What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
zataz.png 2019-05-15 15:42:05 4 manières de sécuriser votre site internet (lien direct)

La sécurisation de votre site internet est un élément important afin de contrer le risque d\'attaque de votre site web. De plus, ce risque de piratage augmente chaque année, quelque soit le domaine d\'activité concerné. En effet, que vous soyez propriétaire d\'un blog ou d\'un site internet d\'entreprise...

Cet article 4 manières de sécuriser votre site internet est apparu en premier sur ZATAZ.

zataz.png 2019-05-15 15:38:04 Prise de compte, comptes d\'entreprise Office 365 attaqués : astuces pour s\'en protéger (lien direct)

Les prises de contrôle de comptes constituent une menace sérieuse pour la sécurité des entreprises et ont considérablement augmenté ces derniers temps sur Office 365. Profitant de ce type d’attaque, les pirates informatiques parviennent à voler les informations d’identification d’a...

Cet article Prise de compte, comptes d’entreprise Office 365 attaqués : astuces pour s\'en protéger est apparu en premier sur ZATAZ.

SecurityWeek.png 2019-05-15 15:33:04 Picreel and Alpaca Forms Compromised by Magecart Attacks (lien direct)

On Sunday, May 12, 2019, security researcher Willem de Groot tweeted, "Supply chain attack of the week: @Picreel_  marketing software got hacked last night, their 1200+ customer sites are now leaking data to an exfil server in Panama." He later added, "And also hacked: http://CloudCMS(.)com with some 3400 sites."

read more

DarkReading.png 2019-05-15 15:30:00 Introducing the Digital Transformation Architect (lien direct)

Bet-the-company transformation that expands the attack surface requires close alignment and leadership across executive, IT and security teams.

SecurityWeek.png 2019-05-15 15:19:05 SAP Patches Multiple Missing Authorization Checks (lien direct)

SAP this week released of 8 Security Notes as part of its SAP Security Patch Day for May 2019, which also included 5 updates to previously released Notes.

read more

bleepingcomputer.png 2019-05-15 15:18:05 Azure Active Directory Now Supports 256 Character Passwords (lien direct)

Microsoft has announced that they have removed the 16 character Azure Active Directory password limit and admins can now use up to a maximum of 256 characters. This aligns the passwords lengths with those of on-premises Windows Active Directory services. [...]

SecurityWeek.png 2019-05-15 15:05:05 Israel Spyware Firm NSO Operates in Shadowy Cyber World (lien direct)

An Israeli spyware company named in a Financial Times report on a WhatsApp security flaw prides itself on "rigorous, ethical standards" despite previous links to alleged espionage.

- Pocket spy -

read more

Checkpoint.png 2019-05-15 15:00:04 Check Point Releases R80.30 with 100 New Features Delivering More Protection against Malicious Downloads and Websites (lien direct)

R80.30 Features First Web Threat Extraction and Patent Pending Advanced SSL/TSL Security   by Michael A. Greenberg, Product Marketing Manager, Security Platforms, published May 15th 2019   R80.30 ushers in a new era of security with the industry\'s first threat extraction for web, providing practical prevention against advanced threats. With this new threat extraction for…

The post Check Point Releases R80.30 with 100 New Features Delivering More Protection against Malicious Downloads and Websites appeared first on Check Point Software Blog.

TechRepublic.png 2019-05-15 14:52:03 Upskilling workers in the age of digital transformation (lien direct)

Upskilling is more than just a new term, it\'s becoming a necessity for many companies in response to job automation.

no_ico.png 2019-05-15 14:50:02 Turkish Law On Data Breaches GDPR Report (lien direct)

Turkey\'s first comprehensive data protection law was being launched in April 2016. The 2016 Law on the Protection of Personal Data (“Turkish Data Protection Law”) is based largely on EU Data Protection Law. As a candidate state for EU membership, Turkey aligns much of its legal system with EU law. Turkish data protection law consequently …

The ISBuzz Post: This Post Turkish Law On Data Breaches GDPR Report appeared first on Information Security Buzz.

Kaspersky.png 2019-05-15 14:50:00 Billions of Malicious Bots Take to Cipher-Stunting to Hide (lien direct)

Attackers have been tampering with TLS signatures at a scale never before seen using a technique called cipher-stunting.

