What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
SecurityAffairs.png 2019-05-13 14:07:05 Facebook sues data analytics firm Rankwave over alleged data misuse (lien direct)

Facebook sues South Korean data analytics firm Rankwave over alleged data misuse and violation of social network’s rules. Facebook filed a lawsuit against Rankwave in a California State court in Silicon Valley to verify if the analytics firm is violating the rules of the social network giant. Facebook is asking the court to audit the […]

The post Facebook sues data analytics firm Rankwave over alleged data misuse appeared first on Security Affairs.

bleepingcomputer.png 2019-05-13 14:00:00 U.S. Govt Issues Microsoft Office 365 Security Best Practices (lien direct)

The Cybersecurity and Infrastructure Security Agency (CISA) issued a set of best practices designed to help organizations to mitigate risks and vulnerabilities associated with migrating their email services to Microsoft Office 365. [...]

WiredThreatLevel.png 2019-05-13 14:00:00 A Dystopian Vision of the Future: Toxic but Candy Sweet (lien direct)

Photographer Fernando Montiel Klint imagines a world where technology has gone amok.

Logo_logpoint.jpg 2019-05-13 13:53:00 SOAR : un acronyme qui cache bien son jeu ! (lien direct)

Au cours des 5-10 dernières années, l\'utilisation d\'acronymes dans le secteur de la cybersécurité s\'est développée de manière vraiment libre et autonome. L\'un des plus en vue à l\'heure actuelle, celui qui semble faire des miracles, s\'appelle SOAR. Security Orchestration, Automation et Response. Ces dernières années, SOAR a conquis le monde de la cybersécurité avec [...]

The post SOAR : un acronyme qui cache bien son jeu ! appeared first on LogPoint.

Logo_logpoint.jpg 2019-05-13 13:53:00 SOAR – But not like a bird… (lien direct)

Over the past 5 to 10 years, the usage of acronyms in Cybersecurity industry has taken on a life of its own. One of the coolest kids on the block these days, the one everyone is claiming has an 80ft swimming pool with actual rope swing, is SOAR. Security Orchestration, Automation and Response. On the [...]

The post SOAR – But not like a bird… appeared first on LogPoint.

SecurityWeek.png 2019-05-13 13:43:01 Remote Code Execution Flaw Found in Kaspersky Products (lien direct)

Researchers have discovered a serious remote code execution vulnerability affecting products from Kaspersky Lab. The cybersecurity firm pushed out a patch to customers in early April.

read more

Pirate.png 2019-05-13 13:31:03 Les botnets, une (r)évolution des usages (lien direct)
Les acteurs malveillants créent toujours de nouvelles astuces pour rendre les botnets de plus en plus multifonctionnels et extrêmement volatiles.
TechRepublic.png 2019-05-13 13:16:00 AI will eliminate 1 of 8 jobs in Asia by 2024 (lien direct)

Artificial intelligence and automation will steal more jobs than it enhances, according to an MIT Technology Review report.

SecurityWeek.png 2019-05-13 13:08:02 NVIDIA Patches High Severity Bugs in GPU Display Driver (lien direct)

NVIDIA has released patches to address High severity vulnerabilities in its NVIDIA GPU Display Driver that could allow an attacker to escalate privileges or execute code on vulnerable systems. 

read more

WiredThreatLevel.png 2019-05-13 13:00:00 Tamagotchi Have Returned to Bewitch a New Generation (lien direct)

The new Tamagotchi On goes on sale today for $59.99.

bleepingcomputer.png 2019-05-13 12:49:01 New Game Boy Emulator Has a Remote \'Cloud Gaming\' Mode (lien direct)

A new Game Boy emulator written in Go has been released that offers the interesting ability of making your games accessible over the Internet using Telnet. While the online games are rendered using ANSI and are not as visually appealing, it illustrates how emulator developers can extend their features to the Internet. [...]

grahamcluley.png 2019-05-13 12:25:04 Spying on personal alarms and GPS trackers is as simple as sending an SMS (lien direct)

Security experts found that the devices – manufactured in China, and rebadged by multiple companies around the world – are vulnerable to a simple hack that could allow a hacker to track their location, and even secretly listen in via the microphone.

