What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
bleepingcomputer.png 2019-09-10 11:17:01 Adobe Releases Security Updates for Flash Player and Application Manager (lien direct)

Adobe has published their monthly Patch Tuesday updates for the month of September 2019 that resolves three security vulnerabilities in two programs. All the vulnerabilities fixed today are for arbitrary code execution that could allow an attacker to execute commands on a vulnerable machine. [...]

WiredThreatLevel.png 2019-09-10 11:00:00 Three Ways to Fix the Drug Industry\'s Rampant Dysfunction (lien direct)

Big Pharma has come under fire for mislabeled drugs, price spikes, and life-threatening shortages. Now a handful of startups hope to clean up the industry.

The_State_of_Security.png 2019-09-10 10:53:01 District in Rockford Public Schools Confirms Ransomware Attack (lien direct)

A district within the Rockford Public Schools (RPS) system has confirmed it suffered a ransomware attack that affected parts of its network. On 6 September, District 205 of RPS posted a statement on Facebook in which it noted that its Internet, phones and information systems used to track attendance and student records were down. The […]… Read More

The post District in Rockford Public Schools Confirms Ransomware Attack appeared first on The State of Security.

bleepingcomputer.png 2019-09-10 10:30:00 Business Email Compromise Is a $26 Billion Scam Says the FBI (lien direct)

FBI\'s Internet Crime Complaint Center (IC3) says that Business Email Compromise scams are continuing to grow every year, with a 100% increase in the identified global exposed losses between May 2018 and July 2019. [...]

WiredThreatLevel.png 2019-09-10 10:03:00 Apple Event Liveblog: All the iPhone News as It Happens (lien direct)

Join us for live commentary beginning at 1 pm Eastern, 10 am Pacific.

WiredThreatLevel.png 2019-09-10 10:00:00 AI Can Pass Standardized Tests-But It Would Fail Preschool (lien direct)

Opinion: Sure, an AI aced an 8th-grade science test, but the method it used highlights its lack of common sense or anything resembling human understanding.

bleepingcomputer.png 2019-09-10 09:57:02 Bugs in D-Link and Comba Networking Gear Disclose Passwords (lien direct)

Vulnerabilities found in networking gear from D-Link and Comba allow retrieving sensitive information like ISP credentials and device access passwords without authentication. [...]

WiredThreatLevel.png 2019-09-10 09:50:00 Forget Driving. You\'ll Wish You Could Watch TV in This Car (lien direct)

An electric SUV from Chinese startup Byton features a 4-foot-wide curved screen, as well as 270 horsepower and a 224-mile range.

The_Hackers_News.png 2019-09-10 09:42:03 Some D-Link and Comba WiFi Routers Leak Their Passwords in Plaintext (lien direct)

What could be worse than your router leaking its administrative login credentials in plaintext? Cybersecurity researchers from Trustwave\'s SpiderLabs have discovered multiple security vulnerabilities in some router models from two popular manufacturers-D-Link and Comba Telecom-that involve insecure storage of credentials, potentially affecting every user and system on that network. Researcher

Trend.png 2019-09-10 09:37:05 IoT Attack Opportunities Seen in the Cybercrime Underground (lien direct)

We looked into IoT-related discussions from several cybercrime underground communities and found discussions ranging from tutorials to actual monetization schemes for IoT-related attacks. For this entry, we provide an overview of what cybercriminals see as perfect openings for attacks on IoT technologies.

The post IoT Attack Opportunities Seen in the Cybercrime Underground appeared first on .

WiredThreatLevel.png 2019-09-10 09:30:00 Should AI Researchers Get Special Access to Visas? (lien direct)

An industry group proposes that countries create a special visa for AI specialists, to foster the exchange of ideas.

SecurityAffairs.png 2019-09-10 09:25:03 Police dismantled Europe\'s second-largest counterfeit currency network on the dark web (lien direct)

The European authorities announced to have dismantled Europe\'s second-largest counterfeit currency network on the dark web. A joint operation conducted by The Portuguese Judicial Police (Polícia Judiciária) along with with the Europol allowed dismantling Europe\'s second-largest counterfeit currency network on the dark web. The authorities announced the arrest of five members of the counterfeit currency […]

The post Police dismantled Europe\'s second-largest counterfeit currency network on the dark web appeared first on Security Affairs.

ZDNet.png 2019-09-10 08:54:03 Student pleads guilty to IRS hack attempt for Trump tax returns (lien direct)

Prosecutors call him a mastermind. Defenders say it was Wayne\'s World gone awry.

