What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
SecurityAffairs.png 2019-09-20 14:52:05 U.S. taxpayers hit by a phishing campaign delivering the Amadey bot (lien direct)

Cofense researchers spotted a phishing campaign that is targeting taxpayers in the United States to infect them with the Amadey malware. Security experts at Cofense uncovered a phishing campaign that is targeting taxpayers in the United States attempting to infect them with a new piece of malware named Amadey. The Amadey bot is a quite […]

The post U.S. taxpayers hit by a phishing campaign delivering the Amadey bot appeared first on Security Affairs.

Malware
TechRepublic.png 2019-09-20 14:51:08 Ericsson chooses Lewisville, Texas as site for its first 5G smart factory in the US (lien direct)

Opening in early 2020, the fully connected and automated smart factory will make Advanced Antenna System radios that enable 5G deployments.

securityintelligence.png 2019-09-20 14:30:25 How to Take Control of Your Privileged Accounts (lien direct)

Privileged access management is a top concern for CISOs. Learn how to discover your organization\'s privileged accounts, why you need a least privilege strategy and how to reduce risky applications.

The post How to Take Control of Your Privileged Accounts appeared first on Security Intelligence.

bleepingcomputer.png 2019-09-20 14:03:47 Windows 7 Voting Systems to Get Free Security Updates Through 2020 Elections (lien direct)

Microsoft announced today that they will be providing free extended security updates for Windows 7 machines that are part of a federally certified voting system. [...]

TechRepublic.png 2019-09-20 14:03:27 Investment in LTE still going strong despite the onslaught of 5G (lien direct)

A report from a 5G trade association shows that 4G/LTE networks continue to grow despite the looming rollout of 5G. Those waiting for faster wireless shouldn\'t worry, though.

TechRepublic.png 2019-09-20 14:00:28 Organizations struggle to manage cyberthreats without automation (lien direct)

Report details how many organizations lack faith in their security systems to manage an ever-expanding digital landscape.

WiredThreatLevel.png 2019-09-20 14:00:00 What to Expect From a Pooch on a Paddleboard (lien direct)

Sharing your deck with a dog is risky, but knowing about conservation of momentum might help you stay dry.

TechRepublic.png 2019-09-20 13:53:42 How to follow messages in Slack (lien direct)

Never miss a reply to an important message in a Slack channel, with the Follow Message feature.

bleepingcomputer.png 2019-09-20 13:30:24 Windows 7 and Server 2008 Get 0patch Security Fixes After EoS (lien direct)

Microsoft ending support for Windows 7 and Server 2008 early next year will also stop delivery of security patches through the normal channel. But users have an alternative to get security fixes on a regular basis in the form of micropatches. [...]

Checkpoint.png 2019-09-20 13:00:36 Check Point Cyber Security Conference – CPX 360 Event Highlights (lien direct)

Get ready for the most educational cyber security conference of 2020, CPX 360. This is the one event where Check Point shares the stage with other industry experts to deliver the latest in cyber Innovation and news in security. You\'ll hear industry leaders sharing insights, research and strategies to help stay ahead of evolving cyber…

The post Check Point Cyber Security Conference – CPX 360 Event Highlights appeared first on Check Point Software.

WiredThreatLevel.png 2019-09-20 13:00:00 How to Back Up Your iPhone to iCloud or Mac (lien direct)

Save your memories before you grab that new version of iOS. We explain how to back up to iCloud or your Mac (with or without iTunes).

TechRepublic.png 2019-09-20 12:48:08 You can deploy Wi-Fi 6 now, but benefits of 5G could be years away for your organization (lien direct)

Wi-Fi 6 provides speeds up to 30% faster than 802.11ac, with a 75% decrease in latency. The iPhone 11, Galaxy Note 10, and other new smartphones and notebooks on the market today support Wi-Fi 6.

no_ico.png 2019-09-20 12:34:24 Millions Of Lion Air Passenger Records Breached – Expert Commentary (lien direct)

Subsidiaries of Indonesian low-cost airline Lion Air, including Malindo Air and Thai Lion Air, have suffered a massive data breach, resulting in the information of millions of passengers being leaked onto data exchange forums. The breached data includes: full names home addresses email addresses dates of birth phone numbers passport numbers and expiration dates The …

The ISBuzz Post: This Post Millions Of Lion Air Passenger Records Breached – Expert Commentary appeared first on Information Security Buzz.

