What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
onapsis.png 2019-03-12 17:03:02 SAP Security Notes March \'19: Critical Bug Affecting SAP HANA XSA (lien direct)

Our monthly report on how to improve your SAP security and take care of your most critical information by exploring the latest SAP Security Notes for March 2019.

SAP Security Notes, SAP, sap erp, information securitySAP Security NotesDaniel Antonelli, Matias Sena, Sebastian Bortnik
03/12/2019
TechRepublic.png 2019-03-12 17:02:00 How to turn on verbose booting mode in Windows 10 with a Registry edit (lien direct)

More detailed booting information can help troubleshoot annoying problems.

SecurityWeek.png 2019-03-12 16:45:00 Senators Reintroduce IoT Cybersecurity Improvement Bill (lien direct)

Four U.S. senators backed by two House representatives and several major tech companies this week reintroduced a bill whose goal is to improve the security of Internet of Things (IoT) devices.

read more

Blog.png 2019-03-12 16:30:04 MY TAKE: What the Ethiopian 737 Max 8 crash should tell us about the safety of \'smart\' jetliners (lien direct)

When news broke about the crash of a Ethiopian Airlines Boeing 737, the first question that popped into my head was whether an older 737 model, still using the flawed rudder actuator, might have been involved. Related: Historical context of the rudder flaws on older model 737s Of course it was actually the newest iteration […]

MalwarebytesLabs.png 2019-03-12 16:27:00 The Advanced Persistent Threat files: Lazarus Group (lien direct) Lazarus Group, the threat actors likely behind the Sony breach and WannaCry outbreak, are in the news again. Here\'s what you need to know about this North Korean organization, and what you should do to protect against such nation-state attacks.

Categories:

Criminals Threat analysis

Tags:

(Read more...)

The post The Advanced Persistent Threat files: Lazarus Group appeared first on Malwarebytes Labs.

ZDNet.png 2019-03-12 16:23:00 Vulnerability in Swiss e-voting system could have led to vote alterations (lien direct)

A fix has been deployed to Switzerland\'s e-voting system, slated to roll out later this year.

bleepingcomputer.png 2019-03-12 16:19:04 Unsecured API Leads to \'Yelp for Conservatives\' App Data Leak (lien direct)

The API of the 63Red Safe mobile app known as "Yelp for conservatives" was found by French security researcher Robert Baptiste wide open, with no authentication needed to access and view the data stored within the app\'s database. [...]

TechRepublic.png 2019-03-12 16:08:01 AI regulation is critical, says 54% of tech executives (lien direct)

The risk posed by the abuse of artificial intelligence in facial recognition and creation of "deepfakes" could erode public trust, according to an Edelman survey.

WiredThreatLevel.png 2019-03-12 16:05:02 A Teen Started a Global Climate Protest. What Are You Doing? (lien direct)

One day last summer, Greta Thunberg skipped school, sat down outside the Swedish parliament-and launched a movement that\'s still going strong.

TechRepublic.png 2019-03-12 15:49:05 Medterra uses digital marketing and data analysis for its CBD retail sales (lien direct)

Medterra CBD is a Kentucky-based CBD retailer and processor that is on the forefront of the fast-growing CBD market.

SecurityWeek.png 2019-03-12 15:33:05 Germany to Consult US Over Huawei Security Fears: Merkel (lien direct)

German Chancellor Angela Merkel said Tuesday Berlin would consult Washington over using technology made by China\'s Huawei in future mobile phone networks, following reports of US threats to reduce intelligence cooperation.

read more

bleepingcomputer.png 2019-03-12 15:29:05 CCleaner Professional Adds Software Updater Feature (lien direct)

Piriform has released CCleaner v5.55 today, which for Professional users now includes a Software Updater feature that will check if installed 3rd party applications are running the latest version. [...]

TechRepublic.png 2019-03-12 15:27:02 How to use the Vivaldi Auto Stacking tab feature (lien direct)

The Vivaldi Auto Stacking tab feature helps to create a much cleaner and far more organized browser.

no_ico.png 2019-03-12 15:15:00 Companies Leaking Sensitive Data (lien direct)

In light of the news that dozens of companies are inadvertently leaking sensitive corporate and customer data through the sharing of public links to enterprise storage accounts, please find below a comment from identity governance provider, SailPoint.  To give you some background, SailPoint\'s open identity platform gives organisations the power to enter new markets, scale their workforces, embrace new technologies, innovate faster and compete on a global basis. It delivers …

The ISBuzz Post: This Post Companies Leaking Sensitive Data appeared first on Information Security Buzz.

