What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
SecurityAffairs.png 2019-01-08 11:38:05 Zerodium offers $2 Million for remote iOS jailbreaks, and much more (lien direct)

The zero-day broker Zerodium offers $2 million for remote iOS jailbreaks and $1 million for chat app exploits. Zerodium announced it is going to pay up to $2 million for remote iOS jailbreaks that don’t need any user interaction, Previous offers of the company for this kind of exploits was $1.5 million. The company also doubled the […]

The post Zerodium offers $2 Million for remote iOS jailbreaks, and much more appeared first on Security Affairs.

bleepingcomputer.png 2019-01-08 11:36:01 Microsoft told to Pay €1100 After Forced Windows 10 Upgrade Breaks PC (lien direct)

Microsoft has now been asked to pay more than €1,100 ($1,258) to a Finnish man for the unwanted upgrade from Windows 8.1 and allegedly breaking his computer with an upgrade to Windows 10. [...]

ZDNet.png 2019-01-08 11:26:02 Akamai acquires Janrain to strengthen identity access controls, bot protection (lien direct)

Akamai says the deal will make the firm\'s solutions more “identity aware.”

ESET.png 2019-01-08 11:00:03 New Year\'s resolutions: Get your passwords shipshape (lien direct)

>In case there are some blank entries in your laundry list of New Year\'s resolutions, we have a few tips for a bit of cybersecurity \'soul searching\'. Here\'s the first batch, looking at how you can fix your good ol\' passwords.

The post New Year\'s resolutions: Get your passwords shipshape appeared first on WeLiveSecurity

bleepingcomputer.png 2019-01-08 10:56:03 New Side-Channel Attack Steals Data from Windows, Linux Page Cache (lien direct)

Details have emerged about a new side-channel attack that targets an operating system\'s page cache, where sensitive data that has been accessed for use, like program binaries, libraries, and files and info sensitive in nature, is stored. [...]

BBC.png 2019-01-08 10:34:05 German data theft: Suspect arrested in Hesse (lien direct)

A 20-year-old is held over the leak of hundreds of politicians\' information online.

DarkReading.png 2019-01-08 10:30:00 Security Matters When It Comes to Mergers & Acquisitions (lien direct)

The recently disclosed Marriott breach exposed a frequently ignored issue in the M&A process.

ZDNet.png 2019-01-08 10:07:04 Gatwick drone disruption deemed \'deliberate,\' new powers given to police (lien direct)

Opinion: £100 penalty notices might not be enough to deter those who find causing airport chaos amusing.

WiredThreatLevel.png 2019-01-08 10:00:00 Mueller Investigation 2019: Indictments, Witnesses, and More (lien direct)

The special counsel has lots of unfinished business on his to-do list this year, including a final report. Here\'s a rundown.

TroyHunt.png 2019-01-08 09:52:01 No, Spotify Wasn\'t Hacked (lien direct)

Presently sponsored by: Live Workshop! Watch the Varonis DFIR team investigate a cyberattack using our data-centric security stack

Time and time again, I get emails and DMs from people that effectively boil down to this:

Hey, that paste that just appeared in Have I Been Pwned is from Spotify, looks like they\'ve had a data breach

Many years ago, I introduced the concept of pastes to HIBP and

Blog.png 2019-01-08 09:38:00 Hack the Box: Fighter Walkthrough (lien direct)

Today we are going to solve another CTF challenge “Fighter”. It is a retired vulnerable lab presented by Hack the Box for helping pentester\'s to perform online penetration testing according to your experience level; they have a collection of vulnerable labs as challenges, from beginners to Expert level. Level: Intermediate Task: To find user.txt and... Continue reading

The post Hack the Box: Fighter Walkthrough appeared first on Hacking Articles.