ZDNet.png 2019-09-20 12:30:23 Magecart strikes again: hotel booking websites come under fire (lien direct)

Card-skimmers may have impacted close to 200 hotel properties and their customers.

no_ico.png 2019-09-20 12:20:24 Experts Comments On Magecart Attack On Hotel Websites Through The Supply Chain (lien direct)

Roomleader, a digital marketing and web development services provider that helps hospitality companies build out their online booking functionality through their library module which saves viewed hotel information in visitors\' browser cookies, was the victim of a magecart attack according to a Trend Micro Report. The hackers injected malicious code into Roomleader\'s “Viewed Hotels” module initiating …

The ISBuzz Post: This Post Experts Comments On Magecart Attack On Hotel Websites Through The Supply Chain appeared first on Information Security Buzz.

no_ico.png 2019-09-20 12:06:13 The Evolution Of Cybersecurity (lien direct)

Demands and expertise of the security industry are driven by technological advancement on both sides of the attack/defence fence Increased computer power, artificial intelligence, and tools on the Dark Web are equipping cyber attackers with the resources to launch more sophisticated and destructive attacks. Reactive defenses are no longer enough to stop attackers from infiltrating …

The ISBuzz Post: This Post The Evolution Of Cybersecurity appeared first on Information Security Buzz.

WiredThreatLevel.png 2019-09-20 12:00:00 Best iPhone for 2019: Which Model Should You Actually Buy? (lien direct)

Picking the right iPhone has become increasingly difficult, but this breakdown should help you figure out whether you want an iPhone 11 or another model, where to buy a case, and whether it\'s a good time to purchase.

WiredThreatLevel.png 2019-09-20 12:00:00 Gadget Lab Podcast: Your DNA Belongs on the Blockchain (lien direct)

Guest Megan Molteni tells us about gene-sequencing startup Nebula, and how its privacy practices could positively impact the way we share personal information on the web.

no_ico.png 2019-09-20 11:53:13 Experts Comments: NHS Trust Uncovers Insider Threat (lien direct)

NHS employee was found accessing medical records of over 2,000 patients. The employee had legitimate access to the trust’s electronic health record system, but was accessing them over a period of 18 months with no legitimate reason for doing so.

The ISBuzz Post: This Post Experts Comments: NHS Trust Uncovers Insider Threat appeared first on Information Security Buzz.

Threat
Trend.png 2019-09-20 11:51:45 Mac Malware that Spoofs Trading App Steals User Information, Uploads it to Website (lien direct)

We recently found and analyzed a malicious malware variant that disguised itself as a legitimate Mac-based trading app called Stockfolio. We found two variants of the malware family. The first one contains a pair of shell scripts and connects to a remote site to decrypt its encrypted codes while the second sample, despite using a simpler routine involving a single shell script, is actually incorporates a persistence mechanism.

The post Mac Malware that Spoofs Trading App Steals User Information, Uploads it to Website appeared first on .

Malware
SecurityAffairs.png 2019-09-20 11:28:47 Commodity Malware Reborn: The AgentTesla “Total Oil” themed Campaign (lien direct)

Agent Tesla is a fully customizable password info-stealer offered as malware-as-a-service, many cyber criminals are choosing it as their preferred recognition tool.   Introduction Nowadays the Malware-As-A-Service is one of the criminal favorite ways to breach security perimeter. Agent Tesla is one of these “commodity malware”. It is a fully customizable password info-stealer and many cyber […]

The post Commodity Malware Reborn: The AgentTesla “Total Oil” themed Campaign appeared first on Security Affairs.

Malware
TechRepublic.png 2019-09-20 11:00:17 Trying to land a tech job? Find out what matters most to tech leaders (lien direct)

Find out what hiring managers are looking for in candidates seeking tech jobs. Here\'s a hint. It\'s not your certifications.