TechRepublic.png 2019-05-15 14:46:05 How to create a secure website: 4 tips (lien direct)

A major gap exists between the perception and reality of online security safety, according to Google Registry and The Harris Poll.

globalsecuritymag.png 2019-05-15 14:34:00 /e/ Foundation lance des smartphones Android libérés de Google (lien direct)

/e/ Foundation lance les premiers smartphones équipés de /e/OS/, un nouveau système d\'exploitation pour smartphone et ses services associés en ligne, conçus pour garantir la confidentialité et la sécurité des données des utilisateurs. /e/ Foundation sélectionne des téléphones compatibles reconditionnés de première qualité pour ses utilisateurs et y installe le système d\'exploitation /e/ avec des techniciens spécialisés . " Les smartphones reconditionnés sont un moyen de réduire les déchets électroniques et (...) - Produits

bleepingcomputer.png 2019-05-15 14:32:04 Google Discloses Bluetooth Flaw in Titan Security Key, Issues Recall (lien direct)

Google disclosed a local proximity vulnerability impacting Bluetooth Low Energy (BLE) Titan Security Keys sold in the U.S. stemming from a "misconfiguration in the Titan Security Keys\' Bluetooth pairing protocols." [...]

SecurityWeek.png 2019-05-15 14:29:05 Intel MDS Vulnerabilities: What You Need to Know (lien direct)

Advisories from tech companies for Intel MDS vulnerabilities

read more

SecurityAffairs.png 2019-05-15 14:15:04 Twitter inadvertently collected and shared iOS location data (lien direct)

Twitter confirmed revealed that a bug in its iOS app it the root cause for an inadvertent collection of location data and sharing it with a third-party. A new story of a violation of the user’s privacy made the lines, Twitter revealed that due to a bug is collected and shared iOS location data with […]

The post Twitter inadvertently collected and shared iOS location data appeared first on Security Affairs.

WiredThreatLevel.png 2019-05-15 14:00:00 What\'s So Special About Human Screams? Ask a Screamologist (lien direct)

A better understanding of the acoustics of screaming could help scientists understand how and why humans shriek-and add a new dimension to the surveillance state!

TechRepublic.png 2019-05-15 13:54:03 71% of medical devices still run on Windows 7, Windows 2008, and Windows mobile (lien direct)

Medical IoT devices carry significant cybersecurity risks, according to a Forescout report.

ZDNet.png 2019-05-15 13:40:00 UK hacking powers can be challenged in court, judge rules (lien direct)

UK spies are no longer allowed to skip court if their choices are considered unlawful.

Pirate.png 2019-05-15 13:39:02 10 ans ExpressVPN : Découvrez les nouveaux serveurs VPN TrustedServer ! (lien direct)
C\'est l\'anniversaire du fournisseur ExpressVPN dont la mission est restée la même durant ces 10 dernières années : permettre à chacun d\'utiliser facilement et librement l\'Internet avec confidentialité, sécurité et liberté. Une belle nouveauté est annoncée dans la foulée !
TechRepublic.png 2019-05-15 13:35:03 How to add cognitive services to your Microsoft Azure resources (lien direct)

Cognitive services created in Azure can add powerful features to your organization\'s application development toolkit.

TechRepublic.png 2019-05-15 13:22:03 Learning Kotlin? Most popular tools and frameworks for the Java-compatible programming language (lien direct)

Survey breaks down Kotlin developers\' favorite software libraries/code editors and how they use the language.

bleepingcomputer.png 2019-05-15 13:13:02 Attackers Evade Detection By Randomizing TLS Handshake Ciphers (lien direct)

Cybercriminals are using a new method to evade detection to make sure that the traffic generated by their malicious campaigns is not being detected, a technique based on SSL/TLS signature randomization and dubbed cipher stunting. [...]

WiredThreatLevel.png 2019-05-15 13:00:00 Astro C40 TR Controller Review (PS4 and PC): Almost Perfect (lien direct)

Astro\'s pro controller works wonderfully on PC, but lacks basic functionality on PS4.

WiredThreatLevel.png 2019-05-15 13:00:00 Boosted Rev Scooter: Price, Specs, Details (lien direct)

In the sharing versus ownership debate, this new electric scooter makes a convincing argument for buying one.

TechRepublic.png 2019-05-15 12:58:04 The highest paying internships and entry-level jobs in the US (lien direct)

Tech dominates both lists, proving how lucrative STEM skills are in today\'s workforce, according to Glassdoor.

