What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
Blog.png 2019-03-11 18:05:04 unknowndevice64: 1: Vulnhub Lab Walkthrough (lien direct)

Hello friends! Today we are going to take another boot2root challenge known as “unknowndevice64: 1”. The credit for making this VM machine goes to “Ajay Verma” and it is another boot2root challenge in which our goal is to get root access to complete the challenge. You can download this VM here. Security Level: Beginner Penetrating... Continue reading

The post unknowndevice64: 1: Vulnhub Lab Walkthrough appeared first on Hacking Articles.

TechRepublic.png 2019-03-11 17:47:04 Why you need the Myki Android Password Manager (lien direct)

If you\'re searching for an easy-to-use password manager that doesn\'t save your data to a third-party server, give Myki a try.

bleepingcomputer.png 2019-03-11 17:47:01 Google Chrome to Block Drive-By-Downloads from Ad Frames (lien direct)

Google is planning to add automated prevention of all downloads initiated from within ad frames which lack user activation, as part of an effort to boost the security of Chrome users by blocking possibly malicious drive-by-downloads. [...]

Kaspersky.png 2019-03-11 17:44:02 Forrester: Ransomware Set to Resurge As Firms Pay Off Attacks (lien direct)

In this video, Josh Zelonis, senior analyst at Forrester Research, discusses the next great security threats to enterprises.

TechRepublic.png 2019-03-11 17:31:01 How to learn Julia: A resources guide for developers (lien direct)

If you want to learn the Julia programming language, check out this list of books, courses, tutorials, videos, and websites.

ZDNet.png 2019-03-11 17:27:04 Chinese hacking group backdoors products from three Asian gaming companies (lien direct)

ESET suspects that tens or hundreds of thousands of users have been infected already.

TechRepublic.png 2019-03-11 17:24:05 How to install the OpenVAS security audit tool on Ubuntu Server 18.04 (lien direct)

Learn how to install the open source security audit tool, OpenVAS, on the Ubuntu Server platform.

bleepingcomputer.png 2019-03-11 16:52:01 NVIDIA Removing Support For 3D Vision in Game Ready Drivers (lien direct)

In a support document posted this month, NVIDIA has stated that they will no longer support 3D Vision in GeForce Game Ready drivers after the upcoming April 2019 Release 418 driver. [...]

TechRepublic.png 2019-03-11 16:44:05 Quantum computing: The biggest cybersecurity threats (lien direct)

At RSA 2019, John Prisco of Quantum Xchange discussed what solutions organizations should consider to protect against quantum threats.

grahamcluley.png 2019-03-11 16:35:04 Citrix hackers may have stolen six terabytes worth of files (lien direct)
Citrix hack

The FBI suspects that the hackers used a technique known as “password spraying”.

SecurityThroughEducation.PNG 2019-03-11 16:35:00 Ep. 115- Leading Everyone like Dogs with Chase Hughes (lien direct)

Is it possible to influence and lead people for their betterment? Can we learn to use influence from a dog trainer? This and more with our guest Chase Hughes – March 11, 2019 Contents Download Get Involved Download Ep. 115- Leading Everyone like Dogs with Chase Hughes Get Involved Got a great idea for an […]

The post Ep. 115- Leading Everyone like Dogs with Chase Hughes appeared first on Security Through Education.

SecurityWeek.png 2019-03-11 16:31:00 Equifax Was Aware of Cybersecurity Weaknesses for Years, Senate Report Says (lien direct)

The massive Equifax data breach that impacted 148 million Americans in 2017 was the result of years of poor cybersecurity practices, a new Staff Report from the United States Senate\'s Permanent Subcommittee on Investigations reveals. 

read more

no_ico.png 2019-03-11 16:30:03 How We Can Get Beyond The Buzzwords To Understand What\'s Real, And What Works In AI (lien direct)

The State of AI 2019 is comprehensive study which shows that corporate adoption of Artificial Intelligence has tripled in the last 12 months, with one in seven large companies now adopting some form of AI.   Expert Comment below: Matt Walmsley, EMEA Director at Vectra:  With 40% of Europe\'s so called “AI companies” being exposed as not actually …

The ISBuzz Post: This Post How We Can Get Beyond The Buzzwords To Understand What\'s Real, And What Works In AI appeared first on Information Security Buzz.

