What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
itsecurityguru.png 2019-03-12 11:47:02 Ransomware on the rise, according to Forrester. (lien direct)

Ransomware may be poised to return as a top scourge for companies, as more and more of them pay up after an attack in an effort to minimize the cost of recovery. That\'s just one insight gleaned from an interview at RSA Conference 2019 last week with Josh Zelonis, senior analyst at Forrester Research. Threatpost […]

The post Ransomware on the rise, according to Forrester. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-12 11:44:02 President Trump proposing $9.6 billion in 2020 budget for cybersecurity. (lien direct)

President Donald Trump has revealed his proposed budget for the 2020 fiscal year, which “supports the creation” of Space Force (USSF) as the sixth branch of the armed forces. The White House also hopes to bolster cybersecurity and NASA exploration missions. The administration wants to increase Department of Defense spending by five percent to $718 billion. It’s earmarking more than $9.6 billion to […]

The post President Trump proposing $9.6 billion in 2020 budget for cybersecurity. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-12 11:43:01 Slack being used by cybercriminals to hide malware. (lien direct)

A group of hackers is using a previously undocumented backdoor program designed to interact with attackers over Slack. While abusing legitimate services for malware command-and-control purposes is not a new development, this is the first time researchers have seen Slack, a popular enterprise collaboration tool, being used in this way. The backdoor was detected by […]

The post Slack being used by cybercriminals to hide malware. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-12 11:40:03 Misconfigured Box accounts lead to sensitive data leak. (lien direct)

Security researchers have found dozens of companies inadvertently leaking sensitive corporate and customer data because staff are sharing public links to files in their Box  enterprise storage accounts that can easily be discovered. The discoveries were made by Adversis, a cybersecurity firm, which found major tech companies and corporate giants had left data inadvertently exposed. Although data […]

The post Misconfigured Box accounts lead to sensitive data leak. appeared first on IT Security Guru.

The_Hackers_News.png 2019-03-12 11:39:04 Microsoft Releases Patches for 64 Flaws - Two Under Active Attack (lien direct)

It\'s time for another batch of "Patch Tuesday" updates from Microsoft. Microsoft today released its March 2019 software updates to address a total of 64 CVE-listed security vulnerabilities in its Windows operating systems and other products, 17 of which are rated critical, 45 important, one moderate and one low in severity. The update addresses flaws in Windows, Internet Explorer, Edge, MS

SecurityAffairs.png 2019-03-12 11:03:05 Apex Legends for Android: a Fake App could Compromise your Smartphone (lien direct)

Yoroi-Cybaze ZLab malware researchers have analyzed four different fake android APKs that pretend to be versions of the Apex Legends game. Introduction At the beginning of 2019, Electronic Arts released a game for PC, XBox One and Playstation 4 named Apex Legends. It is a battle royal game like Titanfall and Fortnite, the latter is […]

The post Apex Legends for Android: a Fake App could Compromise your Smartphone appeared first on Security Affairs.

TechRepublic.png 2019-03-12 11:00:01 How to sell your company culture to a potential hire: 5 tips (lien direct)

Job candidates are looking for information about day-to-day life at an organization. Here\'s how to communicate it best.

WiredThreatLevel.png 2019-03-12 11:00:00 The Goat-Birthing, Tomato-Fermenting Homesteaders of YouTube (lien direct)

Broadly back-to-the-land, this farming movement goes off-grid in all but the most obvious way: They\'re still very much online.

WiredThreatLevel.png 2019-03-12 11:00:00 Facebook and the Ephemerality Trap  (lien direct)

Facebook CEO Mark Zuckerberg touts "reducing permanence" as a principle for his company\'s privacy-focused future, but it\'s hard to make things disappear from the internet.

WiredThreatLevel.png 2019-03-12 11:00:00 Cracking the Devilish Aerodynamics of Newfangled Flying Cars (lien direct)

As outfits like Beta, Joby, and Kitty Hawk explore new kinds of aircraft with pivoting rotors, wings, and more, they must crack the complex problem of keeping heavier-than-air machines aloft.

WiredThreatLevel.png 2019-03-12 11:00:00 To Compete With Google, OpenAI Seeks Investors–and Profits (lien direct)

OpenAI, the independent research lab cofounded by Elon Musk, created a for-profit arm to attract more funding to hire researchers and run computers.

WiredThreatLevel.png 2019-03-12 11:00:00 30 Years On, Reports of the Web\'s Death Are Exaggerated (lien direct)

It\'s the 30th anniversary of Tim Berners-Lee\'s notion of a “distributed hypertext system.” Today\'s web employs the same technology but looks very different.