CSO.png 2019-01-08 09:21:00 Ethereum Classic cryptocurrency suspended after attackers steal nearly $1.1M (lien direct)

Coinbase delisted Ethereum Classic (ETC) after detecting “a deep chain reorganization of Ethereum Classic blockchain.” Put another way, nearly $500,000 was spent twice. As pointed out by ZDNet, Bitfly confirmed there had been a successful 51 percent attack on ETC. Coinbase later updated the post, saying, “The total value of the double spends that we have observed thus far is 219,500 ETC (~$1.1M).”

To read this article in full, please click here

SecurityAffairs.png 2019-01-08 09:10:00 Nine 2019 Cybersecurity Predictions (lien direct)

Wondering about the state of global cybersecurity in 2019? Wonder no more with these nine cybersecurity predictions for where the new year will take us - and what it means for our digital properties, online lives and livelihoods. 1. Everybody Will Have to Choose Their Partners and Equipment More Carefully The Internet of Things is […]

The post Nine 2019 Cybersecurity Predictions appeared first on Security Affairs.

The_Hackers_News.png 2019-01-08 09:06:00 20-Year-Old Man Arrested For Carrying Out Germany\'s Biggest Data Leak (lien direct)

German federal police have arrested a 20-year-old local student for stealing and publishing a massive trove of personal data of hundreds of politicians, journalists and other public figures last month. The young man, whose identity has not been revealed by the police, was arrested after police raided his parent\'s house in west-central German State of Hesse on Sunday and recovered a computer

Blog.png 2019-01-08 09:03:39 Happy 16th Birthday TaoSecurity Blog (lien direct)
Today, 8 January 2019, is TaoSecurity Blog\'s 16th birthday! This is also my 3,041st blog post.

I wrote my first post on 8 January 2003 while working as an incident response consultant for Foundstone.

Here are a few statistics on the blog. Blogger started providing statistics in May 2010, so these apply to roughly the past 9 years only.

As of today, since May 2010 the blog has nearly 9.4 million all time page views, up from 7.7 million a year ago.

Here are the most popular posts of the last 9 years, as of today:


I\'m blogging a bit more recently, with 22 posts in 2018 -- more than my total for 2016 and 2017 combined, but still not half as much as 2015, which saw 55 posts.

Twitter continues to play a role in the way I communicate. Last year @taosecurity had nearly 49,000 followers with less than 18,000 Tweets. Today I have nearly 53,000 followers with 19,000 Tweets.

My rule is generally this: if I start wondering how to fit an idea in 280 characters on Twitter, then a blog post is a better idea. If I start a Twitter "thread," then I really need to write a blog post!

I continue to blog about martial arts and related topics at Rejoining the Tao, which incidentally will be three years old later this month, and is currently 11 posts shy of 100. You can see that during my burnout period I shifted my writing and creativity outside of security.

Thank you to everyone who has been part of this blog\'s journey since 2003!

InfosecIsland.png 2019-01-08 07:09:01 Universities Beware! The Biggest Security Threats Come from Within the Network (lien direct)

While the latest technology streamlines processes and makes the learning experience more efficient, higher education institutions\' networks have not kept up with technology and cyber security requirements.

InfosecIsland.png 2019-01-08 06:55:05 IAST Technology Is Revolutionizing Sensitive Data Security (lien direct)

IAST is the most optimal way to test for application security, sensitive data leakage, and prevent breaches.

SecurityAffairs.png 2019-01-08 06:14:03 Tens of thousands of hot tubs are exposed to hack (lien direct)

Experts from security firm Pen Test Partners reported that tens of thousands of hot tubs are currently vulnerable to cyber attacks. Security experts at Pen Test Partners have discovered thousands of connected hot tubs vulnerable to remote cyber attacks. The hot tubs could be remotely controlled by an app, dubbed Balboa Water App, that lack […]

The post Tens of thousands of hot tubs are exposed to hack appeared first on Security Affairs.