Read more in my article on the Bitdefender BOX blog.

SecurityAffairs.png 2019-05-13 12:18:00 Reading the Yoroi Cyber Security Annual Report 2018 (lien direct)

Yoroi Cyber Security Annual Report 2018 – In 2018 cyber-security experts observed an increased number of cyber attacks, malware endure to be the most aggressive and pervasive threat. For this reason, analyzing the last year occurred events would help cyber-security professionals to prevent further attacks during the next few months. In many cases the attacks […]

The post Reading the Yoroi Cyber Security Annual Report 2018 appeared first on Security Affairs.

securityintelligence.png 2019-05-13 12:00:04 How a Quirky Gmail Feature Led to a Phishing Scare and a Valuable Lesson in Email Security (lien direct)

>What began as a moment of panic in the wake of what I thought was a phishing attempt ended up being a valuable lesson about a quirky Gmail feature and how it impacts the email security landscape.

The post How a Quirky Gmail Feature Led to a Phishing Scare and a Valuable Lesson in Email Security appeared first on Security Intelligence.

securityintelligence.png 2019-05-13 12:00:02 NIST Proposes Privacy Framework to Help Make Sense of Global Privacy Regulations (lien direct)

>Organizations that approach privacy regulations strategically stand to gain a competitive edge when it comes to building and retaining customer trust.

The post NIST Proposes Privacy Framework to Help Make Sense of Global Privacy Regulations appeared first on Security Intelligence.

WiredThreatLevel.png 2019-05-13 12:00:00 The Chernobyl Disaster Might Have Also Built a Paradise (lien direct)

An HBO show tells the story of the nuclear explosion, but some scientists think that radioactive, human-free landscape might now be a haven for plants and animals.

Logo_logpoint.jpg 2019-05-13 11:53:00 LogPoint appoints RAS Infotech new distributor in the Middle East (lien direct)

With the appointment of RAS Infotech in Dubai as a new distributor, LogPoint is expanding its reach into the Middle East. With RAS Infotech, LogPoint will able to address growing Cybersecurity-market in the region and reach a network of highly qualified partners across the Middle East Copenhagen & Paris – 15 May 2019 – LogPoint, [...]

The post LogPoint appoints RAS Infotech new distributor in the Middle East appeared first on LogPoint.

bleepingcomputer.png 2019-05-13 11:52:00 New Details Emerge of Fxmsp\'s Hacking of Antivirus Companies (lien direct)

It is difficult to fathom that a threat actor may be able to breach the networks of a reputed security company. Yet, this is not only possible but also happened in the past; and it is not far-fetched to believe that it is the case with at least three antivirus makers, as reported by BleepingComputer earlier this week. [...]

grahamcluley.png 2019-05-13 11:34:00 IRS extends tax filing deadline following attack on Wolters Kluwer CCH cloud accounting service (lien direct)

The IRS will waive penalties and interest if your tax filing was delayed due to the CCH outage.

ZDNet.png 2019-05-13 11:20:03 SIM hijacking ring which stole millions in cryptocurrency dismantled by feds (lien direct)

“The Community” raked in over $2.4 million.

bleepingcomputer.png 2019-05-13 11:00:04 Sensitive Information of Millions of Panama Citizens Leaked (lien direct)

An unprotected Elasticsearch cluster exposed 3,427,396 records containing sensitive personal information on Panama citizens with "patient" labels, together with another 468,086 records labeled as test patients. [...]

WiredThreatLevel.png 2019-05-13 11:00:00 Technology That Could End Humanity-and How to Stop It (lien direct)

Oxford philosopher Nick Bostrom says technology often has unintended consequences, and that we may have to choose between totalitarianism and annihilation.

WiredThreatLevel.png 2019-05-13 11:00:00 Why Uber Is Fighting Cities Over Data About Scooter Trips (lien direct)

Los Angeles and other cities want detailed data on the shared scooters on their streets. Uber, Lyft and other companies fear a Trojan horse that could affect ride-hailing.