Kaspersky.png 2019-03-12 15:09:01 Unpatched Windows Bug Allows Attackers to Spoof Security Dialog Boxes (lien direct)

Microsoft won\'t be patching the bug, but a proof of concept shows the potential for successful malware implantation.

TechRepublic.png 2019-03-12 15:07:01 4 ways companies can improve gender diversity at tech conferences (lien direct)

Only 25% of speakers at tech conferences are women, according to an Ensono report.

Kaspersky.png 2019-03-12 14:53:01 Adobe Patches Critical Photoshop, Digital Edition Flaws (lien direct)

Adobe fixed two arbitrary code execution flaws in its Photoshop and Digital Edition products.

SecurityAffairs.png 2019-03-12 14:42:00 Adobe Patch Tuesday updates address critical in Photoshop, Digital Editions (lien direct)

Adobe Patch Tuesday updates for March 2019 address critical vulnerabilities in Photoshop CC and Digital Editions products. Adobe Patch Tuesday updates for March 2019 address critical flaws in Photoshop CC and Digital Editions products. The updates address a heap overflow issue affecting the Digital Editions ebook reader software, the bug could be exploited by attackers […]

The post Adobe Patch Tuesday updates address critical in Photoshop, Digital Editions appeared first on Security Affairs.

SecurityWeek.png 2019-03-12 14:31:01 Box Enterprise Shared Links Leak Sensitive Information (lien direct)

Box enterprise shared links can leak sensitive information if access to them hasn\'t been restricted to relevant users only, Adversis security researchers warn.

read more

bleepingcomputer.png 2019-03-12 14:28:05 North Korean Hackers Behind $571M Crypto Heists Says UN Report (lien direct)

North Korean backed hacking groups were behind multiple cyberattacks impacting financial institutions and cryptocurrency exchanges as detailed in a report issued by a panel of experts for the United Nations (UN) Security Council. [...]

globalsecuritymag.png 2019-03-12 14:24:05 Le nombre d\'attaques de malware sur mobile a doublé en 2018 et les cybercriminels affûtent leurs stratégies de diffusion (lien direct)

Les chercheurs de Kaspersky Lab ont vu le nombre d\'attaques utilisant des logiciels malveillants mobiles quasiment doubler en l\'espace d\'à peine d\'un an. En 2018, il s\'est produit 116,5 millions d\'attaques, contre 66,4 millions en 2017, touchant nettement plus d\'utilisateurs uniques. En dépit de l\'augmentation du nombre d\'appareils attaqués, celui des fichiers malveillants a baissé, amenant les chercheurs à en conclure que le malware mobile a gagné en qualité, en efficacité et en précision. Ces (...) - Malwares

SecurityWeek.png 2019-03-12 14:20:05 Ten Principles for a New Approach to Regulating the Internet (lien direct)

Elizabeth Warren wants to be the Democrat nominee in the 2020 presidential election. Last week she added a new promise to her manifesto: "It\'s time to break up Amazon, Google and Facebook," she announced.

read more

TechRepublic.png 2019-03-12 14:10:04 Microsoft\'s new AI Business School teaches execs how to lead AI initiatives, for free (lien direct)

The online courses are meant to help business leaders define an AI strategy for their company.

TechRepublic.png 2019-03-12 14:08:04 25% of software vulnerabilities remain unpatched for more than a year (lien direct)

Smaller organizations are more agile at patching vulnerabilities, and vendor support goes a long way in easing patching, according to a report from Kenna Security and the Cyentia Institute.

bleepingcomputer.png 2019-03-12 13:55:00 Windows 10 Insider Preview Build 18356 Released Along With Phone Screen Feature (lien direct)

Microsoft has released Windows 10 Insider Preview Build 18356 (19H1) to Insiders in the Fast ring. This release is mostly bug fixes, including numerous Night Light bug fixes and a fix for KERNEL_SECURITY_VIOLATION GSODs. [...]

bleepingcomputer.png 2019-03-12 13:49:03 Windows 7 KB4489878 and Windows 8.1 KB4489881 Released (lien direct)