SecurityWeek.png 2019-03-11 16:21:00 GIF Attack on Facebook Messenger Earned Hacker $10,000 (lien direct)

A white hat hacker earned $10,000 from Facebook last year for finding a Messenger vulnerability that apparently could have been exploited to randomly obtain other users\' images.

read more

TechRepublic.png 2019-03-11 16:18:03 The biggest cloud security challenges enterprises face (lien direct)

At RSA 2019, Brian Roddy of Cisco discussed what CISOs should include in a cloud security plan.

no_ico.png 2019-03-11 16:15:05 Record-Setting Verifications.io Data Breach (lien direct)

News of a second major data breach took place because of unprotected databases and servers, which has now left 763 million unique emails from Verifications.io exposed. This breach just equipped cybercriminals with 763 million opportunities to commit fraud, but it also exposed “business intelligence data,” including employee and revenue figures, in an unusual circumstance.  there's a …

The ISBuzz Post: This Post Record-Setting Verifications.io Data Breach appeared first on Information Security Buzz.

SecurityWeek.png 2019-03-11 16:14:05 Research Firm Offers $3 Million for iOS, Android 0-Days (lien direct)

Vulnerability research firm Crowdfense has launched a new 0-day acquisition program and is promising payouts of up to $3 million for full-chain, previously unreported exploits. 

read more

TechRepublic.png 2019-03-11 16:01:01 What to include in an enterprise cybersecurity plan (lien direct)

At RSA 2019, Steve Martino of Cisco discussed the top cybersecurity threats businesses are facing, and how to help employees improve their security posture.

bleepingcomputer.png 2019-03-11 16:00:00 Medical IoT Devices with Outdated Operating Sytems Exposed to Hacking (lien direct)

Medical IoT (IoMT) devices are in many cases left exposed to attacks because of outdated or legacy operating systems which, in many cases, are very easy to hack into and expose a throve of sensitive patient data, highly sought over on the black market. [...]

MalwarebytesLabs.png 2019-03-11 15:47:02 A week in security (March 4 – 11) (lien direct) A roundup of cybersecurity news from March 4–11, including a Chrome zero-day, Labs\' data privacy report, news from RSA, and more.


Security world Week in security


(Read more...)

The post A week in security (March 4 – 11) appeared first on

TechRepublic.png 2019-03-11 15:46:05 How companies can attract diverse candidates into cybersecurity jobs (lien direct)

At RSA 2019, Alicia Jessip of TEKsystems explained why it\'s important for security teams to include women and underrepresented minorities.

WiredThreatLevel.png 2019-03-11 15:45:00 The Genderless Digital Voice the World Needs Right Now (lien direct)

The idea behind Q is to pressure the tech industry into acknowledging that gender isn\'t necessarily binary, a matter of man or woman, masculine or feminine.

WiredThreatLevel.png 2019-03-11 15:36:05 \'Captain Marvel\' Beat Its Own Box Office Projections (lien direct)

Carol Danvers made bank last weekend.

no_ico.png 2019-03-11 15:30:00 US Senators Slam Equifax, Marriott Executives For Massive Data Breaches (lien direct)

It has been reported that Equifax appeared before the United States Senate yesterday to discuss what the company has learned from one of the largest data breaches to hit corporate America. Last night, the Senate released a report on how Equifax handled its data security leading up to the data breach. The report details that they “neglected” cybersecurity ahead of the devastating …

The ISBuzz Post: This Post US Senators Slam Equifax, Marriott Executives For Massive Data Breaches appeared first on Information Security Buzz.

SecurityWeek.png 2019-03-11 15:29:03 Mark Zuckerberg Describes a New Privacy-Centric Facebook (lien direct)

2001 was not a good year for Microsoft. Its servers were ravaged by the Code Red and Nimda worms. In 2002, Bill Gates responded with his seminal \'security memo\' to staff. He talked about security and trust -- that customers should be able to trust the security of Microsoft. Since then, Microsoft has made great strides on delivering this new secure model.

read more

bleepingcomputer.png 2019-03-11 15:29:00 New "Final Warning" Sextortion Emails State Adult Sites Infected You (lien direct)

A new sextortion email campaign with a subject of "This is a final warning" is underway that states a hacker infected the recipient\'s computer while they were visiting an adult web site and demand an extortion payment or the video will be released to family and friends. [...]