WiredThreatLevel.png 2019-03-12 11:00:00 People Want to Know About Algorithms-but Not Too Much (lien direct)

Let people look inside the black box of the algorithm, and their mistrust, hostility, and fear will gradually melt away. Right? Well, kinda.

Korben.png 2019-03-12 10:58:00 Le cinéma c\'est pas pour les enfants (lien direct)

Je suis allé au cinéma ce dimanche, pour voir LEGO 2 avec mes enfants, et j’ai halluciné. Au moment des bandes-annonces, j’ai eu le droit à ces 2 magnifiques publicités. La campagne de sensibilisation sur l’endométriose est super importante et avec tout son talent d’actrice, Julie Gayet arrive a nous … Suite

bleepingcomputer.png 2019-03-12 10:22:00 Microsoft Testing Android Screen Mirroring on Windows 10 PCs (lien direct)

Microsoft has added beta support Android app screen mirroring in Windows 10 Build 1803 or newer for the latest Insider builds. At the moment the feature is only compatible with a limited number of devices but it will be supported by all smartphones running Android version 7.0 or later. [...]

SecurityWeek.png 2019-03-12 10:06:03 NASA\'s Cybersecurity Program Gets Failing Grade (lien direct)

The U.S. National Aeronautics and Space Administration (NASA) has again failed to implement an efficient cybersecurity program, according to a review by the NASA Office of Inspector General (OIG) for the fiscal year 2018.

read more

WiredThreatLevel.png 2019-03-12 10:00:00 What is Crispr Gene Editing? The Complete WIRED Guide (lien direct)

How scientists can repurpose a bacterial immune system to alter DNA, making everything from cheap insulin to extra starchy corn.

Korben.png 2019-03-12 09:54:04 Webosaures spécial voyage (lien direct)

Ce midi, avec Rémi, nous allons parler voyage… Et plus particulièrement comment voyager quand on est geek et qu’on aime trimballer du matos avec soi. Le sujet est vaste, donc il y a des chances pour que nous n’abordions pas tout en 1h mais nous ferons de notre mieux. Pensez … Suite

The_Hackers_News.png 2019-03-12 09:22:01 Adobe Releases Patches for Critical Flaws in Photoshop CC and Digital Edition (lien direct)

Adobe users would feel lighter this month, as Adobe has released patches for just two security vulnerability in its March Security Update. The company today released its monthly security updates to address two critical arbitrary code execution vulnerabilities-one in Adobe Photoshop CC and another in Adobe Digital Editions. Upon successful exploitation, both critical vulnerabilities could

Blog.png 2019-03-12 09:12:02 Command and Control Guide to Merlin (lien direct)

In this article, we learn how to use Merlin C2 tool. It is developed by Russel Van Tuyl in Go language. Table of content: Introduction Installation Windows exploitation Windows post exploitation Linux exploitation Linux post exploitation Introduction Merlin is great cross platform Command and control tool written in Go language. It\'s made of two elements... Continue reading

The post Command and Control Guide to Merlin appeared first on Hacking Articles.

bleepingcomputer.png 2019-03-12 09:01:00 Adobe Releases March 2019 Security Fixes for Photoshop CC and Digital Editions (lien direct)

Adobe has published their monthly Patch Tuesday updates for the month of March 2019. These updates fix security arbitrary code execution vulnerabilities in Photoshop and Adobe Digital Editions. [...]

Korben.png 2019-03-12 09:00:04 Comment calculer l\'espérance des jeux de hasard ? (lien direct)

Je ne suis pas un habitué des jeux de hasard. Il m’arrive parfois d’acheter un Millionnaire quand je le sens bien, et mon sentiment est souvent bon. Par exemple, l’année dernière j’en ai acheté seulement 2. Sur le premier j’ai gagné 150 € et le second 20 €. J’ai un … Suite

F-Secure.png 2019-03-12 07:56:03 Analysis Of Brexit-Centric Twitter Activity (lien direct)

This is a rather long blog post, so we’ve created a PDF for you to download, if you’d like to read it offline. You can download that from here. Executive Summary This report explores Brexit-related Twitter activity occurring between December 4, 2018 and February 13, 2019. Using the standard Twitter API, researchers collected approximately 24 […]

SecurityAffairs.png 2019-03-12 07:42:04 Vulnerability research hub Crowdfense is willing to pay $3 Million for iOS, Android zero-day exploits (lien direct)

orld-leading vulnerability research hub Crowdfense is offering up to $3 million for full-chain, zero-day exploits for iOS and Android. Vulnerability research firm Crowdfense is offering up to $3 million for working exploits for iOS and Android zero-day. In 2018, Crowdfence ran a $10 million bug bounty program, now the company decided to increment the value […]

The post Vulnerability research hub Crowdfense is willing to pay $3 Million for iOS, Android zero-day exploits appeared first on Security Affairs.

