What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
TechRepublic.png 2019-03-11 13:01:02 Cryptocurrency market to explode due to fast transaction speeds, enterprise investment (lien direct)

The cryptocurrency market will grow at a CAGR of 31% between 2017 and 2025, according to Transparency Market Research.

Checkpoint.png 2019-03-11 13:00:00 February 2019\'s Most Wanted Malware: Coinhive Quits While Still at the Top (lien direct)

By Check Point’s Threat Intelligence team, published March 11th   In February 2019, Coinhive led the global threat index for the 15th successive month, having announced that it will cease operation on the 8th March 2019 as it is no longer economically viable. Meanwhile, our researchers discovered several widespread campaigns distributing GandCrab in Japan, Germany,…

The post February 2019’s Most Wanted Malware: Coinhive Quits While Still at the Top appeared first on Check Point Software Blog.

WiredThreatLevel.png 2019-03-11 13:00:00 You Can Power a Calculator With Some LEDs (lien direct)

LEDs generate light, which is why they\'re in our screens. But if you instead shine a light on an LED, you can generate current to run a small device.

SecurityAffairs.png 2019-03-11 12:48:05 STOP ransomware encrypts files and steals victim\'s data (lien direct)

Experts observed the STOP ransomware installing the Azorult password-stealing Trojan to steal account credentials, cryptocurrency wallets, and more. The STOP ransomware made the headlines because it is installing password-stealing Trojans on the victims’ machines. Experts observed the ransomware also installing the dreaded Azorult password-stealing Trojan on victim’s machine to steal account credentials, cryptocurrency wallets, documents […]

The post STOP ransomware encrypts files and steals victim’s data appeared first on Security Affairs.

bleepingcomputer.png 2019-03-11 12:31:00 Samsung Galaxy S10 Face Recognition Can Easily Be Bypassed (lien direct)

The face recognition-based screen lock feature in the Samsung Galaxy S10 can be easily fooled using a photo or a video of the owner as shown by multiple reports coming from customers, experts and tech reviewers. [...]

itsecurityguru.png 2019-03-11 12:20:02 Zscaler Releases Semi-Annual Cloud Security Insights Report. (lien direct)

Zscaler, Inc., the leader in cloud security, announced today the release of its semi-annual 2019 Cloud Security Insights Threat Report – An Analysis of SSL/TLS-based Threats, which examines encrypted traffic across the Zscalerâ„¢ cloud from July through December 2018. The report, compiled by the ZscalerTM ThreatLabZ research team, delves into a variety of attacks executed […]

The post Zscaler Releases Semi-Annual Cloud Security Insights Report. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-11 12:19:05 Malware And Malicious Insiders Accounted For One-Third Of All Cybercrime Costs Last Year, According To Report From Accenture And Ponemon Institute. (lien direct)

The cost to companies from malware and “malicious insider”-related cyberattacks jumped 12 percent in 2018 and accounted for one-third of all cyberattack costs, according to new research published today by Accenture (NYSE: ACN) and the Ponemon Institute. Based on interviews with more than 2,600 security and information technology (IT) professionals at 355 organisations worldwide, Accenture\'s […]

The post Malware And Malicious Insiders Accounted For One-Third Of All Cybercrime Costs Last Year, According To Report From Accenture And Ponemon Institute. appeared first on IT Security Guru.

securityintelligence.png 2019-03-11 12:00:02 Security Considerations for Whatever Cloud Service Model You Adopt (lien direct)

>Regardless of what cloud service model you adopt, it\'s important to consider security implications related to application development, data and contract management, and IT asset governance.

The post Security Considerations for Whatever Cloud Service Model You Adopt appeared first on Security Intelligence.

WiredThreatLevel.png 2019-03-11 12:00:00 Acer Swift 5 Review: Big Screen, Impossibly Light (lien direct)

The Acer Swift 5 is a 2.2-pound laptop with a big 15.6-inch screen, a spacious keyboard, and great battery life. It\'s excellent, if a bit flimsy.

