What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
SecurityWeek.png 2019-01-18 13:53:01 Impact of U.S. Government Shutdown on Cybersecurity: Feedback Friday (lien direct)

The failure of President Donald Trump and the Democratic Party to reach an agreement over funding for the controversial Mexico border wall has led to the longest government shutdown in US history.

read more

no_ico.png 2019-01-18 13:47:01 MEGA Data Breach (lien direct)

A newly revealed trove of 772,904,991 unique email addresses and more than 21 million unique passwords that have been aggregated from over 2,000 leaked databases was recently discovered by Troy Hunt, the security researcher who maintains HaveIBeenPwned. The records were stored on one of the most popular cloud storage sites, MEGA, until it got taken down, and then …

The ISBuzz Post: This Post MEGA Data Breach appeared first on Information Security Buzz.

TechWorm.png 2019-01-18 13:43:05 North Korean hackers get access to Chile\'s ATM after employee falls for fake job interview over Skype (lien direct)

Employee tricked into giving North Korean hackers access to Chile\'s ATM over fake Skype job interview North Korean hackers fooled a Redbanc employee into a fake job interview over Skype and then tricked him into downloading malware onto his work computer to get access to the company\'s interbank network, according to a report by Chilean news […]

The post North Korean hackers get access to Chile\'s ATM after employee falls for fake job interview over Skype appeared first on TechWorm.

ESET.png 2019-01-18 13:39:05 Two men charged with hacking into SEC in stock-trading scheme (lien direct)

>The hacking duo is believed to have exploited a software flaw and compromised several SEC workstations with malware in order to take early peeks at financial disclosures

The post Two men charged with hacking into SEC in stock-trading scheme appeared first on WeLiveSecurity

TechRepublic.png 2019-01-18 13:34:03 How different platforms will impact the growth of 5G (lien direct)

At CES 2019, Qualcomm\'s Sanjeev Athalye discussed the three major areas that 5G aims to address and how some of the new platforms will impact the technology\'s rollout.

TechRepublic.png 2019-01-18 13:21:01 Fossil to sell smartwatch IP to Google for $40 million (lien direct)

As Apple holds firmly onto its lead in the wearables category, Google seeks to refresh its flagging Wear OS with help from Fossil\'s IP and its R&D team.

no_ico.png 2019-01-18 13:17:04 What Does Brexit Mean For Cybersecurity? (lien direct)

Following last night’s failed Brexit deal vote, and the instability it has caused, Corin Imai, senior security advisor at DomainTools has given her views on where Britain’s exit from the European Union leaves the cybersecurity industry. Corin Imai, Senior Security Advisor at DomainTools: “The UK is likely to face a plethora of cybersecurity challenges once article 50 is triggered. Information …

The ISBuzz Post: This Post What Does Brexit Mean For Cybersecurity? appeared first on Information Security Buzz.

SecurityAffairs.png 2019-01-18 13:15:04 Oracle critical patch advisory addresses 284 flaws, 33 critical (lien direct)

Oracle released the first critical patch advisory for 2019 that addresses a total of 284 vulnerabilities, 33 of them are rated “critical”. Let’s give a close look at some of the vulnerabilities fixed by this patch advisory. The advisory fixed the CVE-2016-1000031 flaw, a remote code execution (RCE) bug in the Apache Commons FileUpload,  disclosed in November […]

The post Oracle critical patch advisory addresses 284 flaws, 33 critical appeared first on Security Affairs.

WiredThreatLevel.png 2019-01-18 13:00:00 \'Glass\' Review: It\'s not Perfect, But It Says a Lot About Heroism (lien direct)

There\'s one big question at the core of writer-director M. Night Shyamalan\'s new movie: Who gets to be a hero?

WiredThreatLevel.png 2019-01-18 13:00:00 Space Billboards Are Just the Latest Orbital Stunt (lien direct)

A company that wants to slap logos on the night sky and other groups are raising tricky questions about what belongs in space.

bleepingcomputer.png 2019-01-18 12:50:00 Amazon, Apple, Others Hit with GDPR Complaints, €18.8B Maximum Penalties (lien direct)

Ten GDPR complaints were filed by noyb against Amazon, Apple, DAZN, Spotify, SoundCloud, YouTube, Flimmit, Netflix with the Austrian Data Protection Authority for violations of Article 15, with a maximum penalty across all complaints of €18.8 billion [...]

securityintelligence.png 2019-01-18 12:35:02 10 Cybersecurity Conference Trips You Should Make Time for This Year (lien direct)

>Not sure where to distribute IT budgets for ideal returns? Here\'s a roundup of the top 10 cybersecurity conference trips to make time for this year.

