What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
itsecurityguru.png 2019-01-09 16:51:00 Cybersecurity In 2019. (lien direct)

Corporate Cybersecurity is a huge concern for both customers and business owners alike with the number of attacks keep growing month on month. 2018 has seen a multitude of hacks and breaches coming from a wide array attack vectors. Companies have been left with data losses, stolen customer information and compromised networks. Big business just […]

The post Cybersecurity In 2019. appeared first on IT Security Guru.

itsecurityguru.png 2019-01-09 16:51:00 Parkbob Teams Up With Amazon At CES To Launch New Alexa Skill To Help You Park In Major U.S. Cities. (lien direct)

The Austrian start-up Parkbob has teamed up with Amazon to launch a new skill for Alexa-enabled devices at CES in Las Vegas, including the Anker Roav, Garmin Speak and soon, Echo Auto. The Parking Made Easy-Skill lets customers ask Alexa how long they can stay in their current parking spot or the location of the […]

The post Parkbob Teams Up With Amazon At CES To Launch New Alexa Skill To Help You Park In Major U.S. Cities. appeared first on IT Security Guru.

itsecurityguru.png 2019-01-09 16:51:00 Botnets And Machine Learning: A Story Of “Hide And Seek”. (lien direct)

By Leonidas Plagakis, Security Engineer, RiverSafe Malware authors have always been trying to update their software and evolve their techniques in order to take advantage of new technologies and bypass security measures. Botnets are a perfect example of how cyber criminals have managed to accomplish that over the last decade. Their wide spread and severe […]

The post Botnets And Machine Learning: A Story Of “Hide And Seek”. appeared first on IT Security Guru.

itsecurityguru.png 2019-01-09 16:51:00 A10 Networks Thunder® Convergent Firewall Selected for 5G Network Deployment By Major Japanese Mobile Carrier. (lien direct)

A10 Networks (NYSE: ATEN), a leading provider of intelligent and automated cybersecurity solutions, today announced a major Japanese mobile carrier has selected the A10 Thunder® Convergent Firewall (CFW) Gi/SGi firewall solution for its 5G production network, to support the huge network capacity and throughput of 5G and reduce total cost of infrastructure. A10 Networks has […]

The post A10 Networks Thunder® Convergent Firewall Selected for 5G Network Deployment By Major Japanese Mobile Carrier. appeared first on IT Security Guru.

itsecurityguru.png 2019-01-09 16:51:00 Multi-Purpose Attack Thingbots Threaten Internet Stability And Human Life. (lien direct)

New research from F5 Labs has revealed that IoT devices are now cybercriminals\' top attack target, surpassing web and application services, and email servers. Gartner currently estimates that the number IoT devices will surge to 20,4 billion by 20201, which represents a staggering 143% growth rate over three years. “IoT devices already outnumber people and […]

The post Multi-Purpose Attack Thingbots Threaten Internet Stability And Human Life. appeared first on IT Security Guru.

itsecurityguru.png 2019-01-09 16:51:00 IoMT Fraud Platform Cynerio Secures $7 Million Funding To Drive US Market Development. (lien direct)

Cynerio today announced the completion of its $7 million funding round to fuel growth in North America for its 100% healthcare focused cyber security platform. Investors include global VCs, Accelmed, a leading investment firm focused on value creation for medical device companies and technologies, RDC (a joint venture between Elron and Rafael), which invests in […]

The post IoMT Fraud Platform Cynerio Secures $7 Million Funding To Drive US Market Development. appeared first on IT Security Guru.

ZDNet.png 2019-01-09 16:47:00 German police ask router owners for help in identifying a bomber\'s MAC address (lien direct)

In a first, German police asks router owners to comb logs for f8:e0:79:af:57:eb and report any sightings to authorities.

TechRepublic.png 2019-01-09 16:45:01 Office Q&A: How to anchor image files in Microsoft Word (lien direct)

If graphics are making a mess of your Word document, anchor them in place.