TechWorm.png 2019-03-11 15:29:00 The Pirate Bay Users Hit By Russian doll \'PirateMatryoshka\' malware (lien direct)

Russian doll \'PirateMatryoshka\' malware target Pirate Bay users Researchers at Kaspersky Lab have discovered a new malware spreading through The Pirate Bay (TPB) page – the most popular torrent tracker. The malware, which has a multi-layered structure, aims to infect users’ computers with advertising programs and tools to spread malware onto the device. The new Trojan downloader […]

The post The Pirate Bay Users Hit By Russian doll \'PirateMatryoshka\' malware appeared first on TechWorm.

TechRepublic.png 2019-03-11 15:26:01 6 military-inspired best practices for drone deployment (lien direct)

As enterprises develop their drone strategies, they can take a cue from the military.

ESET.png 2019-03-11 15:25:00 Over 2 billion records exposed by email marketing firm (lien direct)

The repository of email addresses and other records would offer a gold mine of data for scammers

TechRepublic.png 2019-03-11 15:21:00 10 popular malware campaigns your business should avoid (lien direct)

Coinhive is at the top of the global threat index for the 15th consecutive month, according to a Check Point report.

SecurityWeek.png 2019-03-11 15:14:05 Google Launches New Cloud Security Services (lien direct)

Google has introduced a new set of services to provide cloud customers with improved protection from unsafe websites, distributed denial of service (DDoS) attacks, and other threats.

read more

TechRepublic.png 2019-03-11 15:05:05 CHIPS Alliance aims to ease RISC-V design and deployment (lien direct)

The Linux Foundation and RISC-V Foundation, alongside industry partners such as Google and Western Digital, are partnering to provide SoC designs and utilities.

itsecurityguru.png 2019-03-11 14:54:03 Things To Know Before Developing Intelligence Requirements. (lien direct)

Written by Mike Mimoso, Editorial Director, Flashpoint To state the obvious, proper intelligence requirements must be in place before data collection, analysis, and consumption of intel can happen. These requirements are critical because they enable an organisation to choose and prioritise its intelligence goals, determine what information it needs to collect and from what sources […]

The post Things To Know Before Developing Intelligence Requirements. appeared first on IT Security Guru.

Kaspersky.png 2019-03-11 14:51:01 Facebook Alleges Two Ukrainians Scraped Data From 63K Profiles (lien direct)

Facebook is suing two Ukrainian men who were able to scrape data from 63,000 users\' profiles by enticing users to download a malicious browser extension.

SecurityAffairs.png 2019-03-11 14:49:04 Severe RCE vulnerability affected popular StackStorm Automation Software (lien direct)

The security researcher Barak Tawilyhas discovered a severe vulnerability, tracked as CVE-2019-9580, in the popular, open source event-driven platform StackStorm. According to the expert, the flaw could be exploited by a remote attacker to trick developers into executing arbitrary commands on targeted services. StackStorm has been used to automate workflows in many industries, it allows […]

The post Severe RCE vulnerability affected popular StackStorm Automation Software appeared first on Security Affairs.

itsecurityguru.png 2019-03-11 14:48:05 Security teams woefully understaffed. (lien direct)

As emerging technology and threat landscapes experience rapid transformation, the skillsets need to change as well. 80 percent of 336 IT security professionals Dimensional Research polled on behalf of Tripwire believe it\'s becoming more difficult to find skilled cybersecurity professionals, and nearly all respondents (93 percent) say the skills required to be a great security […]

The post Security teams woefully understaffed. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-11 14:47:02 Zero-day discovered in Chrome and Windows 7. (lien direct)

Earlier this week Google released an update for the Chrome web browser that it urged users to ensure was implemented immediately. That was because the Threat Analysis Group at Google had uncovered a critical zero-day vulnerability that was already being exploited in the wild. Now a Google security engineer, Clement Lecigne, has warned that another zero-day vulnerability […]

The post Zero-day discovered in Chrome and Windows 7. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-11 14:46:05 Phishing attacks attacking healthcare organisations. (lien direct)

Many healthcare organizations remain vulnerable to phishing attacks, a new study finds. When researchers sent simulated phishing emails, nearly one in seven of the messages were clicked by employees of healthcare systems, according to the report published in JAMA Network Open. “Cybersecurity is a really important issue for hospitals and healthcare organizations and it\'s only […]