The post 10 Cybersecurity Conference Trips You Should Make Time for This Year appeared first on Security Intelligence.

bleepingcomputer.png 2019-01-18 12:07:01 Vulnerabilities Found in Highly Popular Firmware for WiFi Chips (lien direct)

WiFi chip firmware in a variety of devices used mainly for gaming, but also for personal computing, and communication comes with multiple issues. At least some of them could be exploited to run arbitrary code remotely without requiring user interaction. [...]

WiredThreatLevel.png 2019-01-18 12:00:00 India\'s Plan to Curb Hate Speech Could Mean More Censorship (lien direct)

India\'s government has proposed rules that would require encrypted messaging services like WhatsApp to decrypt data, threatening the security of users globally.

WiredThreatLevel.png 2019-01-18 12:00:00 Trump\'s Missile Defense Plan Creates More Problems Than It Solves (lien direct)

The Trump administration has presented its Missile Defense Review, and yes, there are lasers.

WiredThreatLevel.png 2019-01-18 12:00:00 If Edible Insects Are the Future, We Should Talk About Poop (lien direct)

Insects are touted as a major new source of protein, but scaling up Big Cricket could mean new problems-such as what to do with all their "frass."

ZDNet.png 2019-01-18 11:52:03 These malicious Android apps will only strike when you move your smartphone (lien direct)

Apps containing the Anubis banking Trojan and an interesting motion sensor have been found in the Google Play store.

no_ico.png 2019-01-18 11:48:02 BEC Scammers Targeting Payroll Diversion (lien direct)

News broketodaythatBEC scammers have responded to the flurry of attention brought on their practices in 2018 by moving towards a different tactic; impersonating an employee and issuing a fraudulent request to change their bank account details with the HR department. Corin Imai, Senior Security Advisor at DomainTools: “As public awareness of BEC scams has grown in …

The ISBuzz Post: This Post BEC Scammers Targeting Payroll Diversion appeared first on Information Security Buzz.

ZDNet.png 2019-01-18 11:46:00 Temporary fix available for one of the two Windows zero-days released in December (lien direct)

Microsoft did not issue official fixes during the recent January Patch Tuesday update window.

no_ico.png 2019-01-18 11:44:01 Cyber Threats Among Biggest Risks In 2019, World Economic Forum Warns (lien direct)

According toreports, evolving cyber threats are among the biggest risks in 2019, the World Economic Forum (WEF) has warned.The WEF\'sglobal risks report– ahead of its annual gathering of world leaders and business figures in Davos next week – called for greater collaboration between nations. A survey of 1,000 decision-makers from the public and private sectors …

The ISBuzz Post: This Post Cyber Threats Among Biggest Risks In 2019, World Economic Forum Warns appeared first on Information Security Buzz.

bleepingcomputer.png 2019-01-18 10:09:05 Facebook Caught Red Handed While Swiping Money From Children (lien direct)

According to court documents part of a 2012 class-action lawsuit made public by a federal judge at the request of The Center for Investigative Reporting\'s Reveal, social network giant Facebook has made a habit of charging kids without their parents\' knowledge while playing games on its platform . [...]

ZDNet.png 2019-01-18 10:02:00 Microsoft launches Azure DevOps bug bounty program, $20,000 rewards on offer (lien direct)

The Redmond giant is keenly interested in remote code execution and privilege escalation flaws.

no_ico.png 2019-01-18 09:52:01 Less Than Half Of Firms Able To Detect IoT Breaches (lien direct)

A new research that has revealed less than half of firms are able to detect IoT breaches.  Only 48% of European firms can detect when any of their internet-connected devices have been breached, a survey shows. In the UK, this figure drops to 42%, the second lowest in Europe after France, where only 36% of companies …

The ISBuzz Post: This Post Less Than Half Of Firms Able To Detect IoT Breaches appeared first on Information Security Buzz.

SecurityAffairs.png 2019-01-18 09:49:02 Twitter fixed a bug in its Android App that exposed Protected Tweets (lien direct)

A bug in the Twitter app for Android may have had exposed tweets, the social media platform revealed on Thursday. The bug in the Android Twitter app affects the “Protect my Tweets” option from the account\'s “Privacy and safety” settings that allows viewing user’s posts only to approved followers. People who used the Twitter app […]

The post Twitter fixed a bug in its Android App that exposed Protected Tweets appeared first on Security Affairs.