The March 2019 patches are also rolling out to PCs with Windows 7 and 8.1. The new monthly rollups for Windows 7 and Windows 8.1 comes with general security fixes and improvements. [...]

no_ico.png 2019-03-12 13:45:04 How Cybersecurity Has Changed With The 30th Anniversary Of The WWW (lien direct)

Karl Barton, Senior Director, International Channels and Alliances at SecureAuth commented below, in regards to how cybersecurity has changed along with the 30th anniversary of the world wide web.  Karl Barton, Senior Director, International Channels and Alliances at SecureAuth: “It\'s 30 years since Tim Berners-Lee invented the World Wide Web, and today we celebrate the innovation that connected people, …

The ISBuzz Post: This Post How Cybersecurity Has Changed With The 30th Anniversary Of The WWW appeared first on Information Security Buzz.

TechRepublic.png 2019-03-12 13:43:05 Have mobile device makers forgotten about call quality? (lien direct)

Smartphones designers are making enormous strides in displays, speed, complexity, and form, all the while forgetting the most important function--being a phone.

TechRepublic.png 2019-03-12 13:43:04 4 ways to keep employees from quitting (lien direct)

Managers are not doing enough to engage workers, as nearly 1 in 5 employees characterized their employers as \'horrible,\' according to an Achievers report.

SecurityWeek.png 2019-03-12 13:36:02 Pro-Brexit Twitter Manipulation Continues (lien direct)

The UK is in a momentous political week. Three separate parliamentary votes will decide the future of the UK and the EU for many years to come. They will decide between a hard Brexit (no deals, just leave), a delayed Brexit, and possibly no Brexit. Unusually in British politics, members of parliament have been very conscious of their electorate\'s opinion rather than just \'the party line\'. In the run up t`o these three votes, public opinion still matters. 

read more

bleepingcomputer.png 2019-03-12 13:33:04 Windows 10 March 2019 Cumulative Updates Released With Fixes (lien direct)

Windows 10 March 2019 cumulative updates are now rolling out to the compatible devices with fixes and improvements for core components. The update includes both security and non-security improvements and fixes. [...]

no_ico.png 2019-03-12 13:30:03 Exposed DB Classifies Woman As \'Breed-Ready\' (lien direct)

A story broke overnight about an exposed MongoDB database revealing the PII of 1.8 million Chinese women.   The unusual aspect of this story was not that the data was exposed – but more because it identified which of the women were \'breed-ready\'.  Open MongoDB Databases Expose Chinese Surveillance Data.: 18 MongoDB databases with information generated by accounts …

The ISBuzz Post: This Post Exposed DB Classifies Woman As ‘Breed-Ready’ appeared first on Information Security Buzz.

securityintelligence.png 2019-03-12 13:30:02 Spectre, Meltdown and More: What You Need to Know About Hardware Vulnerabilities (lien direct)

>According to IBM X-Force IRIS research, threat actors will continue to search for ways to leverage Spectre, Meltdown and other hardware vulnerabilities to steal data in the coming years.

The post Spectre, Meltdown and More: What You Need to Know About Hardware Vulnerabilities appeared first on Security Intelligence.

no_ico.png 2019-03-12 13:30:00 Multiple Vulnerabilities In Moxa Industrial Switches That Are Used To Build Industrial Networks (lien direct)

It has been reported that security experts have found multiple vulnerabilities in Moxa industrial switches (in the EDS-405A, EDS-408A, EDS-510A, and IKS-G6824A series) that are used to build industrial networks for oil and gas, transportation, maritime logistics, and numerous industrial sectors. By exploiting these flaws, hackers could recover the password from a cookie intercepted over the network or …

The ISBuzz Post: This Post Multiple Vulnerabilities In Moxa Industrial Switches That Are Used To Build Industrial Networks appeared first on Information Security Buzz.

bleepingcomputer.png 2019-03-12 13:20:01 Microsoft Releases the March 2019 Updates for Office (lien direct)

Microsoft released the March 2019 Office Update today, which consists of 6 security updates and 28 non-security updates. A some of these updates resolve critical vulnerabilities, it is strongly advised that you install them as soon as possible. [...]

SecurityWeek.png 2019-03-12 13:17:05 Adobe Patches Flaws in Sandbox, Photoshop, Digital Editions (lien direct)

Adobe\'s Patch Tuesday updates for March 2019 address critical vulnerabilities discovered by researchers in the company\'s Photoshop CC and Digital Editions products.

read more

TechRepublic.png 2019-03-12 13:08:00 AI isn\'t perfect--but you can get it pretty darn close (lien direct)

3 ways to improve your company\'s AI accuracy.