WiredThreatLevel.png 2019-05-13 11:00:00 An AI Pioneer Explains the Evolution of Neural Networks (lien direct)

Google\'s Geoff Hinton was a pioneer in researching the neural networks that now underlie much of artificial intelligence. He persevered when few others agreed.

WiredThreatLevel.png 2019-05-13 11:00:00 Calculating the Ecological Impact of Game of Thrones\' Dragons (lien direct)

In a prestigious math competition earlier this year, contestants ran the numbers on raising dragons.

ANSSI.png 2019-05-13 10:46:03 Challenge européen de cybersécurité : la phase de présélection nationale est lancée ! (lien direct)

Vous pouvez vous connecter dès à présent sur la plateforme https://www.ecsc-teamfrance.fr/ pour vous inscrire dans l\'une des catégories suivantes : Junior Senior Hors catégorie : si vous n\'êtes pas éligible mais souhaitez tout de même résoudre les épreuves proposées par nos experts, n\'hésitez pas à vous inscrire hors catégorie ! Lors de votre inscription, vous […]

SecurityAffairs.png 2019-05-13 10:24:01 Over 10k+ GPS trackers could be abused to spy on individuals in the UK (lien direct)

A vulnerability in a GPS tracker used by elderly people and kids could be exploited by an attacker to spy on individuals using it. Researchers at Fidus Information Security discovered a vulnerability in GPS trackers used by elderly people and kids could be exploited to spy on them. Experts discovered that the safety device can […]

The post Over 10k+ GPS trackers could be abused to spy on individuals in the UK appeared first on Security Affairs.

Pirate.png 2019-05-13 09:19:02 Cyberattaques : qui sont les individus les plus visés ? (lien direct)
Alors que l\'humain reste au cÅ“ur des préoccupations des cyberattaques, les VAP (Very Attacked People) ne sont pas toujours les personnes auxquelles on peut s\'attendre. Pour mieux comprendre le contexte, Proofpoint publie une analyse des cyberattaques hautement ciblées et présente dans son rapport (en PJ avec infographie) un examen approfondi des employés et des services recevant des menaces ciblées par email.
Pirate.png 2019-05-13 09:14:01 Scribbr : le détecteur de plagiat en ligne pour les étudiants (lien direct)
Le plagiat est devenu un véritable problème dans le secteur académique. Les étudiants n\'hésitent plus à faire du copier-coller dans leurs copies et certains se retrouvent à plagier des auteurs en oubliant de les citer correctement.
bleepingcomputer.png 2019-05-13 08:58:03 Linux Kernel Prior to 5.0.8 Vulnerable to Remote Code Execution (lien direct)

Linux machines running distributions powered by kernels prior to 5.0.8 are affected by a race condition vulnerability leading to a use after free, related to net namespace cleanup, exposing vulnerable systems to remote attacks. [...]

itsecurityguru.png 2019-05-13 08:34:03 GPS tracker can be tracker and recorded. (lien direct)

A GPS tracker used by elderly people and young kids has a security hole that could allow others to track and secretly record their wearers. It has an in-built SIM card that it used to pinpoint the location of the user, as well as provide hands-free communications through a speaker and mic. As such it […]

The post GPS tracker can be tracker and recorded. appeared first on IT Security Guru.

itsecurityguru.png 2019-05-13 08:33:03 If Huawei helps build UK 5G network, China could cut off cars and appliances. (lien direct)

The Chinese state could cut off cars and household appliances from Britain’s 5G network if the country’s telecoms giant is allowed to help build the system, according to a former government security adviser. Peter Varnish, who was a senior Ministry of Defence official, suggested a decision by Theresa May to allow Huawei to help build […]

The post If Huawei helps build UK 5G network, China could cut off cars and appliances. appeared first on IT Security Guru.

itsecurityguru.png 2019-05-13 08:32:05 Over 1 million Australians hit in one single data breach. (lien direct)