SecurityWeek.png 2019-01-18 08:49:05 Facebook Closes Hundreds of \'Inauthentic\' Russia-Linked Pages (lien direct)

Facebook announced Thursday that it has removed more than 500 pages, groups and accounts originating in Russia for engaging in what the social network called "coordinated inauthentic behavior."

read more

SecurityAffairs.png 2019-01-18 07:58:04 Attacks in the wild leverage flaw in ThinkPHP Framework (lien direct)

Threat actors in the wild are leveraging a recently discovered flaw in the ThinkPHP PHP framework to install cryptominers, skimmers, and other malware. Multiple threat actors are leveraging a recently discovered code execution vulnerability (CVE-2018-20062) in the ThinkPHP framework. The flaw was already addressed by the Chinese firm TopThink that designed the framework, but security expert Larry […]

The post Attacks in the wild leverage flaw in ThinkPHP Framework appeared first on Security Affairs.

SecurityWeek.png 2019-01-18 07:01:04 Bug in Twitter Android App Exposed Protected Tweets (lien direct)

Twitter revealed on Thursday that users of its Android application may have had their supposedly protected tweets made public due to a bug.

read more

SecurityWeek.png 2019-01-18 06:07:00 Portuguese Hacker Linked to \'Football Leaks\' Held in Hungary (lien direct)

A Portuguese hacker said by his lawyers to have played a pivotal role in the Football Leaks whistleblower website was fighting extradition from Hungary to Portugal on Thursday on charges of extortion.

Rui Pinto, 30, was arrested on Wednesday.

read more

no_ico.png 2019-01-18 03:58:05 What Does A No-Deal Brexit Mean For The Flow Of EU-UK Data? (lien direct)

So MPs have voted against Theresa May’s deal, and the EU are ruling out reopening the agreement making ano-deal Brexit more likely than ever – what does this mean for the sharing of data? Hint – It’s not good! Expert Comments below: Chris Combemale, CEO at DMA: “In the wake of today\'s no vote in Parliament, …

The ISBuzz Post: This Post What Does A No-Deal Brexit Mean For The Flow Of EU-UK Data? appeared first on Information Security Buzz.

The_Hackers_News.png 2019-01-18 03:37:05 New Android Malware Apps Use Motion Sensor to Evade Detection (lien direct)

Even after so many efforts by Google for preventing its Play Store from malware, shady apps somehow managed to fool its anti-malware protections and get into its service to infect Android users with malware. Two such Android apps have recently been spotted on the Google Play Store by security researchers with the Trend Micro malware research team, infecting thousands of Android users who have

bleepingcomputer.png 2019-01-18 02:47:03 Windows Zero-Day Bug that Overwrites Files Gets Interim Fix (lien direct)

A micropatch has been released today for a vulnerability in Windows that allows overwriting files, even system one, with arbitrary data. [...]

TroyHunt.png 2019-01-18 01:31:04 Weekly Update 122 (lien direct)

Presently sponsored by: Live Workshop! Watch the Varonis DFIR team investigate a cyberattack using our data-centric security stack

And then there was the biggest data breach to go into HIBP ever! I wrote that sentence from home just after publishing all the data, then I got on a plane...

Holy cow that\'s a lot of emails! Hundreds upon hundreds of emails came in whilst on the way to

no_ico.png 2019-01-18 01:00:04 Voipo Misconfiguration (lien direct)

The news was recently reported that Voipo, a Lake Forest, California-based communications provider, left a database containing seven million call logs, six million text messages and other internal documents containing unencrypted passwords unprotected without a password. The database was exposed since June 2018 and contains call and message logs dating back to May 2015. Just like last …

The ISBuzz Post: This Post Voipo Misconfiguration appeared first on Information Security Buzz.

no_ico.png 2019-01-17 23:15:04 Multiple Zero-Day Vulnerabilities Discovered By Tenable Research In Building Access Technology (lien direct)

An attacker could get free rein over buildings by exploiting the unpatched flaws to create fraudulent badges and disable building locks Tenable®, Inc., the Cyber Exposure company, today announced that Tenable Research has discovered several zero-day vulnerabilities in the PremiSysâ„¢access control system developed by IDenticard. When exploited, the most severe vulnerability would give an attacker …

The ISBuzz Post: This Post Multiple Zero-Day Vulnerabilities Discovered By Tenable Research In Building Access Technology appeared first on Information Security Buzz.

ZDNet.png 2019-01-17 23:08:04 Hacker behind \'Football Leaks\' arrested in Hungary (lien direct)

Hacker is a 30-year-old Portuguese man. Police haven\'t released his name, but several news outlets claim he\'s named Rui Pinto, a man they\'ve identified and have been tracking for years.

WiredThreatLevel.png 2019-01-17 22:58:04 Is It Time for a Google Fitness Watch? (lien direct)

Fitness is what\'s driving smartwatches.