The_State_of_Security.png 2019-03-12 13:06:05 New Sextortion Scam Says Adult Sites Infected Victims with Malware (lien direct)

A new sextortion scam is informing victims that their computers suffered a malware infection after they visited an adult website. In this latest ruse, digital criminals claim that they infected a user with malware after they visited a child pornography website. They then say that they leveraged that infection to capture compromising video footage of […]… Read More

The post New Sextortion Scam Says Adult Sites Infected Victims with Malware appeared first on The State of Security.

DarkReading.png 2019-03-12 13:00:00 Cybercriminals Think Small to Earn Big (lien direct)

As the number of breaches increased 424% in 2018, the average breach size shrunk 4.7 times as attackers aimed for smaller, more vulnerable targets.

WiredThreatLevel.png 2019-03-12 13:00:00 I Embraced Screen Time With My Daughter-and I Love It (lien direct)

Everyone frets about screen time, but what they should really be focusing on is something called connected parenting.

WiredThreatLevel.png 2019-03-12 13:00:00 Amazon Now Owns Eero, and It Promises It Won\'t Snoop on You (lien direct)

“Alexa, should I be worried about the Eero deal?”

WiredThreatLevel.png 2019-03-12 13:00:00 Fitbit Inspire HR Review: Just the Basics (lien direct)

Fitbit\'s simple activity tracker delivers the basics at an attractive price-but not much more.

TechRepublic.png 2019-03-12 12:55:04 Business PC users are most at risk in these 10 countries (lien direct)

Some 11% of US business computers are at risk of malware infection, compared to 20% of home PCs, according to an Avast report.

SecurityAffairs.png 2019-03-12 12:49:04 Mysterious open database included \'BreedReady\' status for 1.8 Million Women (lien direct)

Expert found an open database in China containing the personal information of more than 1.8 million women, including a strange “BreedReady” status. Another data leak made the headlines, this time a database containing a creepy set of details collected on more than 1.8 million women in China was left unprotected online. The huge trove of […]

The post Mysterious open database included ‘BreedReady’ status for 1.8 Million Women appeared first on Security Affairs.

bleepingcomputer.png 2019-03-12 12:32:00 Malware Spreads As a Worm, Uses Cryptojacking Module to Mine for Monero (lien direct)

A modular malware with worm capabilities exploits known vulnerabilities in servers running ElasticSearch, Hadoop, Redis, Spring, Weblogic, ThinkPHP, and SqlServer to spread from one server to another and mine for Monero cryptocurrency. [...]

TechRepublic.png 2019-03-12 12:19:01 How to use the new VirtualBox file manager (lien direct)

The VirtualBox file manager finally makes the task of copying files to or from virtual machines easy.

ZDNet.png 2019-03-12 12:13:00 \'Yelp for conservatives\' MAGA app leaks users data (lien direct)

63Red Safe app left its backend API exposed online without authentication.

TechRepublic.png 2019-03-12 12:03:02 Can you still use the Java programming language for free? What you need to know (lien direct)

What the recent changes to support and licensing of Java developer tools means for you.

securityintelligence.png 2019-03-12 12:00:02 An Apple a Day Won\'t Improve Your Security Hygiene, But a Cyber Doctor Might (lien direct)

Internal assessments and audits are necessary, but they have their limitations. Some outside assistance could help improve your security hygiene and inoculate you from the nastiest of cyber bugs.

The post An Apple a Day Won’t Improve Your Security Hygiene, But a Cyber Doctor Might appeared first on Security Intelligence.

itsecurityguru.png 2019-03-12 11:49:04 Over half a million people in Michigan affected by healthcare data breach. (lien direct)

The state now says more than 600,000 people might have been affected by a health care data breach. Michigan Attorney General Dana Nessel says the breach involving Wolverine Solutions Group impacted customers with several health systems. Those include Blue Cross Blue Shield of Michigan, McLaren Health Care and others. Wolverine Solutions Group says the ransomware got […]

The post Over half a million people in Michigan affected by healthcare data breach. appeared first on IT Security Guru.

9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29

Information mise à jours le: 2019-03-26 04:01:32
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Notre RSS (filtré) Twitter