TechRepublic.png 2019-01-09 16:43:03 Microsoft adds more mobile, scheduling capabilities to Teams for firstline workers (lien direct)

Microsoft is adding location-sharing, a smart camera and secure messaging capabilities to its Teams group-chat product, specifically targeting mobile, firstline workers.

TechRepublic.png 2019-01-09 16:31:05 WordPress users beware: These 10 plugins are most vulnerable to attacks (lien direct)

WordPress vulnerabilities tripled over the past year, more than any other CMS, according to an Imperva report.

WiredThreatLevel.png 2019-01-09 16:29:02 Two to Tango: Twitter Fact-Checks the Fact-Checkers (lien direct)

Last night an Associated Press tweet claimed that, in placing blame for the government shutdown, "it takes two to tango." Twitter thought otherwise.

TechRepublic.png 2019-01-09 16:26:04 15% of job seekers now land a job through social media (lien direct)

Along with traditional networking, job seekers also rely on a mix of digital platforms to find employment, according to a Clutch survey.

bleepingcomputer.png 2019-01-09 16:20:02 AMD Unveils 7nm Radeon VII GPU as Response to NVIDIA\'s RTX 2080 (lien direct)

The AMD Radeon VII graphics chip is built using the enhanced second-generation Vega architecture and a 7nm process technology, and will come with DirectX 12 and Vulkan support, as well as a $699 price tag [...]

TechRepublic.png 2019-01-09 16:18:02 CES 2019: Yuneec\'s Mantis Q drone comes with gesture and voice control (lien direct)

The Mantis-Q aims to be the preferred drone for intermediate to entry-level drone pilots, thanks to its design and user interface.

Kaspersky.png 2019-01-09 16:16:05 Intel Patches High-Severity Privilege-Escalation Bugs (lien direct)

Overall, the chip giant patched five vulnerabilities across an array of its products.

bleepingcomputer.png 2019-01-09 16:09:05 Hyatt Launches Public Bug Bounty Program on HackerOne (lien direct)

Today Hyatt Hotels Corporation announced the release of their public bug bounty program on Hacker One. Using this program, researchers can be rewarded for reporting vulnerabilities on three Hyatt web sites and their mobile applications for Android and iOS. [...]

TechRepublic.png 2019-01-09 15:50:00 All the flash-y new storage technologies showcased at CES 2019 (lien direct)

Higher densities and new storage technologies for specialized use cases were unveiled at CES 2019. Here\'s what you need to know.

TechRepublic.png 2019-01-09 15:04:03 Top 5 ways humans bias machine learning (lien direct)

Tom Merritt explains the five ways human error can create issues with machine learning.

TechRepublic.png 2019-01-09 15:04:00 Kiwi for Gmail perfect for professionals who depend on Google services (lien direct)

Not only does Kiwi for Gmail provide easy access to Google tools, but the Focus Filters feature makes sifting through emails a breeze.

WiredThreatLevel.png 2019-01-09 15:00:00 CES 2019 Liveblog Day 3: Wednesday\'s News and Photos, Live From Las Vegas (lien direct)

This year\'s CES, one of the biggest consumer tech showcases in the world, continues Wednesday. Join us for live updates from the show in Las Vegas, Nevada.

WiredThreatLevel.png 2019-01-09 15:00:00 Photo Gallery: A Family\'s Nuclear Legacy, Etched in Silver (lien direct)

Michael Koerner\'s collodion "chemigrams" reveal a lifetime of inherited genetic mutations.

Chercheur.png 2019-01-09 14:46:03 Patch Tuesday, January 2019 Edition (lien direct)

Microsoft on Tuesday released updates to fix roughly four dozen security issues with its Windows operating systems and related software. All things considered, this first Patch Tuesday of 2019 is fairly mild, bereft as it is of any new Adobe Flash updates or zero-day exploits. But there are a few spicy bits to keep in mind. Read on for the gory details.