Pirate.png 2019-09-10 08:48:02 Selon Avast, certaines applications de lampe torche disponibles sur Google Play demandent jusqu\'à 77 permissions (lien direct)
Les experts d\'Avast ont découvert que les applications de lampe torche sollicitent en moyenne 25 autorisations.
The_Hackers_News.png 2019-09-10 08:31:02 Adobe Releases Security Patches For Critical Flash Player Vulnerabilities (lien direct)

It\'s Patch Tuesday again-the day of the month when both Adobe and Microsoft release security patches for vulnerabilities in their software. Adobe has just released its monthly security updates to address a total of 3 security vulnerabilities in only two of its products this time-Adobe Flash Player and Adobe Application Manager (AAM). None of the security vulnerabilities patched this month in

01net.png 2019-09-10 08:01:00 Firefox va bientôt activer le DNS-over-HTTPS par défaut (lien direct)

D\'ici à fin septembre, un petit pourcentage d\'utilisateurs américains verront leurs requêtes DNS chiffrées par défaut. À terme, Mozilla vise un déploiement global.

ZDNet.png 2019-09-10 07:55:02 European police arrest Dark Web counterfeit currency traders (lien direct)

Over €1 million in fake notes has been seized across Europe.

SecurityWeek.png 2019-09-10 07:39:02 (Déjà vu) HackerOne Raises $36.4 Million in Series D Funding Round (lien direct)

Pentesting and bug bounty platform provider HackerOne on Monday announced that it raised $36.4 million in a Series D funding round, which brings the total raised by the company to date to more than $110 million.

read more

TEAM_CYMRU_Blog.png 2019-09-10 07:15:00 October 2 – 4, 2019: Virus Bulletin Conference (lien direct)

Team Cymru’s James Shank will be in London, UK, October 2 – 4, 2019 at the Virus Bulletin Conference! Please look for him there, he would be happy to meet you. If you would prefer to plan your time with him, please request a time to meet him.

SecurityAffairs.png 2019-09-10 07:13:03 (Déjà vu) Robert Downey Jr\'s Instagram account has been hacked (lien direct)

The Instagram account of Robert Downey Jr. has been hacked, he is the last celebrity in order of time that had the social media accounts compromised. Robert Downey Jr. Instagram account has been hacked, in this case the attacker did not publish offensive messages, but attempted to monetize their efforts by posting fake giveaways for […]

The post Robert Downey Jr’s Instagram account has been hacked appeared first on Security Affairs.

bleepingcomputer.png 2019-09-10 07:09:02 Microsoft Teams Can Be Used To Execute Arbitrary Payloads (lien direct)

Attackers can use genuine binaries from Microsoft Teams to execute a malicious payload using a mock installation folder for the collaboration software. [...]

Korben.png 2019-09-10 07:00:00 La guerre des browsers de 1996 à 2019 (lien direct)

Depuis 1999, avec l’arrivée d’Internet Explorer, la grande famille des navigateurs n’a de cesse de se mener une guerre de parts de marché. Le navigateur s’est mué très tôt en élément stratégique notamment pour Google qui grâce à Chrome a réussi à renforcer la position de ses autres services et … Suite

SecurityAffairs.png 2019-09-10 06:21:03 DoS attack the caused disruption at US power utility exploited a known flaw (lien direct)

A DoS attack that caused disruptions at a power utility in the United States exploited a flaw in a firewall used in the facility. The incident took place earlier this year, threat actors exploited a known vulnerability in a firewall used by the affected facility to cause disruption. In May, the Department of Energy confirmed […]

The post DoS attack the caused disruption at US power utility exploited a known flaw appeared first on Security Affairs.

Blog.png 2019-09-10 06:06:00 (Déjà vu) Sunset: dawn Vulnhub Walkthrough (lien direct)

Today we are going to solve another CTF challenge called “Sunset: dawn”. It is available on Vulnhub for the purpose of Penetration Testing practices. This is a box from the Sunset series. The credit for making this lab goes to “whitecr0wz”. Let\'s start and learn how to successfully breach it. Level: Intermediate Since these labs... Continue reading

The post Sunset: dawn Vulnhub Walkthrough appeared first on Hacking Articles.

CSO.png 2019-09-10 05:53:00 IDG Contributor Network: How a small business should respond to a hack (lien direct)

Hacks and data breaches are, unfortunately, part of doing business today. Ten years ago, it was the largest corporations that were most targeted by hackers, but that has changed. As large organizations have improved their cybersecurity, and more and more small businesses go online, hackers have shifted their attention to smaller targets.

