What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
WiredThreatLevel.png 2019-09-09 16:35:05 \'It Chapter Two\' Ruled the Box Office This Weekend (lien direct)

It fell short of beating its predecessor, though. Also, \'Joker\' won the top prize at the Venice Film Festival and Kristen Stewart wants to play a gay superhero.

TechRepublic.png 2019-09-09 16:32:00 60% of IT workers living paycheck-to-paycheck, according to MetLife study (lien direct)

Almost 70% of IT workers said they planned to postpone retirement due to worries about finances.

WiredThreatLevel.png 2019-09-09 16:30:00 Cities Are Trying-Again-to Plan for Autonomous Vehicles (lien direct)

The bloom is off the rose for self-driving tech among urban transportation officials, who are planning for a future with fewer private cars.

TechRepublic.png 2019-09-09 16:23:00 Top 10 US cities worth scootering toward micromobility (lien direct)

E-bikes and e-scooters have taken cities by storm. Here are the cities with the biggest micromobility potential.

TechRepublic.png 2019-09-09 16:13:00 Sleeping, eating, and breathing: Anticipating Apple\'s health news (lien direct)

Move over, meditation. Apple is applying its design sensibilities to some of the biggest health problems in America, including diabetes and asthma.

TechRepublic.png 2019-09-09 16:06:00 Panasonic\'s Toughbook 55 is likely the most modular laptop in years (lien direct)

If you\'ve ever wanted a notebook PC with a modular GPU, the Panasonic Toughbook 55 might be the system for you.

MalwarebytesLabs.png 2019-09-09 16:01:03 A week in security (September 2 – 8) (lien direct) A roundup of the latest cybersecurity news for the week of September 2 – 8, including TrickBot\'s new trick, a social engineering toolkit, and how to keep remote workers safe.


A week in security


(Read more...)

The post A week in security (September 2 – 8) appeared first on Malwarebytes Labs.

SecurityWeek.png 2019-09-09 15:46:01 Swedish GDPR Fine Highlights Legal Challenges in Use of Biometrics (lien direct)

A small fine of $20,000 in Sweden highlights a potential problem for the use of biometrics in security throughout Europe, including American firms with offices in Europe.

read more

MalwarebytesLabs.png 2019-09-09 15:36:01 When corporate communications look like a phish (lien direct) Before organizations engage in gnashing of teeth over the "ignorant user" and the cost of training, think about how much email users encounter and whether corporate communications look like phishes themselves.




(Read more...)

The post When corporate communications look like a phish appeared first on Malwarebytes Labs.

SecurityWeek.png 2019-09-09 15:17:01 Cyberattack Disrupted Firewalls at U.S. Power Utility (lien direct)

A denial-of-service (DoS) attack that caused disruptions at a power utility in the United States earlier this year exploited a known vulnerability in a firewall used by the affected organization.

read more

grahamcluley.png 2019-09-09 14:59:00 Wikipedia and World of Warcraft Classic targeted by DDoS attacks (lien direct)

Uou can imagine the pain that was caused to pub quiz cheats and students writing essays this weekend when crowd-sourced internet encyclopedia Wikipedia, one of the world’s most popular websites, was hit by a distributed denial-of-service attack.

Read more in my article on the Hot for Security blog.

TechRepublic.png 2019-09-09 14:30:00 OnePlus dominates smartphone network speeds, iPhone and Huawei trail behind (lien direct)

Huawei phones are among the slowest available stateside compared to other LTE phones, with Apple phones underperforming despite their premium price. There\'s a good reason for these results.

SecurityWeek.png 2019-09-09 14:09:05 U.S. Cyber Command Adds North Korean Malware Samples to VirusTotal (lien direct)

The U.S. Cyber Command (USCYBERCOM) this week released 11 malware samples to VirusTotal, all of which appear related to the notorious North Korean-linked threat group Lazarus. 

read more

SecurityAffairs.png 2019-09-09 14:09:00 Symantec uncovered the link between China-Linked Thrip and Billbug groups (lien direct)

The China-linked APT group Thrip is continuing to target entities in Southeast Asia even after its activity was uncovered by Symantec. Experts at Symantec first exposed the activity of the Chinese-linked APT Thrip in 2018, now the security firm confirms that cyber espionage group has continued to carry out attacks in South East Asia. In June […]

The post Symantec uncovered the link between China-Linked Thrip and Billbug groups appeared first on Security Affairs.