TechRepublic.png 2019-01-09 14:37:03 CES 2019: Will this ultra-thin portable monitor be the paper of the future? (lien direct)

Faytech\'s Lapscreen weighs less than 1 lb and is the size of a sheet of paper, and could be a useful tool for traveling business professionals.

securityintelligence.png 2019-01-09 14:25:01 Deciphering the Encryption Paradox (lien direct)

>The practice of protecting network data with encryption is gaining steam, and with good reason. But companies need adequate network visibility to keep up with threats that evade traditional detection.

The post Deciphering the Encryption Paradox appeared first on Security Intelligence.

bleepingcomputer.png 2019-01-09 14:19:01 Google Rolls Out Activity Cards to Help You Find Past Searches (lien direct)

Google is currently rolling out an activity cards feature teased in a September blog post and allowing users to see search results found in the past while searching for similar terms. Released for mobile web and Google app users. [...]

Checkpoint.png 2019-01-09 14:00:04 Motortech strengthens threat prevention with Check Point Infinity (lien direct)

Cybercrime continues to plague organizations across the world, causing immense amounts of damage and confusion. In 2018, we witnessed an alarming number of large scale data breaches, and the repercussions were both dangerous and costly. Motortech, a specialist manufacturer of parts and accessories for stationary gas engines, recognized the potential damage an attack could inflict,…

The post Motortech strengthens threat prevention with Check Point Infinity appeared first on Check Point Software Blog.

no_ico.png 2019-01-09 14:00:04 The Government Shutdown Affect On Cybersecurity Inbox (lien direct)

Expert Comments below: John McCumber, Director of Cybersecurity Advocacy, North America at (ISC)2: “The government\'s shutdown may lead to longer-term challenges when it comes to the management of our national cybersecurity workforce. The Federal government is already facing an uphill battle in the recruiting competition against higher-paying private sector organizations and issues like this only …

The ISBuzz Post: This Post The Government Shutdown Affect On Cybersecurity Inbox appeared first on Information Security Buzz.

AlienVault.png 2019-01-09 14:00:00 AlienVault in Gartner MQ for SIEM (lien direct)

Gartner just released their 2018 Magic Quadrant for Security Information and Event Management (SIEM), which we’re once again excited to be part of!

Our inclusion in the Gartner SIEM MQ is further validation that our unique, unified approach to threat detection and response continues to resonate.  Many continue to struggle with increasingly advanced threats, expanding attack surfaces, and a growing list of compliance requirements -- all with less IT staff, time, and money.

Since the beginning, AlienVault has taken a different approach to SIEM. We’ve sought to eliminate the main two barriers inherit to traditional SIEM offerings -- cost and usability.

Let’s face it, when it comes to most SIEM purchases, companies are left holding the bag for a very expensive “solution,” which they now have to try and make work. That’s like buying a new car, but only getting the frame and a box of engine parts — then being told some assembly required if you actually want to drive the car (and if you’re wondering about the tires, those are extra too). AlienVault set out to change this when we launched our Unified Security Management® (USM) solution.

Our goal has always been to make it as simple as possible for IT and security pros to quickly detect threats, efficiently respond to breaches, and manage compliance. This meant going beyond SIEM to deliver complete threat management, out-of-the-box -- no additional product purchases necessary, no convoluted licensing models, and no complicated integrations required.

We’ve stayed true to that goal with USM Anywhere™, our SaaS platform that seamlessly combines the essential security capabilities organizations need, while removing the administrative overhead they don’t. We appreciate that Gartner calls out AlienVault USM’s straightforward implementation -- two words you rarely hear when it comes to SIEM! Our simplified approach to SIEM and threat management is further evidenced by the fact that 46 percent of our customers are detecting threats on day one!

Moreover, our extensible SaaS architecture and growing “galaxy” of AlienApps allow us to rapidly deliver new features and functionality, including powerful, built-in response automation and orchestration with third-party IT and security technologies. Not only does this allow our customers to capitalize on existing investments, it saves valuable time and effort by enabling them to bring more of their security monitoring tools into USM’s single pane of glass -- without any daunting integration work!