The threat

Putting numbers on the scale of cybercrime is difficult, not least because many companies are resistant to acknowledging that they\'ve been hacked. A huge study from 2010, though, conducted by Verizon working in conjunction with the US Secret Service, found that even then smaller businesses were under huge threat from cybercriminals: over 60% of the data breaches covered in that report were from businesses with less than 100 employees.

To read this article in full, please click here

SecurityThroughEducation.PNG 2019-09-10 04:33:00 Ep. 121 – Help Us Impress Joe\'s Mother with Joe Navarro (lien direct)

Joe Navarro – that is really all I have to say but let me say more.  Body Language expert. Spy Catcher. Awesome Son…. so much more. – September 09, 2019 Contents Download Get Involved Download Ep. 121 – Help Us Impress Joe’s Mother with Joe Navarro Get Involved Got a great idea for an upcoming […]

The post Ep. 121 – Help Us Impress Joe’s Mother with Joe Navarro appeared first on Security Through Education.

bleepingcomputer.png 2019-09-10 03:40:05 Microsoft Phishing Page Uses Captcha to Bypass Automated Detection (lien direct)

A new phishing campaign has been observed in the wild using captcha boxes to hide a fake Microsoft account login page from secure email gateways (SEGs). [...]

The_State_of_Security.png 2019-09-10 03:00:01 10 of the Most Significant Ransomware Attacks of All Time (lien direct)

For years, ransomware actors have developed new families and attack campaigns in increasing frequency and numbers. Such activity peaked in 2017 but then fell in tandem with cryptocurrency miners\' rise. This development was short-lived, however. Between Q4 2018 and Q1 2019, Malwarebytes observed a 195 percent increase in ransomware detections involving business targets. The rate […]… Read More

The post 10 of the Most Significant Ransomware Attacks of All Time appeared first on The State of Security.

WiredThreatLevel.png 2019-09-09 23:27:02 FDA Says Juul Can\'t Claim to Be Safer Than Cigarettes (lien direct)

Regulators say Juul hasn\'t proved its claim that e-cigarettes are safer than tobacco, and uses misleading appeals to kids.

BBC.png 2019-09-09 23:09:04 Brain hack devices must be scrutinised, say top scientists (lien direct)

The UK\'s Royal Society warns of the risk of companies accessing our thoughts and moods.

WiredThreatLevel.png 2019-09-09 22:07:00 The Myth of Processed Foods, an Amazon Walkout, and More News (lien direct)

Catch up on the most important news from today in two minutes or less.

WiredThreatLevel.png 2019-09-09 22:00:04 States Are Turning Up the Heat on Google and Facebook (lien direct)

State attorneys general revealed investigations into possible anticompetitive behavior by tech giants, adding to probes by Congress and federal agencies.

SecurityAffairs.png 2019-09-09 21:30:01 Stealth Falcon New Malware Uses Windows BITS Service to Stealthy Exfiltrate Data (lien direct)

ESET researchers discovered a new malware associated with the Stealth Falcon APT group that abuses the Windows BITS service to stealthy exfiltrate data. Security researchers from discovered a new malware associated with the Stealth Falcon cyber espionage group that abuses the Windows BITS service to stealthy exfiltrate data. Stealth Falcon is a nation-state actor active […]

The post Stealth Falcon New Malware Uses Windows BITS Service to Stealthy Exfiltrate Data appeared first on Security Affairs.

WiredThreatLevel.png 2019-09-09 21:25:03 Don\'t Get Screwed Out of Your Equifax Settlement Money (lien direct)

If you signed up for $125 payout in the Equifax settlement, you just hit another hurdle. But this isn\'t over.

TechRepublic.png 2019-09-09 20:45:02 How to use Google Assistant as a text translator (lien direct)

Google Assistant has a lot of nifty features tucked up its sleeve. One lesser known is the ability to translate text.

TechRepublic.png 2019-09-09 20:40:03 Top 5 password alternatives (lien direct)

Passwords remain the most common way to authenticate your online identity, but companies like Microsoft and Google are using alternate login methods. Tom Merritt offers five alternatives to passwords.

TechRepublic.png 2019-09-09 20:21:00 How to add a specific bar for searching in Firefox (lien direct)

If you long for the days of having separate bars for addresses in searching in Firefox, fear not--you can bring back that feature in a few seconds.

WiredThreatLevel.png 2019-09-09 19:43:00 How Safari and iMessage Have Made iPhones Less Secure (lien direct)

Security researchers say iOS\'s security woes stem in part from Apple putting too much trust in its own software\'s code.