WiredThreatLevel.png 2019-09-20 11:00:00 The Bleak Hopefulness of *Ad Astra* (lien direct)

Brad Pitt goes to space in a new psychodrama from director James Gray-and confronts the idea of home.

WiredThreatLevel.png 2019-09-20 11:00:00 (Déjà vu) The Best iPhone 11 Deals (and Which Model to Pick) (lien direct)

Are you planning to buy an iPhone 11, iPhone 11 Pro, or iPhone 11 Pro Max? Here\'s the WIRED guide to choosing between them, how to order, and the best deals.

01net.png 2019-09-20 10:42:40 Une faille critique dans Chrome permet de pirater les ordinateurs à distance (lien direct)

Une mise à jour urgente a été diffusée par Google. Elle colmate plusieurs failles, dont une qui permet à un pirate d\'exécuter du code à distance simplement en attirant ses victimes sur une page web piégée.

SecurityAffairs.png 2019-09-20 10:38:01 Crooks hacked other celebrity Instagram accounts to push scams (lien direct)

There is the same group behind the hack of the celebrity Instagram accounts, attackers used the same attack pattern to push scams. The same threat actor continues to target celebrity Instagram accounts to push scam sites to their wide audience. Recently the Instagram account of the popular actor Robert Downey Jr. (43.3M followers) has been […]

The post Crooks hacked other celebrity Instagram accounts to push scams appeared first on Security Affairs.

Hack,Threat
itsecurityguru.png 2019-09-20 10:26:58 Three Quarters Of Businesses Change Tactics To Protect Against Third Party Risk. (lien direct)

Research from Gurucul has uncovered 74 per cent of companies are being driven to actively take steps to mitigate security risks posed by third party vendors following recent breaches. The study also found that Managed Service Providers (MSPs) are the biggest third-party concern amongst IT security professionals, ahead of systems integrators and developers. Gartner has […]

The post Three Quarters Of Businesses Change Tactics To Protect Against Third Party Risk. appeared first on IT Security Guru.

itsecurityguru.png 2019-09-20 10:20:41 OneLogin Introduces Vigilance AI And SmartFactor Authentication To Combat Emerging Cybersecurity Threats. (lien direct)

OneLogin has announced Vigilance AI, the new artificial intelligence and machine learning (AI/ML) risk engine, and SmartFactor Authentication. The new next-generation identity capabilities empower enterprises to combat emerging cybersecurity threats and move beyond password-based authentication. “There’s been a massive uptick in cyberattacks targeting credentials, including brute force and breach replay attacks. Cybercriminals use credentials obtained […]

The post OneLogin Introduces Vigilance AI And SmartFactor Authentication To Combat Emerging Cybersecurity Threats. appeared first on IT Security Guru.

bleepingcomputer.png 2019-09-20 10:17:50 Twitter Removes State-backed Actors Conducting Information Campaigns (lien direct)

Twitter has removed another batch of state-sponsored actors performing information campaigns on Twitter.  The detected operations announced today involved Qatar, Iran, Yemen, Ecuador, Saudi Arabia, Spain, China, and Hong Kong. [...]

ZDNet.png 2019-09-20 09:50:26 Man allegedly used drone to pelt ex-girlfriend\'s home with bombs (lien direct)

Charges now include unregistered drone operation, meth use, and unlawfully owning firearms.

bleepingcomputer.png 2019-09-20 09:50:00 Forcepoint Fixes Privilege Escalation Bug in Windows VPN Client (lien direct)

A vulnerability affecting all versions of Forcepoint VPN Client for Windows, save the latest release, can be used to achieve persistence and evade detection. [...]

