Gamepads (lien direct)

You will soon be able to use the Nintendo Switch gamepads to control online games in Google Chrome using the GamePad API. [...]

MalwarebytesLabs.png 2019-03-14 17:37:05 Mozilla launches Firefox Send for private file sharing (lien direct) Mozilla recently launched Firefox Send, a new, secure way to share files from inside your browser. We discuss the pros and cons of this service.

Categories:

Cybercrime Privacy

Tags:

(Read more...)

The post Mozilla launches Firefox Send for private file sharing appeared first on Malwarebytes Labs.

TechRepublic.png 2019-03-14 17:26:02 7 commands to reinstall or upgrade Windows 10 computers (lien direct)

Reinstalling or upgrading Windows 10 has never been easier. With a few keystrokes, admins may refresh, update, or erase existing installations.

datasecuritybreach.png 2019-03-14 17:19:02 Patch Tuesday – Mars 2019 : 65 vulnérabilités dont 18 critiques (lien direct)

Le Patch Tuesday du mois de mars corrige 65 vulnérabilités dont 18 identifiées comme critiques. 13 de ces vulnérabilités critiques concernent les moteurs de scripts et des composants de navigateur et impactent les navigateurs Microsoft ainsi que la suite Office. Trois vulnérabilités entraînant une exécution de code à distance (RCE) sont corrigées sur le client […]

L\'article Patch Tuesday – Mars 2019 : 65 vulnérabilités dont 18 critiques est apparu en premier sur Data Security Breach.

Blog.png 2019-03-14 17:06:03 Web Developer: 1: Vulnhub Lab Walkthrough (lien direct)

Hello friends! Today we are going to take another boot2root challenge known as “Web Developer: 1”. The credit for making this VM machine goes to “Fred Wemeijer” and it is another boot2root challenge in which our goal is to get root access to complete the challenge. You can download this VM here. Security Level: Intermediate... Continue reading

The post Web Developer: 1: Vulnhub Lab Walkthrough appeared first on Hacking Articles.

no_ico.png 2019-03-14 17:00:03 Independent Professor Comments On The Facts & Fiction (lien direct)

Seemingly, the next evolution of technology will hinge on the successful launch of 5G. Driverless cars, video communication, remote devices, instant streaming and smart cities– all rely on pervasive and constant internet connection.  As we come to grips with a constantly connected world where all of our devices \'talk\' to each other, industries will find new …

The ISBuzz Post: This Post Independent Professor Comments On The Facts & Fiction appeared first on Information Security Buzz.

TechRepublic.png 2019-03-14 16:52:00 Loupedeck+ console continues to prove its worth in the creative space (lien direct)

Originally designed to be a Lightroom photo editing console, Loupedeck slowly integrates into even more creative apps.

bleepingcomputer.png 2019-03-14 16:49:05 Google Now Lets G Suite Admins Disable Insecure Phone 2FA (lien direct)

Google added a new Admin console option for G Suite admins designed to help them disable telephony options as two-factor authentication (2FA) methods for G Suite accounts in their domain, preventing users from using SMS and voice codes when authenticating. [...]

SecurityWeek.png 2019-03-14 16:49:04 WordPress 5.1.1 Patches Remote Code Execution Vulnerability (lien direct)

WordPress this week addressed a vulnerability that could allow an unauthenticated attacker to execute code remotely and take over vulnerable websites. 

read more

4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24

Information mise à jours le: 2019-03-26 04:01:32
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Notre RSS (filtré) Twitter