The latest quarterly data breach report from the Office of the Australian Information Commissioner (OAIC) has revealed over 10 million individuals had their information compromised in one single incident. The current population of Australia is around 25.4 million. While the report did not detail the origin of the breach that affected over 10 million individuals, […]

The post Over 1 million Australians hit in one single data breach. appeared first on IT Security Guru.

itsecurityguru.png 2019-05-13 08:32:01 Over a million computers remain at risk 2 years post WannaCry. (lien direct)

As many as 1.7 million internet-connected endpoints are still vulnerable to the exploits, according to the latest data. Data generated by Shodan, a search engine for exposed databases and devices, puts the figure at the million mark - with most of the vulnerable devices in the U.S. But that only accounts for devices directly connected […]

The post Over a million computers remain at risk 2 years post WannaCry. appeared first on IT Security Guru.

SecurityAffairs.png 2019-05-13 07:59:00 Expert discovered how to brick all Samsung mobile phones (lien direct)

The popular French white hat hacker Robert Baptiste (aka @fs0c131y) discovered how to brick all Samsung mobile phones. French white hat hacker Robert Baptiste (aka @fs0c131y) discovered how to brick all Samsung mobile phones. Baptiste bought a Samsung mobile phone a few months ago and decided to analyze it. After a few hours of tests, he discovered an unprotected receiver in […]

The post Expert discovered how to brick all Samsung mobile phones appeared first on Security Affairs.

SecurityAffairs.png 2019-05-13 06:52:04 Pacha Group declares war to rival crypto mining hacking groups (lien direct)

Two hacking groups associated with large-scale crypto mining campaigns, Pacha Group and Rocke Group, wage war to compromise as much as possible cloud-based infrastructure. The first group tracked as Pacha Group has Chinese origins, it was first detected in September 2018 and is known to deliver the Linux.GreedyAntd miner. The Pacha Group’s attack chain starts […]

The post Pacha Group declares war to rival crypto mining hacking groups appeared first on Security Affairs.

SecurityWeek.png 2019-05-13 06:32:04 Microsoft SharePoint Vulnerability Exploited in the Wild (lien direct)

A critical vulnerability in Microsoft\'s SharePoint collaboration platform has been exploited in the wild to deliver malware.

read more

ZDNet.png 2019-05-13 04:30:00 SHA-1 collision attacks are now actually practical and a looming danger (lien direct)

Research duo showcases first-ever SHA-1 chosen-prefix collision attack.

ZDNet.png 2019-05-12 22:04:00 Hackers are collecting payment details, user passwords from 4,600 sites (lien direct)

Same hacker group compromises Alpaca Forms and Picreel to deploy malicious code to thousands of sites.

zataz.png 2019-05-12 20:46:01 Base de données Peugeot France diffusée dans le blackmarket ? (lien direct)

Le Service Veille ZATAZ a mis la main, il y a quelques jours, sur une base de données contenant plus de 46 000 mails. D’après le pirate, il s’agirait de clients du groupe automobile Peugeot France. Difficile, pour le moment, de savoir d’où sortent les 2 974 fichier CSV. Des documen...

Cet article Base de données Peugeot France diffusée dans le blackmarket ? est apparu en premier sur ZATAZ.

TechRepublic.png 2019-05-12 19:40:00 Five tips for controlling procrastination (lien direct)

Some people say procrastination works for them, keeping them sharp and efficient. But for others, it\'s self-defeating, guilt-inducing, and demoralizing.

bleepingcomputer.png 2019-05-12 16:52:04 Blocking Hyperlink Auditing Tracking Pings with Extensions (lien direct)

With Chrome, Safari, and Edge enabling the tracking feature called Hyperlink Auditing, or Pings, by default without a way to disable them, users will need to rely on browser extensions to block them going forward. [...]

datasecuritybreach.png 2019-05-12 16:14:02 Prudence au site SCPI-Gouv.fr (lien direct)