TechRepublic.png 2019-09-09 14:01:00 How to boost employee retention through human connection (lien direct)

Companies that support the emotional and mental well-being of employees are most likely to keep them.

bleepingcomputer.png 2019-09-09 14:00:01 PsiXBot Modular Malware Gets New Sextortion, Google DoH Upgrades (lien direct)

Security researchers discovered a new variant of the PsiXBot modular malware with a new sextortion module and designed to use Google\'s DNS over HTTPS (DoH) service to get command and control (C2) domain addresses. [...]

SecurityWeek.png 2019-09-09 13:57:00 BlueKeep Exploit Added to Metasploit (lien direct)

An initial public exploit targeting the recently addressed BlueKeep vulnerability in Microsoft Windows has been added to Rapid7\'s Metasploit framework. 

read more

no_ico.png 2019-09-09 13:55:04 NEWS: Firefox To Roll Out Major User Privacy Update (lien direct)

Mozilla is starting to roll out encrypted web domain name requests by default, starting with a trial run in the US. The move aims to prevent malicious actors from snooping on browser activity, in a major boost for user privacy. Twitter Reactions: And while on the topic of DoH, here's another reason why I don't …

The ISBuzz Post: This Post NEWS: Firefox To Roll Out Major User Privacy Update appeared first on Information Security Buzz.

Pirate.png 2019-09-09 13:52:03 99% des cyberattaques requièrent une action humaine pour se propager (lien direct)
Le spécialiste en cybersécurité Proofpoint dévoile aujourd\'hui les résultats de son rapport annuel sur le facteur humain (Human Factor Report), qui explique comment les cybercriminels Å“uvrent pour exploiter les failles humaines et non les failles logicielles afin d\'extorquer de l\'argent ou des données.
no_ico.png 2019-09-09 13:47:04 Texas Refuses To Pay Ransomware After Coordinated Attack (lien direct)

A coordinated ransomware attack hit 22 Texas local governments, but none of the impacted municipalities paid the ransom demand, which was $2.5 million collective, to be paid in Bitcoin. No municipality paid ransoms in 'coordinated ransomware attack' that hit Texas https://t.co/6EfLtAqht0 via @ZDNet & @campuscodi — Projectstage (@TweetEraser) September 9, 2019

The ISBuzz Post: This Post Texas Refuses To Pay Ransomware After Coordinated Attack appeared first on Information Security Buzz.

TechRepublic.png 2019-09-09 13:45:03 IDC: Smartphone market will improve in 2020 as a result of 5G (lien direct)

Smartphone sales are predicted to increase in 2020 as a result of 5G, but 2019 will remain flat, with Android seeing increased sales but iOS and Apple\'s iPhone still facing challenges.

SecurityWeek.png 2019-09-09 13:29:02 Man Pleads Guilty for Trying to Access Trump\'s Tax Returns (lien direct)

A Philadelphia man has pleaded guilty to trying to hack the IRS to obtain President Donald Trump\'s tax returns.

Andrew Harris pleaded guilty Thursday to two computer fraud counts in federal court. The 23-year-old faces up to two years in prison and $200,000 fine.

read more

DarkReading.png 2019-09-09 13:20:00 Texas Refuses to Pay $2.5M in Massive Ransomware Attack (lien direct)

The ransomware campaign affected 22 local governments, none of which have paid the attackers\' $2.5 million ransom demand.

bleepingcomputer.png 2019-09-09 13:18:04 Telegram Fixes Privacy Bug Caused by Improperly Deleted Messages (lien direct)

The Telegram encrypted messaging app released version 5.11 of their mobile client to fix a serious privacy bug that could allow a recipient to view images or files even after they were deleted by the sender. As this app has over 100 million downloads from the Google Play Store alone, this could be a major privacy violation for many u [...]

SecurityWeek.png 2019-09-09 13:00:03 Private Equity Firms Interested in Buying Symantec for $16 Billion: Report (lien direct)

Private equity firms Permira and Advent International are interested in acquiring Symantec\'s consumer business for more than $16 billion, The Wall Street Journal reports.

read more

AlienVault.png 2019-09-09 13:00:00 Category 1 cyber threat for UK businesses (lien direct)

london bridge

Julia Solonina

Britain should be prepared for a Category 1 cyber security emergency, according to the National Cyber Security Centre (NCSC). This means that national security, the economy, and even the nation’s lives will be at risk. However, despite this harsh warning, UK businesses still aren’t taking proactive and potentially preventative action to stop these attacks from happening. So just where are UK businesses going wrong and can they turn things around before it’s too late?

How businesses have responded

Since Brexit was announced in June 2016, 53% of UK businesses have increased their cyber security, according to latest statistics. This is as a direct result of industry data being published which revealed that malware, phishing, and ransomware attacks will become the biggest threats once Britain leaves the EU. However, despite these efforts being made, figures reveal that British businesses have the smallest cyber security budget compared to any other country. They typically spend less than £900,000, whereas the average across the world is $1.46 million.