TechRepublic.png 2019-09-09 19:35:00 How to set up an SFTP server on Linux (lien direct)

These steps walk you through the process of setting up an SFTP server on Linux for the secure transfer of files for specialized file transfer-only users.

TechRepublic.png 2019-09-09 19:23:02 Apple\'s iPhone 11 event: How to watch it (lien direct)

Apple\'s September 10, 2019 event is believed to be our first look at the iPhone 11. Find out how to watch Apple event and what else is rumored to be announced.

SecurityWeek.png 2019-09-09 19:08:01 DNS-over-HTTPS Coming to Firefox (lien direct)

Mozilla this week announced plans to gradually roll-out DNS-over-HTTPS (DoH) in Firefox starting this month, though only users in the United States will receive it in the beginning.

read more

TechRepublic.png 2019-09-09 19:06:05 More than 99% of attacks in the past year relied on human error to gain access (lien direct)

Experiencing a data breach purely from being internet-connected is quite rare. Hackers rely on users to open or install a malicious payload, according to Proofpoint.

Data Breach
mcafee.png 2019-09-09 19:05:05 Evolution of Malware Sandbox Evasion Tactics – A Retrospective Study (lien direct)

Executive Summary Malware evasion techniques are widely used to circumvent detection as well as analysis and understanding. One of the dominant categories of evasion is anti-sandbox detection, simply because today\'s sandboxes are becoming the fastest and easiest way to have an overview of the threat. Many companies use these kinds of systems to detonate malicious […]

The post Evolution of Malware Sandbox Evasion Tactics – A Retrospective Study appeared first on McAfee Blogs.

ZDNet.png 2019-09-09 18:33:02 (Déjà vu) Security researchers expose another instance of Chrome patch gaping (lien direct)

Security bug patched in Chrome\'s V8 JavaScript engine, but the fix will only reach Chrome tomorrow.

ZDNet.png 2019-09-09 18:33:00 Security researchers expose another instance of Chrome patch gapping (lien direct)

Security bug patched in Chrome\'s V8 JavaScript engine, but the fix will only reach Chrome tomorrow.

no_ico.png 2019-09-09 18:30:04 The Good, The Bad And The Ugly Of Digital Transformation (lien direct)

Corporate networks are being restructured in order to enable digital transformation so that organizations can remain competitive in the market. Modernising the network means that a shift is taking place across businesses, with technological innovations such as public, private and hybrid cloud platforms, containerisation, and microservices driving waves of change.    These technologies are enabling businesses to be …

The ISBuzz Post: This Post The Good, The Bad And The Ugly Of Digital Transformation appeared first on Information Security Buzz.

SecurityAffairs.png 2019-09-09 17:31:05 Telegram Privacy Fails Again (lien direct)

Security expert discovered that busing a well-known feature of deleting messages it is possible to threate the users’ privacy. This is not a security vulnerability its a privacy issue. As I understand Telegram a messaging app focuses on privacy which has over 10,00,00,000+  downloads in Playstore. In this case, we are abusing a well-known feature of deleting […]

The post Telegram Privacy Fails Again appeared first on Security Affairs.

bleepingcomputer.png 2019-09-09 17:30:00 Office 365 ATP Automated Incident Response Now Generally Available (lien direct)

Microsoft announced today the general availability of the Automated Incident Response feature in Office 365 Advanced Threat Protection (ATP) users to support the rising requirements of security teams. [...]

bleepingcomputer.png 2019-09-09 16:49:00 Exploit Kits Target Windows Users with Ransomware and Trojans (lien direct)

Over the weekend and into today, four different malvertising campaigns have been redirecting users to exploit kits that install password stealing Trojans, ransomware, and clipboard hijackers. [...]

Chercheur.png 2019-09-09 16:47:05 Secret Service Investigates Breach at U.S. Govt IT Contractor (lien direct)

The U.S. Secret Service is investigating a breach at a Virginia-based government technology contractor that saw access to several of its systems put up for sale in the cybercrime underground, KrebsOnSecurity has learned. The contractor claims the access being auctioned off was to old test systems that do not have direct connections to its government partner networks. In mid-August, a member of a popular Russian-language cybercrime forum offered to sell access to the internal network of a U.S. government IT contractor that does business with more than 20 federal agencies, including several branches of the military. The seller bragged that he had access to email correspondence and credentials needed to view databases of the client agencies, and set the opening price at six bitcoins (~USD $60,000).

10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30

Information mise à jours le: 2019-09-22 08:07:45
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Notre RSS (filtré) Twitter