WiredThreatLevel.png 2019-03-11 12:00:00 The Huawei Case Signals the New US–China Cold War Over Tech (lien direct)

US allegations against China\'s Huawei are less about keeping Huawei out of American networks and more about the rest of the world.

bleepingcomputer.png 2019-03-11 11:53:01 Creepy Database Lists \'BreedReady\' Status for 1.8 Million Women (lien direct)

A database left unprotected online reveals a creepy set of details collected on more than 1.8 million women in China. Apart from the regular info one would expect, like name, age, and date of birth, the data set also includes a "BreedReady" status. [...]

no_ico.png 2019-03-11 11:30:01 February 2019\'s Most Wanted Malware: Coinhive Quits While Still At The Top (lien direct)

Check Point\'s researchers confirm Coinhive holds the top position in February\'s Top Malware index for 15th successive month before it shut down, while GandCrab distribution campaigns increase  Check Point Research,  the Threat Intelligence arm of Check Point, has published its latest Global Threat Index for February 2019. The index reveals that Coinhive has once again led the Global Threat Index for the 15th consecutive month, despite …

The ISBuzz Post: This Post February 2019\'s Most Wanted Malware: Coinhive Quits While Still At The Top appeared first on Information Security Buzz.

bleepingcomputer.png 2019-03-11 11:18:02 Game Development Companies Backdoored in Supply-Chain Attacks (lien direct)

Two popular games and a gaming platform developed by Asian companies were compromised following a series of successful supply-chain attacks which allowed the attackers to include a malicious payload designed to provide them with a backdoor. [...]

TechRepublic.png 2019-03-11 11:06:03 Web programming languages: How WebAssembly will change the way you build web apps (lien direct)

What is WebAssembly and how can developers get started with it.

WiredThreatLevel.png 2019-03-11 11:00:00 Legal Scholar Tim Wu Says the US Must Enforce Antitrust Laws (lien direct)

Tim Wu, who coined the phrase "net neutrality," supports Senator Elizabeth Warren\'s call to review big tech mergers.

WiredThreatLevel.png 2019-03-11 11:00:00 Did *Captain Marvel* Save Stan Lee\'s Best Cameo for Last? (lien direct)

The comic creator\'s cameo in Marvel\'s latest film winks at his joyful history of movie appearances.

SecurityAffairs.png 2019-03-11 10:58:04 Crooks use The Pirate Bay to spread PirateMatryoshka malware via reputed seeders (lien direct)

Crooks are abusing the torrent website The Pirate Bay to distribute the PirateMatryoshka malware that fuels the victim’s PC with unwanted software. Crooks abusing torrent services to distribute malware is not a novelty, Torrent users are often exposed to serious threats such if the one recently spotted by Kaspersky Lab and dubbed by the expert […]

The post Crooks use The Pirate Bay to spread PirateMatryoshka malware via reputed seeders appeared first on Security Affairs.

ESET.png 2019-03-11 10:27:01 Gaming industry still in the scope of attackers in Asia (lien direct)

>Asian game developers again targeted in supply-chain attacks distributing malware in legitimately signed software

The post Gaming industry still in the scope of attackers in Asia appeared first on WeLiveSecurity

TechRepublic.png 2019-03-11 09:49:00 Everything you need to know about Windows updates (lien direct)

Beyond Patch Tuesday: understanding the different monthly security and quality updates for Windows, and how they\'re getting more efficient.