Blog.png 2019-01-08 06:05:02 Q&A: Why emerging IoT platforms require the same leading-edge security as industrial controls (lien direct)

The heyday of traditional corporate IT networks has come and gone. In 2019, and moving ahead, look for legacy IT business networks to increasingly intersect with a new class of networks dedicated to controlling the operations of a IoT-enabled services of all types, including smart buildings, IoT-enabled healthcare services and driverless cars. Related: Why the […]

TechRepublic.png 2019-01-08 05:27:00 CES 2019 Innovation Awards honoree: ZOMEKit wins smart cities category (lien direct)

The ZOMEKit can turn an old apartment building into a smart one that uses energy more efficiently. Learn more about this CES 2019 smart cities innovation award winner.

The_Hackers_News.png 2019-01-08 04:00:00 Zerodium Offers to Buy Zero-Day Exploits at Higher Prices Than Ever (lien direct)

Well, there\'s some good news for hackers and vulnerability hunters, though terrible news for tech manufacturers! Exploit vendor Zerodium is now willing to offer significantly higher payouts for full, working zero-day exploits that allow stealing of data from WhatsApp, iMessage and other online chat applications. Zerodium-a startup by the infamous French-based company Vupen that buys and sells

The_Hackers_News.png 2019-01-08 03:27:01 Ethereum Classic (ETC) Hit by Double-Spend Attack Worth $1.1 Million (lien direct)

Popular cryptocurrency exchange Coinbase has suspended all transactions of Ethereum Classic (ETC)-the original unforked version of the Ethereum network-on their trading platforms, other products and services after detecting a potential attack on the cryptocurrency network that let someone spend the same digital coins twice. Why is this attack concerning? The heist resulted in the loss of $1.1

WiredThreatLevel.png 2019-01-08 00:45:00 Intel Lakefield Brings Its 3-D Chip-Stacking Tech to Life (lien direct)

Weeks after introducing Foveros, its 3-D logic stacking technology, Intel has shown off a motherboard that puts it to use.

mcafee.png 2019-01-07 23:59:01 Ryuk Ransomware Attack: Rush to Attribution Misses the Point (lien direct)

Senior analyst Ryan Sherstobitoff contributed to this report. During the past week, an outbreak of Ryuk ransomware shutting down newspaper printing services in the United States has garnered a lot of attention. To determine who was behind the attack many have cited past research that compares code from Ryuk with the older ransomware Hermes to […]

The post Ryuk Ransomware Attack: Rush to Attribution Misses the Point appeared first on McAfee Blogs.

no_ico.png 2019-01-07 23:30:04 Twitter Let Someone Promote An Obvious PayPal Phishing Scam (lien direct)

An account posing as PayPal used a paid promotion on Twitter to bait users into sharing their personal information under the guise that they were entering an end-of-year contest, The Next Web reported this week.  TNW reporter Matthew Hughes first reported the since-deleted promoted tweet from @PaypalChristm. The tweet had several obvious signs of being a scam, which …

The ISBuzz Post: This Post Twitter Let Someone Promote An Obvious PayPal Phishing Scam appeared first on Information Security Buzz.

TechRepublic.png 2019-01-07 23:16:01 CES 2019: Samsung shifts to tech for pros, integrates with Amazon Alexa and Google Assistant (lien direct)

At CES 2019, Samsung revealed new laptops, TVs, and smart appliances that professionals and consumers can use with third-party platforms.

WiredThreatLevel.png 2019-01-07 23:00:00 Hyundai\'s Elevate Concept Uses Legs and Wheels to Go Anywhere (lien direct)

The automaker\'s CES concept uses multiple modes of locomotion to move through any territory.