And We’re Just Getting Started . . .

As we continue our evolution to AT&T Cybersecurity, we’re harnessing the power of one of the world’s largest cybersecurity operations.

 “Okay, but what does this mean?” you ask. 

 It means we’re now delivering a unique combination of people, process, and technology to not only help you better detect and respond to threats, but also mitigate and manage ongoing risks. We’ll also continue to enrich our threat intelligence (now augmented with AT&T threat data), and improve the USM Anywhere platform, delivering new capabilities that simplify and automate your critical security processes, improve your security and compliance posture, and outpace the ever-evolving threat landscape.

More to come . . .

WiredThreatLevel.png 2019-01-09 14:00:00 Earthquake Warning App ShakeAlertLA Debuts in Los Angeles (lien direct)

The app gives city residents a few seconds\' warning when an earthquake hits. It\'s the first publicly available app to do so in the US.

WiredThreatLevel.png 2019-01-09 14:00:00 How Tech Shaped \'The Scream,\' \'The Kiss,\' and \'American Gothic\' (lien direct)

These three iconic historical paintings pulse with intense anxieties about electricity, hematology, and astronomy.

bleepingcomputer.png 2019-01-09 13:47:00 Using Google Knowledge Graph to Spoof Search Results (lien direct)

Google\'s Knowledge Graph, the informational panel displayed next to the results of popular search queries, can be spoofed to show arbitrary details, regardless of the input in the Google search box. [...]

bleepingcomputer.png 2019-01-09 13:46:02 Windows 10 Build 18312 (19H1) Released With Reserved Storage Implementation (lien direct)

Windows 10 Preview Build 18312 is now available for Insiders in the Fast Ring and it comes with Reserved Storage implementation, improved Reset page UI, Windows Subsystem for Linux Command Line Tool improvements. [...]

SecurityAffairs.png 2019-01-09 13:41:05 State attorneys general announced a $1.5 million settlement with Neiman Marcus (lien direct)

Tens of state attorneys general announced a $1.5 million settlement with The Neiman Marcus Group over a 2013 data breach. Tens of attorneys general announced this week a $1.5 million settlement with The Neiman Marcus Group LLC over a data breach suffered by the company in 2013 and disclosed earlier 2014. 43 states and the […]

The post State attorneys general announced a $1.5 million settlement with Neiman Marcus appeared first on Security Affairs.

ZDNet.png 2019-01-09 13:36:00 Sophos snaps up cloud infrastructure specialist Avid Secure (lien direct)

The small company bounces between California and India.

TechRepublic.png 2019-01-09 13:24:01 40% of companies are adding jobs after deploying AI, not killing them (lien direct)

A lack of internal knowledge about artificial intelligence has led companies to hire more people, according to Dun & Bradstreet.

no_ico.png 2019-01-09 13:02:03 Just A Bag Of Nails (lien direct)

About 10 years ago now, I recall discussing my concept of internal civil disobedience, and insurgency with another professional – question, \'just how do you cause widespread chaos by none technical means?\' – answer = employ around 5 individuals, place them on a bridge London (or any other City) over a major feeder road/motorway early …

The ISBuzz Post: This Post Just A Bag Of Nails appeared first on Information Security Buzz.

no_ico.png 2019-01-09 13:00:03 Four Trends That Will Shape The Cybersecurity Landscape In 2019 (lien direct)

2018 has been a big year. With GDPR fundamentally changing the way many businesses operate and several high profile data breaches hitting the headlines, it\'s not been a smooth road by any means. Moving into 2019, we can expect to see many businesses still scrambling to get to grips with compliance, securing data and regaining …

The ISBuzz Post: This Post Four Trends That Will Shape The Cybersecurity Landscape In 2019 appeared first on Information Security Buzz.