Vulnerability
itsecurityguru.png 2019-09-20 09:46:07 Latest Version Of Synopsys\' BSIMM10 Study Highlights The Impact Of DevOps On Software Security. (lien direct)

Synopsys has released its latest version of the Building Security in Maturity Model (BSIMM) study which has revealed how the DevOps movement and adoption of continuous integration and continuous delivery (CI/CD) tooling are affecting the way that firms approach software security. This is seen in the BSIMM\'s addition of three new activities that reflect how […]

The post Latest Version Of Synopsys\' BSIMM10 Study Highlights The Impact Of DevOps On Software Security. appeared first on IT Security Guru.

itsecurityguru.png 2019-09-20 09:41:45 Why Security Communication Matters More Than Ever. (lien direct)

Ellie Hurst, Head of Marketing Communication and Media at Adent-IM and a finalist in the Cyber Writer category in the Security Serious Unsung Heroes Awards 2019. I joined the security industry a little over eight years ago and my role is Head of Marketing, Media and Communications for an independent holistic security consultancy. Working in […]

The post Why Security Communication Matters More Than Ever. appeared first on IT Security Guru.

itsecurityguru.png 2019-09-20 09:28:26 Scotiabank credentials spill onto open internet due to internal source code. (lien direct)

Exclusive Scotiabank leaked online a trove of its internal source code, as well as some of its private login keys to backend systems, The Register can reveal. Over the past 24 hours, the Canadian financial giant has torn down GitHub repositories, inadvertently left open to the public, that contained this sensitive information, after The Register raised the alarm. These repositories […]

The post Scotiabank credentials spill onto open internet due to internal source code. appeared first on IT Security Guru.

itsecurityguru.png 2019-09-20 09:27:44 Emotet phishing botnet returns. (lien direct)

Cyber security threat researchers at multiple companies have reported that the prolific Emotet email trojan-turned-botnet has re-emerged as an active threat to inboxes after an apparent summer hiatus lasting three-and-a-half months. One of the most widely distributed and dangerous email attacks of the past few years, the resurgence began early on the morning of Monday 16 September, […]

The post Emotet phishing botnet returns. appeared first on IT Security Guru.

Threat
itsecurityguru.png 2019-09-20 09:27:07 Sensitive documents exposed due to WeWork\'s weak Wi-Fi. (lien direct)

When Teemu Airamo moved into his company’s new Manhattan office in shared workspace provider WeWork, he had one overriding priority: to run a security scan on the building’s Wi-Fi network. After all, he shared a space with more than 200 companies also co-working in the Financial District hub and didn’t want anyone snooping around.  Source: CNET

The post Sensitive documents exposed due to WeWork\'s weak Wi-Fi. appeared first on IT Security Guru.

itsecurityguru.png 2019-09-20 09:26:22 (Déjà vu) Audio can be recorded on Android Selfie app with 1.5M+ Installs. (lien direct)

A couple of Android apps found in Google Play included functionality that stealthy recording audio without user consent. The apps posed as selfie camera filters and had been installed over 1.5 million times. The main activity of the two apps was not spying on users but aggressively pushing adware that covered the entire screen of […]

The post Audio can be recorded on Android Selfie app with 1.5M+ Installs. appeared first on IT Security Guru.

itsecurityguru.png 2019-09-20 09:25:43 Breach confirmed by Thinkful. (lien direct)

On the heels of its acquisition by Chegg, developer education site Thinkful said an authorized third party had breached its systems. “We recently discovered that an unauthorized party may have gained access to certain Thinkful company credentials so, out of an abundance of caution, we are notifying all of our users,” company Vice President of […]

The post Breach confirmed by Thinkful. appeared first on IT Security Guru.

Korben.png 2019-09-20 09:11:54 6 jeux Batman à télécharger gratuitement (Trilogie Arkham et Trilogie LEGO Batman) (lien direct)

Ce vendredi, je vous propose de rester dans la thématique du jeu, avec la super promo d’Epic Games, qui offre pour la modique somme de 0,00 € pas moins de 6 jeux vidéos. Si comme moi, vous aimez l’univers de Batman, vous allez adorer puisque vous pouvez dès à présent … Suite

bleepingcomputer.png 2019-09-20 08:49:56 Windows 10 is Getting a New Optional Update Experience (lien direct)

Microsoft is changing the windows update experience in Windows 10 so that "optional" updates are shown in a dedicated screen that will allow you to pick which update you would like to install [...]