TechRepublic.png 2019-01-07 22:30:01 CES 2019: Samsung Notebook 9 Pro is a powerful laptop/tablet combo (lien direct)

Samsung\'s redesigned 2019 Notebook 9 Pro combines a 13-inch tablet and Windows 10 laptop into a stylish convertible professionals should like.

no_ico.png 2019-01-07 22:15:05 German Politicians Have Personal Data Hacked (lien direct)

Hundreds of German politicians including Chancellor Angela Merkel have had personal detailshackedand published online, reports say. Contacts, private chats and credit card details were put out on Twitter which belong to figures from every political party except the far-right AfD. Experts comments below: Tim Erlin, VP at Tripwire: “There are more questions than answers about …

The ISBuzz Post: This Post German Politicians Have Personal Data Hacked appeared first on Information Security Buzz.

Blog.png 2019-01-07 22:04:02 Port Covington, MD re-emerges as \'CyberTown, USA\' - ground zero for cybersecurity research (lien direct)

When CyberTown, USA is fully built out, it\'s backers envision it emerging as the world\'s premier technology hub for cybersecurity and data science. DataTribe, a Fulton, MD-based cybersecurity startup incubator, has been a key backer of this ambitious urban redevelopment project, which broke ground last October in Port Covington, MD, once a bustling train stop […]

onapsis.png 2019-01-07 22:04:00 Introducing the Defender\'s Digest (lien direct)

Sign-up for Onapsis\'s ERP security newsletter to stay up to date on news, trends and best practices for ERP cybersecurity.

SAP, Oracle, erpsecurity, newsletter, defender's digest, Onapsis Research LabsCorporateSelena Proctor
01/07/2019
globalsecuritymag.png 2019-01-07 22:00:00 Avis du CERTA : CERTFR-2019-AVI-003 : Multiples vulnérabilités dans Google Android (lien direct)

- Vulnérabilités

ZDNet.png 2019-01-07 21:56:00 Coinbase suspends Ethereum Classic (ETC) trading after double-spend attacks (lien direct)

Attackers carried out 11 double-spend attacks and stole nearly 88,500 ETC (~$460,000).

SecurityAffairs.png 2019-01-07 21:48:04 Hackers have stolen customer data from Titan Manufacturing and Distributing company for nearly one year (lien direct)

Cyber criminals have stolen customer data from the Titan Manufacturing and Distributing company for nearly one year using a malware. Hackers hit the Titan Manufacturing and Distributing company and compromised its computer system to steal customer payment card data for an entire year.  Attackers breached into the computer system at Titan Manufacturing and Distributing company to steal […]

The post Hackers have stolen customer data from Titan Manufacturing and Distributing company for nearly one year appeared first on Security Affairs.

Kaspersky.png 2019-01-07 21:42:00 Hackers Infiltrate Early Warning Network System to Send Spam (lien direct)

Just as ex-tropical Cyclone Penny moved toward the coast of Queensland, Australia, users of Early Warning Network reported receiving strange messages from the emergency system.

Kaspersky.png 2019-01-07 21:18:02 Zerodium Raises Zero-Day Payout Ceiling to $2M (lien direct)

Apple exploits will fetch the highest price.

no_ico.png 2019-01-07 21:00:00 German Politicians Personal Details Hacked (lien direct)

Following the news that German politicians, including Chancellor Angela Merkel, have had their personal details hacked and published online, Caitlin Huey, senior threat intelligence analyst at EclecticIQ commented below.  Caitlin Huey, Senior Threat Intelligence Analyst at EclecticIQ: “The leak of personal information from German MPs seems to have come from the same source that has been regularly leaking information on German …

The ISBuzz Post: This Post German Politicians Personal Details Hacked appeared first on Information Security Buzz.

WiredThreatLevel.png 2019-01-07 21:00:00 Bell\'s Nexus Air Taxi Brings Flying Cars Down to Earth (lien direct)

The company behind the V-22 Osprey and V-280 Valor brings its experience to the pie-in-the-sky flying car industry.

no_ico.png 2019-01-07 20:45:00 TV Licence Scam Email Leads To Over 5,000 Complaints (lien direct)

It has been revealed that Action Fraud received more than 5,000 complaints about a TV licence scam email in the past three months. In light of this news, Jake Moore, cyber security expert at ESET UK, has the following comment and advice. Expert comments below: Jake Moore, Cyber Security Expert at ESET UK: “Hackers will …

The ISBuzz Post: This Post TV Licence Scam Email Leads To Over 5,000 Complaints appeared first on Information Security Buzz.