At risk of a Category 1 cyber attack

A Category 1 cyber attack is described by the NCSC as “A cyber attack which causes sustained disruption of UK essential services or affects UK national security, leading to severe economic or social consequences or to loss of life.” To date, the UK has never witnessed such an attack. Although, one of the most severe attacks in recent times was the 2017 NHS cyber attack which was classed as a Category 2 due to there being no imminent threat to life. 

The NCSC says that they typically prevent 10 cyber attacks from occurring on a daily basis. However, as the organization believes that hostility from neighbouring nations is what drives these attacks every single day, they say that it’s only a matter of time before a Category 1 attack launches the country into chaos. NCSC's CEO Ciaran Martin states that "I remain in little doubt we will be tested to the full, as a centre, and as a nation, by a major incident at some point in the years ahead, what we would call a Category 1 attack."

UK businesses under attack

The UK government’s ‘Cyber Securi

WiredThreatLevel.png 2019-09-09 13:00:00 Red Flag Laws Are Red Herrings of Gun Control (lien direct)

Opinion: There\'s little data on the effectiveness of mental health reporting laws, and we\'re being distracted from measures we know will save lives.

WiredThreatLevel.png 2019-09-09 13:00:00 Amazon Employees Will Walk Out Over Climate Change Inaction (lien direct)

The planned event will mark the first time in Amazon\'s 25-year history that workers at the company\'s Seattle headquarters have participated in a strike.

WiredThreatLevel.png 2019-09-09 13:00:00 Star Wars News: Those Bad \'Rise of Skywalker\' Rumors Are False (lien direct)

It\'s not being rewritten. Sorry, haters.

TechRepublic.png 2019-09-09 12:57:05 Google hopes to protect users with open source differential privacy library (lien direct)

Google\'s differential privacy library will give organizations a way to study their data while protecting people\'s information.

TechRepublic.png 2019-09-09 12:44:05 What business users need from the iPhone 11 (lien direct)

Samsung is pitching the Galaxy Note 10 as the smartphone for business and productivity. Here\'s what Apple needs to deliver for the iPhone 11 to be a compelling upgrade.

TechRepublic.png 2019-09-09 12:13:00 The top programming languages of 2019: Python is number one, say engineers (lien direct)

The most popular languages according to the world\'s largest organization for engineering and applied science.

Blog.png 2019-09-09 12:10:00 Episode 161: 3 Years after Mirai, IoT DDoS Problem may get Worse (lien direct)

Three years after the Mirai botnet launched some of the biggest denial of service attacks ever seen, DDoS is a bigger problem and ever. Even worse: we stand on the made up of webcams and other Internet of things as technologies like 5G bring greater bandwidth to connected endpoints. In this podcast, we speak with Hardik Modi, the senior director...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/606605902/0/thesecurityledger -->»

Trend.png 2019-09-09 12:07:05 \'Purple Fox\' Fileless Malware with Rookit Component Delivered by Rig Exploit Kit Now Abuses PowerShell (lien direct)

This new iteration of Purple Fox that we came across, also being delivered by Rig, has a few new tricks up its sleeve. It retains its rootkit component by abusing publicly available code. It now also eschews its use of NSIS in favor of abusing PowerShell, making Purple Fox capable of fileless infection. It also incorporated additional exploits to its infection chain, most likely as a foolproof mechanism to ensure that it can still infect the system. Purple Fox is a downloader malware; besides retrieving and executing cryptocurrency-mining threats, it can also deliver other kinds of malware.

The post \'Purple Fox\' Fileless Malware with Rookit Component Delivered by Rig Exploit Kit Now Abuses PowerShell appeared first on .

SecurityWeek.png 2019-09-09 12:04:01 Several Vulnerabilities Found in Red Lion HMI Software (lien direct)

Researchers have discovered several vulnerabilities, including ones that have been classified as serious, in a human-machine interface (HMI) programming software made by U.S.-based Red Lion.

read more

TechRepublic.png 2019-09-09 12:00:00 Safer helps publishers spot illegal user-generated content (lien direct)

Thorn wants to eliminate child sexual abuse material from the internet. The non-profit\'s new content moderation tool makes it easy to hash images and videos and identify the bad ones.

WiredThreatLevel.png 2019-09-09 12:00:00 Unusual Fluids Flip, Twirl, and Redefine How Liquids Work (lien direct)

New shape-shifting liquids can move or morph on command. One scientist even used them to make liquid cables for his headphones.