WiredThreatLevel.png 2019-01-09 13:00:00 Ocean Cleanup\'s Plastic Catcher Is Busted. So What Now? (lien direct)

First, the 600-meter-long plastic catcher didn\'t catch plastic. Then it split in two. What is the right way, then, to cleanse our oceans of the plastic menace?

WiredThreatLevel.png 2019-01-09 13:00:00 How Alexandria Ocasio-Cortez Shapes a New Political Reality (lien direct)

The newly elected congressmember offers older colleagues a master class in social media.

WiredThreatLevel.png 2019-01-09 13:00:00 VW\'s EV Chargers Make Paying for Power Easier Than Ever (lien direct)

VW\'s Electrify America program is adding a capability that identifies the driver by their car, and bills them automatically.

securityintelligence.png 2019-01-09 12:45:03 Maximize Your Security Operations Center Efficiency With Incident Response Orchestration (lien direct)

>Incident response orchestration and automation can help boost the accuracy and efficiency of IR processes and reduce the burden on the understaffed SOC.

The post Maximize Your Security Operations Center Efficiency With Incident Response Orchestration appeared first on Security Intelligence.

grahamcluley.png 2019-01-09 12:43:04 Automated phishing attack tool bypasses 2FA protection (lien direct)
Automated phishing attack tool bypasses 2FA protection

Modlishka may help raise awareness of the danger of reverse proxy phishing attacks, but it\'s easy to imagine that many criminals will be tempted to put it to malicious use.

securityintelligence.png 2019-01-09 12:40:02 3 Urgent Areas of Action to Address National Cybersecurity Risks (lien direct)

>The U.S. is not where it needs to be in terms of managing cybersecurity risks as a national effort, according to the Aspen Cybersecurity Group.

The post 3 Urgent Areas of Action to Address National Cybersecurity Risks appeared first on Security Intelligence.

The_State_of_Security.png 2019-01-09 12:30:00 Humana Informs Customers of Third-Party Security Incident (lien direct)

Humana has notified customers of a third-party security incident that might have exposed some of their personal information. According to a breach notification letter obtained by DataBreaches.net, the for-profit American health insurance company learned on 25 October 2018 that bad actors had gained access to the system credentials of some employees at Bankers Life, one […]… Read More

The post Humana Informs Customers of Third-Party Security Incident appeared first on The State of Security.

bleepingcomputer.png 2019-01-09 12:15:04 Apple Orders 10 Percent Production Cut for New iPhone Models (lien direct)

Apple ordered its suppliers to cut down the number of new iPhone model units coming off their production lines right before Tim Cook published his letter to the Apple investors at the beginning of the month. [...]

Pirate.png 2019-01-09 12:10:05 En avant pour les soldes, haro sur les cyberattaques ! (lien direct)
Les soldes viennent de commencer dans la plupart des régions en France avec pour corollaire ses achats en boutiques et sur Internet. Cette période est essentielle pour le secteur de la grande distribution et, par extension, une période où l\'impact potentiel des cyber-menaces est à son maximum avec de fausses soldes.
WiredThreatLevel.png 2019-01-09 12:00:00 CES 2019: More of the Coolest Stuff We\'ve Seen So Far (lien direct)

We\'ve played with a bunch of great new consumer products here at CES. Here are the neatest things we saw on day two.

WiredThreatLevel.png 2019-01-09 12:00:00 Gallup Poll: Labeling Sites May Help Stop Fake News Spread (lien direct)

A new Gallup survey suggests people are less likely to share stories from sites that are clearly marked as untrustworthy.

WiredThreatLevel.png 2019-01-09 12:00:00 Ignore 5G, For Now (lien direct)

Want the super-fast mobile speeds promised by 5G technology? Come back in a year.

ZDNet.png 2019-01-09 11:45:01 Zerodium will now pay $2 million for Apple iOS remote jailbreaks (lien direct)

The private exploit acquisition program is also offering up to $1 million for WhatsApp and iMessage zero-days.

6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26

Information mise à jours le: 2019-01-19 06:03:28
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Notre RSS (filtré) Twitter