The_Hackers_News.png 2019-03-12 06:12:05 Cynet is offering unhappy competitors\' customers a refund for the time remaining on existing contracts (lien direct)

Cynet goes head-to-head with CrowdStrike, DarkTrace, Cylance, Carbon Black & Symantec, offering their unhappy customers a refund for the time remaining on their existing contracts. Cynet, the automated threat discovery and mitigation platform was built to address the advanced threats that AV and Firewalls cannot stop. Today, Cynet announced that any organization currently deploying an

TechRepublic.png 2019-03-12 04:46:04 How SMBs can bolster cybersecurity efforts (lien direct)

Learn what experts at a Wall Street Journal forum suggest businesses should do to improve their cybersecurity stance.

WiredThreatLevel.png 2019-03-12 04:37:05 Elon Musk Says Tweeting Is Free Speech in His SEC Battle (lien direct)

The Tesla CEO\'s lawyers argue the SEC has overreached in its attempt to see Musk held in contempt of court over a recent tweet.

bleepingcomputer.png 2019-03-12 04:30:04 Yatron Ransomware Plans to Spread Using EternalBlue NSA Exploits (lien direct)

A new Ransomware-as-a-Service called Yatron is being promoted on Twitter that plans on using the EternalBlue and DoublePulsar exploits to spread to other computer on a network. This ransomware will also attempt to delete encrypted files if a payment has not been made in 72 hours. [...]

The_Hackers_News.png 2019-03-12 02:07:01 Windows 10 Now Automatically Uninstalls Updates That Cause Problems (lien direct)

Do you always think twice before installing Windows updates worrying that it could crash your system or leave it non-working the day after Patch Tuesdays? Don\'t worry. Microsoft has addressed this issue by adding a safety measure that would from now onwards automatically uninstall buggy software updates installed on your system if Windows 10 detects a startup failure, which could be due to

ZDNet.png 2019-03-12 00:25:01 WordPress shopping sites under attack (lien direct)

Hackers using cross-site scripting (XSS) flaw in abandoned cart plugin to take over vulnerable sites.

The_Hackers_News.png 2019-03-12 00:17:04 F5 Networks Acquires NGINX For $670 Million (lien direct)

One of the most important software companies NGINX, which is also behind the very popular open-source web server of the same name, is being acquired by its rival, F5 Networks, in a deal valued at about $670 million. While NGINX is not a name that you have ever heard of, the reality is that you use NGINX every day when you post a photo, watch streaming video, purchase goods online, or log

WiredThreatLevel.png 2019-03-11 23:52:00 Trump\'s Budget Guts Science Agencies-But Favors the Moon (lien direct)

As in years past, Congress is likely to restore many of the proposed cuts in Trump\'s spending plan. Yet the deep cuts are still sowing confusion.

no_ico.png 2019-03-11 23:23:02 Cyber Vulnerability In Car Alarm Opened Millions Of Cars Up To Tracking, Hijack And Theft (lien direct)

The Pen Test Partners has released information on major vulnerabilities it found in premium car alarm systems Viper and Pandora, which could have allowed hackers to locate cars, disable alarms, unlock doors, and even switch the engine immobiliser on/off. White hat hackers at Pen Test Partners were able to exploit critical vulnerabilities in popular 'smart' car alarm …

The ISBuzz Post: This Post Cyber Vulnerability In Car Alarm Opened Millions Of Cars Up To Tracking, Hijack And Theft appeared first on Information Security Buzz.

ZDNet.png 2019-03-11 22:33:02 Google Chrome to block automatic downloads initiated from ad slot iframes (lien direct)

Google continues its crusade against "drive-by download" attack vectors.

TechRepublic.png 2019-03-11 22:32:00 Use Excel to calculate the hours worked for any shift (lien direct)

With Microsoft Excel, you can create a worksheet that figures the hours worked for any shift. Follow these step-by-step instructions.

no_ico.png 2019-03-11 22:30:01 7 Misconceptions About DDoS Attacks That Could Jeopardize Your Business (lien direct)

Rolf Gierhard, VP of marketing at Link11 busts the most dangerous and pervasive myths about DDoS attacks – and shows how organizations can protect against them Most organizations understand that DDoS attacks are disruptive and potentially damaging.  But many are also unaware of just how quickly the DDoS landscape has changed over the past two …

The ISBuzz Post: This Post 7 Misconceptions About DDoS Attacks That Could Jeopardize Your Business appeared first on Information Security Buzz.