Korben.png 2019-03-11 09:00:00 PineTools – La boite à outils du web (lien direct)

PineTools est un site web à bookmarker puisqu’il propose une pléthore d’outils tous plus utiles les uns que les autres. Et il y en a pour tous les goûts dans les catégories suivantes : Les mathématiques Les couleurs Les textes et les listes Les nombres Les dates et heures Les … Suite

The_Hackers_News.png 2019-03-11 08:46:02 BEWARE – New \'Creative\' Phishing Attack You Really Should Pay Attention To (lien direct)

A cybersecurity researcher who last month warned of a creative phishing campaign has now shared details of a new but similar attack campaign with The Hacker News that has specifically been designed to target mobile users. Just like the previous campaign, the new phishing attack is also based on the idea that a malicious web page could mimic look and feel of the browser window to trick even the

SecurityWeek.png 2019-03-11 07:13:05 Attack on Software Giant Citrix Attributed to Iranian Hackers (lien direct)

Software giant Citrix on Friday revealed that its internal network had been breached and the attackers may have stolen business documents.

read more

CSO.png 2019-03-11 07:07:00 Hackers use Slack to hide malware communications (lien direct)

A group of hackers is using a previously undocumented backdoor program designed to interact with attackers over Slack. While abusing legitimate services for malware command-and-control purposes is not a new development, this is the first time researchers have seen Slack, a popular enterprise collaboration tool, being used in this way.

The backdoor was detected by security firm Trend Micro in a targeted attack launched from the compromised website of an organization called the Korean American National Coordinating Council that posts articles related to North and South Korean politics. The technique of infecting websites that are of interest to a particular group of individuals or organizations is known as a "watering hole" attack.

To read this article in full, please click here

SecurityAffairs.png 2019-03-11 06:44:02 Saudi caller ID Dalil app exposed data of more than 5 million users (lien direct)

The Android caller ID app Dalil exposed online data belonging over 5 million users, security experts discovered a MongoDB database left accessible on the web without a password. The MongoDB behind the Android caller ID app Dalil was left exposed online, at least for a week, without a password, leaving 5 million users accessible on […]

The post Saudi caller ID Dalil app exposed data of more than 5 million users appeared first on Security Affairs.

SecurityWeek.png 2019-03-11 05:19:05 Venezuela\'s Maduro Says Cyber Attack Prevented Power Restoration (lien direct)

Venezuela President Nicolas Maduro claimed on Saturday that a new cyber attack had prevented authorities from restoring power throughout the country following a blackout on Thursday that caused chaos.

read more

The_Hackers_News.png 2019-03-11 04:13:02 AWS Certification Training Courses – Get 2019 Bundle @ 96% OFF (lien direct)

With countless web apps and online services launching every day, there is an increasing demand for cloud developers. This exciting niche is due to grow rapidly over the next few years, and the paycheck should follow suit. If you want to build a career in this lucrative niche, it pays to know AWS (Amazon Web Services). With the AWS Certified Architect Developer Bundle 2019,

TechRepublic.png 2019-03-11 03:58:01 How a companion robot can help children with chronic illness (lien direct)

The companion robot, ikki, is portable and helps children to monitor their health and feel more engaged in the recovery process.

Chercheur.png 2019-03-11 03:41:05 Insert Skimmer + Camera Cover PIN Stealer (lien direct)

Very often the most clever component of your typical ATM skimming attack is the hidden pinhole camera used to record customers entering their PINs. These little video bandits can be hidden 100 different ways, but they\'re frequently disguised as ATM security features -- such as an extra PIN pad privacy cover, or an all-in-one skimmer over the green flashing card acceptance slot at the ATM. And sometimes, the scammers just hijack the security camera built into the ATM itself.

TechRepublic.png 2019-03-11 03:32:00 Unintended inferences: The biggest threat to data privacy and cybersecurity (lien direct)

Find out why data privacy breaches and scandals (think Facebook, Marriott, and Yahoo), artificial intelligence, and analytics have implications for how your business manages cybersecurity and privacy.