Blog.png 2019-09-20 08:40:15 MY TAKE: SMBs can do much more to repel ransomware, dilute disinformation campaigns (lien direct)

Local government agencies remain acutely exposed to being hacked. That\'s long been true. However, at this moment in history, two particularly worrisome types of cyber attacks are cycling up and hitting local government entities hard: ransomware sieges and election tampering. Related: Free tools that can help protect elections I had a deep discussion about this […]

Ransomware
ZDNet.png 2019-09-20 08:20:00 Twitter removes new batch of state-backed accounts (lien direct)

Twitter removes new accounts part of state-run information campaigns in the United Arab Emirates, Egypt, Saudi Arabia, Spain, Equador, and China.

NextINpact.png 2019-09-20 08:05:58 Huawei : Mate 30 (Pro/5G) avec Android 10 et " store " maison, montre Watch GT 2 (lien direct)

Comme prévu, le fabricant a présenté hier ses smartphones Mate 30 et Mate 30 Pro, y compris une déclinaison 5G pour ce dernier. Le premier dispose d\'un écran de 6,62" (2 340 x 1 080 pixels) contre 6,53" (2 400 x 1 0...

NextINpact.png 2019-09-20 08:05:58 Vivaldi 2.8 pour ordinateurs disponible, mais sans nouveauté majeure (lien direct)

L’équipe est manifestement concentrée sur la version Android du navigateur. Tant et si bien que la nouvelle mouture pour Linux, macOS et Windows ne contient aucune nouvelle fonction. Dans son billet de blog, l’éditeur...

WiredThreatLevel.png 2019-09-20 08:00:00 Enter the Capitalocene: How Climate Change Will Ruin Capitalism (lien direct)

Capitalism is responsible for climate change-not you and me. But here\'s what one economist says we could do about it.

silicon.fr.png 2019-09-20 07:57:15 Emotet reprend du service : ce trojan bancaire devenu malware à tout faire (lien direct)

Nouveau pic d\'activité pour Emotet. Cinq ans après sa découverte, il est devenu une plate-forme de diffusion de spam et de malware.

Spam,Malware
Korben.png 2019-09-20 07:00:44 FPS dans le navigateur #3 : Superhot (lien direct)

Non Superhot ne fait pas référence à la canicule de cet été dernier ni à ma personne en maillot, mais au 3è jeu de ma série dédiée aux jeux FPS gratuits via navigateur. Après avoir testé Wolfenstein 3D et Rush Team il fallait apporter un petit quelque chose de différent. Et c’est le … Suite

SecurityAffairs.png 2019-09-20 06:58:04 Magecart attackers target mobile users of hotel chain booking websites (lien direct)

Trend Micro researchers reported that a Magecart group has hacked the websites of two hotel chains to inject scripts targeting Android and iOS users. Researchers discovered a series of incidents involving software credit card skimmer used by Magecart to hit the booking websites of hotel chains. In early September, the researchers discovered a JavaScript code onto two […]

The post Magecart attackers target mobile users of hotel chain booking websites appeared first on Security Affairs.

The_Hackers_News.png 2019-09-20 03:51:48 Two Widely Used Ad Blocker Extensions for Chrome Caught in Ad Fraud Scheme (lien direct)

Two widely used Adblocker Google Chrome extensions mimicking as - AdBlock and uBlock Origin - have been caught stuffing cookies in the web browser of millions of users to generate affiliate income from referral schemes fraudulently. There\'s no doubt web extensions add a lot of useful features to web browsers, making your online experience great and aiding productivity, but at the same time,

bleepingcomputer.png 2019-09-20 03:34:35 Selfie Android Apps with 1.5M+ Installs Push Ads, Can Record Audio (lien direct)

A couple of Android apps found in Google Play included functionality that stealthy recording audio without user consent. The apps posed as selfie camera filters and had been installed over 1.5 million times. [...]

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21

Information mise à jours le: 2019-09-22 08:07:45
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Notre RSS (filtré) Twitter