SecurityAffairs.png 2019-05-15 12:57:05 Microsoft Patch Tuesday addresses dangerous RDS flaw that opens to WannaCry-like attacks (lien direct)

Microsoft Patch Tuesday updates for May 2019 address nearly 80 vulnerabilities, including an RDS flaw allowing WannaCry-Like attacks. Microsoft Patch Tuesday updates for May 2019 address nearly 80 vulnerabilities, including a Windows zero-day flaw and an RDS vulnerability that can be exploited to carry out WannaCry-like attack. The zero-day vulnerability addressed by Microsoft Patch Tuesday […]

The post Microsoft Patch Tuesday addresses dangerous RDS flaw that opens to WannaCry-like attacks appeared first on Security Affairs.

Pirate.png 2019-05-15 12:54:02 Indice 2019 des menaces de cybersécurité dans le secteur de la santé (lien direct)
Morphisec publie l\'indice 2019 des menaces de cybersécurité dans le secteur de la santé.
TechRepublic.png 2019-05-15 12:51:00 ulia, Kubernetes, and Hadoop among the 20 fastest-growing freelancer skills (lien direct)

Skills related to IT, automation, and RPA saw increased demand in Q1 2019, according to Upwork.

TechRepublic.png 2019-05-15 12:39:00 Why cybersecurity pros want to share information to combat threats (lien direct)

Security professionals are willing to share intel with their peers and the government if such sharing improved their ability to detect cyber threats, according to an IronNet survey.

Pirate.png 2019-05-15 12:28:05 AdwCleaner, l\'outil nettoyeur d\'indésirables incontournable (lien direct)
AdwCleaner a connu un tel succès qu\'il est quasiment impossible que vous ne le connaissiez pas ! En effet, il s\'agit d\'un utilitaire de suppression d\'adware le plus populaire détecte capable d\'éliminer les programmes indésirables et autres junkwares d\'un PC.
ESET.png 2019-05-15 12:28:02 Ice Hockey World Championship: The risks of free live streaming (lien direct)

>You think you\'re watching the games for free, but are you sure that\'s the case? Let\'s review some of the risks that may come with free live streaming websites

The post Ice Hockey World Championship: The risks of free live streaming appeared first on WeLiveSecurity

TechRepublic.png 2019-05-15 11:54:04 How to create a business-driven cybersecurity strategy: 3 tips (lien direct)

Companies achieve better results with a business-driven cybersecurity strategy, according to new survey results from consulting firm PwC.

Pirate.png 2019-05-15 11:49:01 ZombieLoad : Les processeurs Intel encore sous le feu des projecteurs (lien direct)
ZombieLoad est la nouvelle menace qui affole le monde de l\'informatique ! Selon les chercheurs, la vulnérabilité touche presque tous les processeurs Intel conçus depuis 2011, et les correctifs en cours de déploiement vont affecter la performance. Un air de déjà vu ?
ZDNet.png 2019-05-15 11:37:04 San Francisco bans police from using facial recognition tech on residents (lien direct)

Some residents may be developing the technology but it won\'t be permitted for use on their doorstep.

grahamcluley.png 2019-05-15 11:34:02 Israeli TV\'s Eurovision webcast hijacked by hackers. Hamas blamed (lien direct)

Hamas hackers have been blamed for briefly hijacking an Israeli TV webcast of the Eurovision Song Contest semi-finals last night.

Pirate.png 2019-05-15 11:25:01 Enseignements tirés du récent piratage de WhatsApp (lien direct)
Cela devrait nous rappeler que les appareils mobiles, dont la plupart d\'entre nous ne se sépare jamais, sont vulnérables à des attaques, et qu\'une fois de plus, ce sont des particuliers qui ont été attaqués.
Pirate.png 2019-05-15 11:22:02 Baisse du cours de l\'action de 7,5% pour les sociétés touchées par des atteintes à la protection des données (lien direct)
Les sociétés cotées en bourses touchées par les principales atteintes à la protection des données ont connu une baisse de 7,5% du cours de leur action.
Pirate.png 2019-05-15 11:19:00 Comment les banques font face au défi du blanchiment d\'argent à l\'ère numérique ? (lien direct)
Face à des criminels qui ne manquent pas de ressources, les banques ont su développer au fil des années de nombreuses techniques pour les démasquer. Elles préfèrent ne pas révéler les indices précis qui les alertent sur les transactions douteuses, cependant, il existe certains signaux d\'alarme courants à surveiller et des méthodes à appliquer dans les enquêtes sur le blanchiment.
Pirate.png 2019-05-15 11:13:04 CCleaner annonce sa nouvelle fonctionnalité Easy Clean (lien direct)
CCleaner v5.57 s\'enrichit d\'une fonction ergonomique qui aide les utilisateurs à préserver la propreté, la sécurité et la rapidité de leur ordinateur.
Pirate.png 2019-05-15 11:11:04 Une augmentation de 60% des cyberattaques dans le secteur de la finance (lien direct)
Dans leur rapport Fraude dans les services financiers, les experts Proofpoint révèlent que les attaques par emails ciblant les entreprises de services financiers ont augmenté de 60 % d\'une année à l\'autre.
bleepingcomputer.png 2019-05-15 11:11:01 Google Payment Privacy Settings Hidden Behind Special URL (lien direct)