The_Hackers_News.png 2019-03-11 02:32:03 Severe Flaw Disclosed In StackStorm DevOps Automation Software (lien direct)

A security researcher has discovered a severe vulnerability in the popular, open source event-driven platform StackStorm that could allow remote attackers to trick developers into unknowingly execute arbitrary commands on targeted services. StackStorm, aka "IFTTT for Ops," is a powerful event-driven automation tool for integration and automation across services and tools that allows

bleepingcomputer.png 2019-03-11 01:00:01 Microsoft Asks Users to Call Windows 10 Devs About ALT+TAB Feature (lien direct)

Microsoft has started to display notifications in the Windows 10 Action Center asking users to have a phone call with Microsoft developers and provide direct feedback about the ALT+TAB feature in Windows.  [...]

The_Hackers_News.png 2019-03-11 00:52:01 Citrix Data Breach – Iranian Hackers Stole 6TB of Sensitive Data (lien direct)

Popular enterprise software company Citrix that provides services to the U.S. military, the FBI, many U.S. corporations, and various U.S. government agencies disclosed last weekend a massive data breach of its internal network by "international cyber criminals." Citrix said it was warned by the FBI on Wednesday of foreign hackers compromising its IT systems and stealing "business documents,"

WiredThreatLevel.png 2019-03-10 23:26:05 This Big Facebook Critic Fears Tech\'s Business Model (lien direct)

Roger McNamee was a mentor Mark Zuckerberg and an early investor in Facebook. Now he has written a book about the "Facebook catastrophe."

zataz.png 2019-03-10 20:48:05 Black market : bitcoins à vendre (lien direct)

Un pirate commercialise dans un black market dédié des dizaines de bitcoins acquis dans des actions malveillantes. Un business fleurissant. Comment blanchir des bitcoins acquis de manières malveillantes ? Voilà la question que s’est posé un pirate informatique Chinois que le Service Veille ZAT...

Cet article Black market : bitcoins à vendre est apparu en premier sur ZATAZ.

zataz.png 2019-03-10 20:08:01 Acheter de l\'or et des diamants dans le black market (lien direct)

Les produits pirates proposés dans le black market sont multiples. Armes, drogues, faux papiers, bases de données piratées, cartes bancaires … Les rayons ne désemplissent pas et s’ouvrent à des marchés étonnants comme la vente d’or et de diamants. Explication. Avez-vous déjà entend...

Cet article Acheter de l’or et des diamants dans le black market est apparu en premier sur ZATAZ.

WiredThreatLevel.png 2019-03-10 18:47:00 Crashed Ethiopian Air Jet Is Same Model as Lion Air Accident (lien direct)

An Ethiopian Airlines Boeing 737-800 MAX crashed shortly after takeoff Sunday, evoking comparisons to an Indonesian incident in October.

WiredThreatLevel.png 2019-03-10 18:00:00 23andMe\'s New Diabetes Test Has Experts Asking Who It\'s For (lien direct)

The DNA company is releasing a genetic test to predict whether a person is likely to get diabetes, but it\'s of limited use to many high-risk people.

SecurityAffairs.png 2019-03-10 17:36:03 Venezuelan Minister declares Venezuela\'s Blackout may be caused by cyberattack carried by US (lien direct)

Venezuelan Minister of Communication and Information Jorge Rodriguez blamed US cyberattack for Venezuela’s blackout. Last week, Venezuela had suffered a major blackout and Nicolas Maduro immediately blamed on opposition “sabotage” of a hydroelectric dam. The power outage hit 22 of 23 states of the country and also the capital Caracas went in the dark. On […]

The post Venezuelan Minister declares Venezuela’s Blackout may be caused by cyberattack carried by US appeared first on Security Affairs.

bleepingcomputer.png 2019-03-10 17:30:03 STOP Ransomware Installing Password Stealing Trojans on Victims (lien direct)

In addition to encrypting a victim\'s files, the STOP ransomware family has also started to install the Azorult password-stealing Trojan on victim\'s computer to steal account credentials, cryptocurrency wallets, desktop files, and more. [...]

zataz.png 2019-03-10 17:29:03 Délits d\'initié 2.0 dans le black market (lien direct)

Délit d\'initié 2.0 ! Dans le black market, il est possible de trouver des armes, de la drogue, des faux billets, des documents administratifs falsifiés. Il est aussi possible de croiser des propositions commerciales étonnantes à l’encontre des entreprises ou des sportifs professionnels. Délit ...