The_Hackers_News.png 2019-01-17 22:49:04 A Twitter Bug Left Android Users\' Private Tweets Exposed For 4 Years (lien direct)

Twitter just admitted that the social network accidentally revealed some Android users\' protected tweets to the public for more than 4 years - a kind of privacy blunder that you\'d typically expect from Facebook. When you sign up for Twitter, all your Tweets are public by default, allowing anyone to view and interact with your Tweets. Fortunately, Twitter also gives you control of your

Kaspersky.png 2019-01-17 22:36:04 Microsoft Launches Azure DevOps Bug Bounty Program (lien direct)

Microsoft is offering rewards of up to $20,000 for flaws in its Azure DevOps online services and the latest release of the Azure DevOps server.

WiredThreatLevel.png 2019-01-17 22:32:04 Why Does a Lunar Eclipse Get Called a Blood Moon? (lien direct)

It means that people (*cough astrologers not astronomers*) are giving names to phenomena that don\'t really need cute labels.

no_ico.png 2019-01-17 22:30:02 Security Talent Shortage (lien direct)

While CISOs and security teams have been doing their best to find creative solutions to the never-ending security talent shortage, the industry continues to struggle to meet the current and future demand. A Cisco report pegged the amount of unfilled cybersecurity jobs in 2019 at 1.5 million. Nimmy Reichenberg, CMO at cyber security company Siemplify says, “Many have hired IT …

The ISBuzz Post: This Post Security Talent Shortage appeared first on Information Security Buzz.

WiredThreatLevel.png 2019-01-17 22:22:05 \'Dragon Ball Super: Broly\' and the Franchise\'s Surprising Longevity (lien direct)

More than 30 years after the original manga began, the anime series and feature films are more popular than ever.

TechRepublic.png 2019-01-17 22:04:04 Help! Why is my printer unreachable through Windows 7? (lien direct)

You have been trying to set up a printer to use with Windows 7, however, you have been unsuccessful. So what do you do? You ask for help from your fellow members within the TechRepublic forums.

no_ico.png 2019-01-17 21:15:02 If Cybersecurity Breaches Are Inevitable What Should Organizations Do About It? (lien direct)

There\'s an inconvenient truth in the business community. As many business decision-makers are only too aware, hardly a week seems to go by without a data breach of some form being reported to press, and this year alone has witnessed some major breaches which have affected thousands of people around the world. Just take a …

The ISBuzz Post: This Post If Cybersecurity Breaches Are Inevitable What Should Organizations Do About It? appeared first on Information Security Buzz.

TechRepublic.png 2019-01-17 20:43:03 Smart cities panel at CES 2019: AT&T\'s Mike Zeto on 5G, IoT, resiliency (lien direct)

AT&T\'s Mike Zeto discusses the future of smart cities with TechRepublic\'s Jason Hiner and Teena Maddox at CES 2019.

ZDNet.png 2019-01-17 20:40:00 Twitter bug revealed private tweets for some Android users for almost five years (lien direct)

Some Twitter for Android users had their private tweets exposed to non-followers and search engines.

TechRepublic.png 2019-01-17 20:19:04 4 strategies for your IT wearables policy (lien direct)

Without a formal plan or policy, wearables may introduce your company to a security breach​.

Chercheur.png 2019-01-17 20:11:00 773M Password \'Megabreach\' is Years Old (lien direct)

My inbox and Twitter messages positively lit up today with people forwarding stories from Wired and other publications about a supposedly new trove of nearly 773 million unique email addresses and 21 million unique passwords that were posted to a hacking forum. A story in The Guardian breathlessly dubbed it "the largest collection ever of breached data found." But in an interview with the apparent seller, KrebsOnSecurity learned that it is not even close to the largest gathering of stolen data, and that it is at least two to three years old.

Kaspersky.png 2019-01-17 20:04:02 Apple CEO Demands Federal Data Privacy Legislation (lien direct)

Apple CEO Tim Cook has called on the government to double down on data privacy regulation in 2019.

WiredThreatLevel.png 2019-01-17 19:57:01 How the Feds Failed to Track Thousands of Separated Children (lien direct)

Ad-hoc systems and haphazard databases made the Trump administration\'s cruel border separation policies somehow even worse.

MalwarebytesLabs.png 2019-01-17 19:51:02 Improved Fallout EK comes back after short hiatus (lien direct) The Fallout exploit kit is back with some noteworthy improvements.

Categories:

Exploits Threat analysis

Tags:

(Read more...)

The post Improved Fallout EK comes back after short hiatus appeared first on Malwarebytes Labs.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21

Information mise à jours le: 2019-01-19 06:03:28
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Notre RSS (filtré) Twitter