The post Phishing attacks attacking healthcare organisations. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-11 14:46:01 Software company disclose data breach. (lien direct)

American software company Citrix disclosed a security breach during which hackers accessed the company’s internal network. In a short statement posted on its blog, Citrix Chief Security Information Officer Stan Black said Citrix found out about the hack from the FBI earlier this week. “On March 6, 2019, the FBI contacted Citrix to advise they had reason […]

The post Software company disclose data breach. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-11 14:45:05 Mass protest against cyber-security bill in Russia. (lien direct)

Thousands of people in Russia have protested against plans to introduce tighter restrictions on the internet. A mass rally in Moscow and similar demonstrations in two other cities were called after parliament backed the controversial bill last month. The government says the bill, which allows it to isolate Russia’s internet service from the rest of […]

The post Mass protest against cyber-security bill in Russia. appeared first on IT Security Guru.

ZDNet.png 2019-03-11 14:28:02 Samsung Galaxy S10 facial recognition fooled by a video of the phone owner (lien direct)

There\'s a reason why Samsung tells users to avoid using facial recognition screen locking on Galaxy S10 smartphones.

SecurityWeek.png 2019-03-11 14:10:04 Many Vulnerabilities Discovered in Moxa Industrial Switches (lien direct)

Over a dozen vulnerabilities, including ones classified as critical, have been found by Positive Technologies researchers in EDS and IKS switches made by industrial networking solutions provider Moxa. The vendor has released patches and mitigations that should address the flaws.

read more

no_ico.png 2019-03-11 14:00:01 Lords Report On Big Tech Regs: Ethical Framework Essential For Future Of Data, Says SAS PhD (lien direct)

Tomorrow, the House of Lords Communications Committee will publish a report calling for a new overarching regulatory framework so that digital services are held accountable to an enforceable set of shared principles.  The report states that big tech companies are not doing a good enough job of protecting consumers – and that it\'s time for the regulators …

The ISBuzz Post: This Post Lords Report On Big Tech Regs: Ethical Framework Essential For Future Of Data, Says SAS PhD appeared first on Information Security Buzz.

WiredThreatLevel.png 2019-03-11 14:00:00 Making Beautiful Darkroom Images-Without Using a Camera (lien direct)

Natalja Kent uses only chromogenic paper, a flashlight, and some improvisational footwork for \'Movement Artifacts\'.

TechRepublic.png 2019-03-11 13:58:01 ​Training through gaming: How Walmart uses games to teach employees (lien direct)

Gamification can provide employee job training in an enjoyable and familiar way.

TechRepublic.png 2019-03-11 13:53:05 Industrial IoT market will hit $922B by 2025, driven by cost savings and availability (lien direct)

With the growth of Internet of Things technology, IIoT is expected to follow suit, according to a Million Insights report.

grahamcluley.png 2019-03-11 13:52:03 Facebook sues quiz app developers who allegedly stole users\' private data through browser plugins (lien direct)
Facebook sues quiz app developers who allegedly stole users' private data through browser plugins

Facebook is taking a stand against a pair of Ukrainian app developers who it claims scraped personal information from users\' profiles.

Read more in my article on the Hot for Security blog.

no_ico.png 2019-03-11 13:30:02 New Google Cloud Security Services From Vectra (lien direct)

Following last week\'s news that Google is now rolling out several new cloud security services, Chris Morales, head of security analytics at Vectra, has put together some commentary looking at what primary security concerns enterprises have as they move more workloads and data to the cloud as well as what the current state of security looks like …

The ISBuzz Post: This Post New Google Cloud Security Services From Vectra appeared first on Information Security Buzz.

WiredThreatLevel.png 2019-03-11 13:26:01 \'American Gods\'\' Biggest Battle Is Its Own Reincarnation (lien direct)

After two years teetering on the brink of oblivion, American Gods has managed to find just enough spark to give its second season life-even if that spark is at times feeble and sputtering.

TechRepublic.png 2019-03-11 13:15:01 Vulnerabilities in industrial Ethernet switches allow for credential theft, denial-of-service attacks (lien direct)

Industrial Ethernet switches from Moxa were found to lack basic security measures, making it possible to brute-force access to the switch management console, according to Positive Technologies.

11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31

Information mise à jours le: 2019-03-26 04:01:32
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Notre RSS (filtré) Twitter