Cet article Délits d’initié 2.0 dans le black market est apparu en premier sur ZATAZ.

zataz.png 2019-03-10 16:54:01 Cyberharcèlement, cyberintimidation et boutiques pirates (lien direct)

Etes-vous certains que vos " sexfies " et autres vidéos intimes que vous avez sauvegardé dans un cloud, boite mail, pc et autre téléphone n’ont pas été volés par un pirate ? Cyberharcèlement, cyberintimidation … Dans cet épisode cybersécurité diffusé sur Weo TV, 1 lundi sur 2, nous reven...

Cet article Cyberharcèlement, cyberintimidation et boutiques pirates est apparu en premier sur ZATAZ.

SecurityWeek.png 2019-03-10 16:34:04 Unprotected MongoDB Instance Exposes 800 Million Emails (lien direct)

An unprotected MongoDB database was recently found exposing over 800 million records, including email addresses and phone numbers. 

Discovered on February 25 by security researcher Bob Diachenko, the MongoDB instance weighed in at 150 gigabytes and allowed anyone with an Internet connection to access the information within. 

read more

zataz.png 2019-03-10 16:32:04 Ruiner la vie d\'un internaute et acheter des attaques DDoS… bienvenue dans le black market (lien direct)

Si lancer des attaques de Dénis Distribués de Service est devenu un jeu d’enfant, acquérir des attaques de tailles XXL reste un commerce d’initié… qui tend à se démocratiser. Parmi les autres options… ruiner la vie d’un internaute ! Les attaques de Dénis Distribués de S...

Cet article Ruiner la vie d’un internaute et acheter des attaques DDoS… bienvenue dans le black market est apparu en premier sur ZATAZ.

SecurityAffairs.png 2019-03-10 14:26:02 Security Affairs newsletter Round 204 – News of the week (lien direct)

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Kindle Edition Paper Copy Once again thank you!   ·Â Â Â Â Â  A Cobalt Strike flaw exposed attackers infrastructure ·Â Â Â Â Â  The operator of DDoS-for-hire service pleads guilty ·Â Â Â Â Â  The Wireshark Foundation released Wireshark 3.0.0 ·Â Â Â Â Â  Annual RSA Conference Exclusive […]

The post Security Affairs newsletter Round 204 – News of the week appeared first on Security Affairs.

WiredThreatLevel.png 2019-03-10 13:00:00 Electric Minivans at the Geneva Motor Show, and More Car News (lien direct)

Plus: Lightweight leather, dune buggies, and a volume knob made from a meteorite.

WiredThreatLevel.png 2019-03-10 13:00:00 Have We Reached Peak Big? (lien direct)

Opinion: Every industry seems bigger than ever. But a course correction could be on the way.

WiredThreatLevel.png 2019-03-10 13:00:00 Tim Cook\'s Pwn of President Trump Tops This Week\'s Internet News Roundup (lien direct)

Actually, a lot of people got pwned last week.

ZDNet.png 2019-03-10 12:49:03 Facebook sues Ukrainian browser extension makers for scraping user data (lien direct)

Facebook said the malicious extensions were installed by more than 63,000 users.

TechRepublic.png 2019-03-10 12:18:00 How to protect your small business from the dark web (lien direct)

Education, monitoring and response tools, and training about the dark web are essential to protecting your small business from cybercriminals.

WiredThreatLevel.png 2019-03-10 12:00:00 Astronomers Think They Can Explain Mysterious Cosmic Bursts (lien direct)

A new, testable theory proposes that fast radio bursts may draw their power from young neutron stars called magnetars.

12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32

Information mise à jours le: 2019-03-26 04:01:32
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Notre RSS (filtré) Twitter