Vous souhaitez simuler un investissement ? Vous souhaitez passer par le site gouvernemental SCPI-Gouv.fr ? Prudence ! Le portail web SCPI-Gouv.fr vous propose de simuler le montant que vous pourriez gagner via des Sociétés civiles de placement immobilier (SCPI). Le site est rapide, réclame quelques informations afin de vous permettre d’en savoir plus et d\'acquérir […]

datasecuritybreach.png 2019-05-12 16:08:00 Equifax : le pirate à plus de 1,4 milliard de perte (lien direct)

Le piratage informatique a un vrai coût qu’il est difficile à quantifier tant les ramifications venant s’y greffer ne se découvrent pas du jour au lendemain. Un exemple avec le piratage de 2017 de la banque Equifax. Deux ans après l’intrusion, la facture ne cesse de gonfler. Le piratage informatique est déjà psychologiquement difficile à […]

datasecuritybreach.png 2019-05-12 15:56:02 Traders home, le trading forcé aux risques multiples (lien direct)

Depuis plusieurs jours, une société de trading harcelle ses interlocuteurs, par téléphone, pour leur vendre du trading et le rêve de gagner des milliers d’euros sans se fatiguer. Prudence ! L’appel débute souvent quelques jours avant d’être en tête à tête, par téléphone, avec un commercial de chez Traders Home. Le premier appel dure rarement […]

zataz.png 2019-05-12 15:44:01 Blackmarkets : 3 millions de nouvelles données FR en vente (lien direct)

Blackmarkets: Le service veille ZATAZ repère plusieurs millions de nouvelles données appartenant à des Français. Chose folle, mais il faut s’en faire une raison, les pirates possèdent plus de données personnelles et privées appartenant à des français qu’il n’existe d’habitant...

Cet article Blackmarkets : 3 millions de nouvelles données FR en vente est apparu en premier sur ZATAZ.

SecurityAffairs.png 2019-05-12 15:22:05 Hacking the \'Unhackable\' eyeDisk USB stick (lien direct)

The paradox, the USB stick eyeDisk that uses iris recognition to unlock the drive could reveal the device\'s password in plain text in a simple way. eyeDisk is a USB stick that uses iris recognition to unlock the drive, it is advertised as the “Unhackable USB Flash Drive,” instead it could reveal the device\'s password […]

The post Hacking the \'Unhackable\' eyeDisk USB stick appeared first on Security Affairs.

zataz.png 2019-05-12 14:46:03 Fuite de données CityComp : un faux site de la Société Générale sur le même serveur du pirate (lien direct)

Vous avez très certainement du entendre parler du chantage numérique vécu par la société CityComp. Leurs données volées, un pirate a tout diffusé ne se faisant pas payer une rançon réclamée. ZATAZ découvre d’autres fichiers intrigants sur le serveur du pirate dont un signé Société Générale. Fi...

Cet article Fuite de données CityComp : un faux site de la Société Générale sur le même serveur du pirate est apparu en premier sur ZATAZ.

SecurityAffairs.png 2019-05-12 13:27:02 Security breach suffered by credit bureau Equifax has cost $1.4 Billion (lien direct)

Equifax revealed its earnings release related to the security breach suffered in 2017, the incident has cost about $1.4 billion plus legal fees. Equifax revealed this week its earnings release related to the security breach suffered by the credit bureau back in 2017, the incident has cost about $1.4 billion plus legal fees. In 2017 Equifax confirmed it has suffered […]

The post Security breach suffered by credit bureau Equifax has cost $1.4 Billion appeared first on Security Affairs.

zataz.png 2019-05-12 13:13:01 Le guide de voyage ASU piraté, la base de données d\'employés de compagnies aériennes en vente (lien direct)

Le guide de voyage ASU, à destination des employés de compagnies aériennes affiliées, piraté. Un pirate informatique infiltre le site et commercialise la base de données. Le personnel des compagnies aériennes, qu’il soit volant ou rampant, est une population sensible de part son environnement ...

Cet article Le guide de voyage ASU piraté, la base de données d’employés de compagnies aériennes en vente est apparu en premier sur ZATAZ.

12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32

Information mise à jours le: 2019-05-27 08:01:36
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Notre RSS (filtré) Twitter