WiredThreatLevel.png 2019-09-09 12:00:00 China Has an Ecommerce Giant You\'ve Never Heard Of (lien direct)

Pinduoduo draws shoppers outside China\'s big cities with low-priced goods. It trails only Alibaba in number of users, and has a larger market cap than eBay.

bleepingcomputer.png 2019-09-09 11:30:04 Wikipedia DDoS Attacks Prompt NCSC to Remind of DoS Mitigation (lien direct)

UK\'s National Cyber Security Centre urges organizations worried about Denial-of-Service (DoS) attacks to implement mitigation measures following a worldwide Wikipedia outage caused by Distributed Denial-of-Service (DDoS) attacks. [...]

TechRepublic.png 2019-09-09 11:23:01 Can you use Azure Front Door instead of an SD-WAN? (lien direct)

Take advantage of Microsoft\'s cloud app infrastructure to manage access to modern cloud-first applications.

TechWorm.png 2019-09-09 11:18:05 Apple responds to Google\'s statement on iOS security vulnerabilities (lien direct)

Google\'s Report On iPhone Exploit Was Exaggerated, Says Apple Last week, Google in a blog post had announced that its Threat Analysis Group (TAG) and Project Zero had discovered a series of iOS exploit chains in the wild that were designed to hack iPhones over a period of at least two years. They were being used […]

The post Apple responds to Google\'s statement on iOS security vulnerabilities appeared first on TechWorm.

ZDNet.png 2019-09-09 11:04:03 Newly discovered cyber-espionage malware abuses Windows BITS service (lien direct)

New backdoor trojan uses Windows BITS service to hide traffic to and from its command-and-control servers.

securityintelligence.png 2019-09-09 11:00:02 5 Key Steps to Developing Your Global Data Privacy Program (lien direct)

>Reading Time: 7 minutes If your organization does business with customers in multiple regions and thus must comply with multiple data privacy regulations, it helps to address them as a single, combined initiative.

The post 5 Key Steps to Developing Your Global Data Privacy Program appeared first on Security Intelligence.

TechRepublic.png 2019-09-09 11:00:01 How "You aren\'t going to need it!" can simplify your development process (lien direct)

The principle of "You aren\'t going to need it!" found in Extreme Programming can be particularly valuable for keeping your programming workflows simple.

WiredThreatLevel.png 2019-09-09 11:00:00 Let\'s All Just Chill About Processed Foods (lien direct)

Processed foods are bad for you, right? So super-processed, plant-based meat must be terrible, right? Not so fast on either count.

WiredThreatLevel.png 2019-09-09 11:00:00 How to Watch Apple\'s 2019 iPhone Announcement (lien direct)

The next iPhone (and a lot of other stuff) will be unveiled Tuesday. Here\'s how to tune in.

WiredThreatLevel.png 2019-09-09 11:00:00 Today\'s Cartoon: The Four Horsemen of Procrastination (lien direct)

Apocalypse later.

WiredThreatLevel.png 2019-09-09 11:00:00 The Lovability of Malcolm Gladwell: A Gladwellian Analysis (lien direct)

In which the journalist\'s podcast and new book, *Talking to Strangers*, are reviewed on his own terms.

SecurityAffairs.png 2019-09-09 10:47:03 Wikipedia suffered intermittent outages as a result of a malicious attack (lien direct)

The popular free online encyclopedia Wikipedia was not reachable following what it has described as a “malicious attack”. Popular online reference website Wikipedia went down in several countries after the server of the Wikimedia Foundation that host it were hit by a “massive” Distributed Denial of Service (DDoS) attack. The news of intermittent outages was […]

The post Wikipedia suffered intermittent outages as a result of a malicious attack appeared first on Security Affairs.

no_ico.png 2019-09-09 10:42:02 Proofpoint\'s Annual Human Factor Report Details Top Cybercriminal Trends: More Than 99 Percent Of Cyberattacks Need Humans To Click (lien direct)

Threat actors continue to use socially-engineered attacks across email, cloud applications, and social media to exploit human instincts and lure people to click Proofpoint, Inc., (NASDAQ: PFPT), a leading cybersecurity and compliance company, today announced its annual Human Factor report findings, which highlight the ways in which cybercriminals target people, rather than systems and infrastructure, to …

The ISBuzz Post: This Post Proofpoint\'s Annual Human Factor Report Details Top Cybercriminal Trends: More Than 99 Percent Of Cyberattacks Need Humans To Click appeared first on Information Security Buzz.

11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31

Information mise à jours le: 2019-09-22 08:07:45
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Notre RSS (filtré) Twitter