Pirate.png 2019-01-07 20:32:05 Le CES donne le coup d\'envoi de la vie numérique de l\'année – Quelles innovations pour quelles menaces ? (lien direct)
En 2019, le monde continue sa numérisation, et les menaces liées aux environnements connectés se multiplient. L\'année 2019 commence comme tous les ans en fanfare avec le coup d\'envoi du Consumer Electronic Show, à Las Vegas, donné mardi 8 janvier.
TechRepublic.png 2019-01-07 20:29:04 GitHub to give users of its free plan access to unlimited private repositories (lien direct)

Microsoft is poised to make GitHub\'s private repositories free to smaller developers and teams, which would help Microsoft go head-to-head with GitLab and BitBucket.

Pirate.png 2019-01-07 20:22:01 WhatsApp – Les pirates peuvent planter l\'application avec un simple appel (lien direct)
Vous avez bien sûr entendu parler de WhatsApp, cette application de messagerie qui compte plus d\'1,5 milliard d\'utilisateurs actifs tous les mois. Malgré ou peut-être en raison de sa popularité, cette application semble connaître des problèmes récurrents et sérieux liés à la sécurité. Le plus récent est un bug qui permet aux pirates de prendre contrôle de l\'application lorsque quelqu\'un répond à un appel vidéo.
Pirate.png 2019-01-07 20:16:01 Sécurité autour des mots de passe : comment inculquer une prise de conscience en entreprise ? (lien direct)
Le " Rapport mondial 2018 sur la sécurité des mots de passe " révèle qu\'en moyenne, un employé partage six mots de passe avec ses collègues, démontrant ainsi que la gestion des mots de passe doit plus que jamais être mieux administrée. 50% des entreprises ne sécurisent pas les mots de passe. LastPass solution de […]
WiredThreatLevel.png 2019-01-07 20:11:03 Harley-Davidson\'s Electric LiveWire Motorcycle Debuts at CES (lien direct)

Unveiled today at CES, the LiveWire will hit 60 mph in 3.5 seconds and cover 110 miles between charging stops.

WiredThreatLevel.png 2019-01-07 20:01:02 Today\'s TV Mom Is Raising Us for a More Real World (lien direct)

From \'Pose\' to \'Jane the Virgin\', mothers on TV are getting much more complex-and that\'s a good thing.

TechRepublic.png 2019-01-07 19:37:01 ​Keeping tabs on man\'s best friend: AI for pets improves work-life balance (lien direct)

Advances in pet monitoring technology keep employees informed and happy.

TechRepublic.png 2019-01-07 19:31:01 CES 2019: 58% of consumers don\'t secure their personal devices (lien direct)

Businesses must build IoT security measures into devices to protect consumers from hackers, according to McAfee.

TechRepublic.png 2019-01-07 19:19:01 CES 2019: How employees can use Vuzix Blade AR Smart Glasses to optimize their workflow (lien direct)

The smart glasses allow users to view clear augmented reality visuals that assist with daily workflow for customer-facing workers.

ZDNet.png 2019-01-07 18:52:03 New hardware-agnostic side-channel attack works against Windows and Linux (lien direct)

Side-channel attack almost certainly works against macOS, but researchers haven\'t tested it.

Kaspersky.png 2019-01-07 18:33:00 ThreatList: Container Security Lags Amidst DevOps Enthusiasm (lien direct)

Security incidents are set to grow as companies lag behind in securing their containers.

9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29

Information mise à jours le: 2019-01-19 06:03:28
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Notre RSS (filtré) Twitter