It has been discovered that Google is hiding three Google Pay privacy settings unless you access the service\'s Settings screen through a special URL. These settings allow you to restrict whether Google Pay shares your creditworthiness, personal information, or Google Pay account information. [...]

bleepingcomputer.png 2019-05-15 11:11:01 Google Hides Payment Privacy Settings Behind Special URL (lien direct)

It has been discovered that Google is hiding three Google Pay privacy settings unless you access the service\'s Settings screen through a special URL. These settings allow you to restrict whether Google Pay shares your creditworthiness, personal information, or Google Pay account information. [...]

The_State_of_Security.png 2019-05-15 10:58:05 Magecart Used Same Skimmer against Two Web-Based Suppliers (lien direct)

Magecart threat actors used the same skimmer to target customer payment card information provided to two web-based suppliers. The first attack occurred at 15:56:42 GMT on 10 May when bad actors injected the skimmer into the bottom of a script used by enterprise content management system CloudCMS. This malicious action targeted version 1.5.23 of the […]… Read More

The post Magecart Used Same Skimmer against Two Web-Based Suppliers appeared first on The State of Security.

itsecurityguru.png 2019-05-15 10:52:05 140% increase in cyber attacks hits UK businesses. (lien direct)

Cyber-attacks in the UK spiralled upwards by 140% in 2018, according to a recent cyber-threat landscape report. According to the paper, a rise in botnet activity also saw 40% of small and mid-sized businesses impacted by at least one cyber-attack over the 12-month period. A new study from computer and network security company eSentire has […]

The post 140% increase in cyber attacks hits UK businesses. appeared first on IT Security Guru.

itsecurityguru.png 2019-05-15 10:52:02 CrowdStrike to list on Nasdaq Exchange. (lien direct)

CrowdStrike, the cyber security company that uncovered Russian hackers inside the servers of the Democratic National Committee following the 2016 US election, announced plans to list on the Nasdaq exchange on Tuesday.  The California-based company, which was valued at more than $3bn at its last funding round in June, joins the ranks of the so-called […]

The post CrowdStrike to list on Nasdaq Exchange. appeared first on IT Security Guru.

itsecurityguru.png 2019-05-15 10:51:01 Web Trust Seal supply chain attack. (lien direct)

Hackers compromised the script used by Best of the Web to display their trust seal on their customers’ websites and to add two key logging scripts designed to sniff keystrokes from visitors. As Sanguine Security researcher Willem de Groot found out, “The security seal as sold by @bestoftheweb contains even 2 different keystroke loggers. One was added […]

The post Web Trust Seal supply chain attack. appeared first on IT Security Guru.

itsecurityguru.png 2019-05-15 10:50:05 Every Intel chip since 2011 affected by new flaw. (lien direct)

Security researchers have found a new class of vulnerabilities in Intel chips which, if exploited, can be used to steal sensitive information directly from the processor. The bugs are reminiscent of Meltdown and Spectre, which exploited a weakness in speculative execution, an important part of how modern processors work. Speculative execution helps processors predict to […]

The post Every Intel chip since 2011 affected by new flaw. appeared first on IT Security Guru.

itsecurityguru.png 2019-05-15 10:50:02 Microsoft Patch Tuesday fixes 79 vulnerabilities. (lien direct)

Microsoft released its monthly batch of security updates known as Patch Tuesday, and this month’s security release includes fixes for 79 vulnerabilities in a wide range of Microsoft products. The two headliners of this month’s patches are CVE-2019-0863, a zero-day vulnerability exploited in the wild, and ADV190013, a security advisory for dealing with the latest […]

The post Microsoft Patch Tuesday fixes 79 vulnerabilities. appeared first on IT Security Guru.

ZDNet.png 2019-05-15 10:14:01 Cybersecurity unicorn CrowdStrike files to go public on the Nasdaq (lien direct)

The startup offers a cloud-based endpoint protection solution to the enterprise.

7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27

Information mise à jours le: 2019-05-27 08:01:36
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Notre RSS (filtré) Twitter