WiredThreatLevel.png 2019-03-11 21:38:04 Apple\'s March 25 Event Will Flex a New Focus on Services (lien direct)

Services will define the future of the company.

no_ico.png 2019-03-11 21:37:01 Facebook\'s Privacy Constitution (lien direct)

Bruce Schneier and I wrote an article on Facebook’s privacy changes: “A New Privacy Constitution for Facebook.”

no_ico.png 2019-03-11 21:36:05 The BBC Lack Of Security On Car Alarm (lien direct)

According to research by the BBC’s Click technology programme, security flaws in three specialist car alarms have left vehicles vulnerable to being stolen or hijacked.   Jake Moore, a Cybersecurity Specialist at ESET: “Cybersecurity flaws and breaches can make or break a company. Despite the risk of fallouts, it is insane that companies don’t constantly test their …

The ISBuzz Post: This Post The BBC Lack Of Security On Car Alarm appeared first on Information Security Buzz.

SecurityAffairs.png 2019-03-11 21:09:01 Moxa Industrial Switches plagued with several flaws (lien direct)

Security experts have discovered many vulnerabilities, including a critical issue, in Moxa EDS and IKS industrial switches. Industrial control systems used in many industries, including the energy sector, critical manufacturing, and transportation, continues to be an element of concern for security experts. Researchers have discovered several vulnerabilities in Moxa EDS and IKS industrial switches. The […]

The post Moxa Industrial Switches plagued with several flaws appeared first on Security Affairs.

WiredThreatLevel.png 2019-03-11 21:00:00 The World Wide Web Turns Thirty. Where Does It Go From Here? (lien direct)

Thirty years ago, Tim Berners-Lee published a proposal that led to the World Wide Web. Today, he reflects on its history-and its future.

SecurityWeek.png 2019-03-11 20:38:02 Georgia County Criticized Over $400K Ransomware Payment (lien direct)

Jackson County, Georgia is just a little over 60 miles from the City of Atlanta. In March 2018, Atlanta was struck by a major ransomware attack. In March 2019, Jackson County suffered its own ransomware attack. Both attacks were successful targeted attacks -- but that\'s about all they have in common.

read more

TechRepublic.png 2019-03-11 20:04:00 The Web at 30: How algorithms define what we experience and how we do business online (lien direct)

The early days of the Web relied on manually curated directories to organize the Web, though this task is now performed by algorithms, for better or worse.

ZDNet.png 2019-03-11 19:54:05 Companies are leaking sensitive files via Box accounts (lien direct)

Leaks discovered at Apple, the Discovery Channel, Herbalife, Schneider Electric, and even Box itself.

Kaspersky.png 2019-03-11 19:31:04 Researcher Claims Iranian APT Behind 6TB Data Heist at Citrix (lien direct)

IRIDIUM is an APT that uses proprietary techniques to bypass two-factor authentication for critical applications, according to security firm Resecurity.

Kaspersky.png 2019-03-11 19:14:02 Google Patches Critical Bluetooth RCE Bug (lien direct)

In all, Google reported 45 bugs in its March update with 11 ranked critical and 33 rated high.

TechRepublic.png 2019-03-11 18:34:01 What\'s new in the Gmail right-click menu (lien direct)

If you depend upon Gmail for daily communication, you\'ll be happy to know about the new right-click context menu that gives users more power and flexibility.

bleepingcomputer.png 2019-03-11 18:33:03 Windows 10 to Automatically Remove Updates That Cause Problems (lien direct)

Windows 10 will automatically uninstall Windows updates that cause startup failures due to incompatibility or issues in new software according to a support document published by Microsoft today. [...]

TechRepublic.png 2019-03-11 18:29:04 How to set up Munki on macOS Mojave to manage your Apple computers (lien direct)

With Munki, IT can standardize Macs running Mojave while still maintaining the flexibility of allowing users to manage their own devices.

TechRepublic.png 2019-03-11 18:07:05 4 simple but not well-known printing solutions for Word documents (lien direct)

One of these simple printing tips might help you the next time you\'re faced with an unusual printing task.

10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30

Information mise à jours le: 2019-03-26 04:01:32
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Notre RSS (filtré) Twitter