What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
WiredThreatLevel.png 2019-09-20 00:06:13 We All Could Pay a Price for the Latest Slap at Huawei (lien direct)

An international cybersecurity group has evicted the Chinese telecom company to comply with US sanctions. That could allow malware to spread more easily.

grahamcluley.png 2019-09-19 23:36:53 15,000 private webcams left open to snooping, no password required (lien direct)

Once again concerns are being raised about the sorry state of IoT security, after a security researcher discovered over 15,000 private webcams that have been left wide open for anyone with an internet connection to spy upon.

Read more in my article on the Bitdefender BOX blog.

WiredThreatLevel.png 2019-09-19 23:08:00 (Déjà vu) An Apple iOS 13 Review, Spying Streaming Devices, and More News (lien direct)

Catch up on the most important news from today in two minutes or less.

WiredThreatLevel.png 2019-09-19 23:01:47 Amazon Puts a Charge Into Startup Automaker Rivian (lien direct)

The retail giant says it will buy 100,000 electric vans by 2030 from a company that doesn\'t yet have a single vehicle on the road.

ZDNet.png 2019-09-19 22:47:13 Google removes two Chrome ad blocker extensions caught \'cookie stuffing\' (lien direct)

Two Chrome ad blockers caught manipulating cookies so extension devs could earn commissions on users\' backs.

WiredThreatLevel.png 2019-09-19 22:27:00 Depth of Field: Hong Kong\'s Flash Mob for Democracy (lien direct)

In photographer Philip Fong\'s image, you can almost feel the people of Hong Kong reaching for a future that belongs to them.

ZDNet.png 2019-09-19 21:53:41 Two arrested in $10 million tech support scheme that \'preyed on the elderly\' (lien direct)

Suspects run tech support scam sites and made over $10m from over 7,500 victims by billing unneeded tech support fees.

Blog.png 2019-09-19 21:47:33 MY TAKE: Poll shows senior execs, board members grasp strategic importance of cybersecurity (lien direct)

A singular topic has risen to the top of the agenda in executive suites and board rooms all across the planet: cybersecurity. Related: Security, privacy fallout of IoT A recent survey by Infosys, a tech consulting and IT services giant based in Bangalore, India, quantifies the degree to which the spotlight has landed on cybersecurity […]

WiredThreatLevel.png 2019-09-19 21:20:30 How Painter Alexa Meade Creates Dimension-Collapsing Art (lien direct)

The Google Artist in Residence is working with the company\'s AR/VR team to digitally capture her new installation as a rainbow-hued depth map.

WiredThreatLevel.png 2019-09-19 21:10:30 Amazon\'s New Climate Pledges Won\'t Stop Employee Walkout (lien direct)

CEO Jeff Bezos unveiled ambitious plans to reduce his company\'s carbon footprint. But some workers say the efforts don\'t go far enough.

TechRepublic.png 2019-09-19 20:10:06 How to change a Slack channel name (lien direct)

Did you inherit a mess of a Slack workspace? Find out how to clean that up by renaming channels.

zataz.png 2019-09-19 20:04:28 Des codes sources sensibles de la banque Scotia accessibles sur le web (lien direct)

Des codes sources internes et des clés d’identifications pour se connecter à certains systèmes de la banque Scotia étaient accessibles sur le site web, via GitHub. Au cours des dernières 24 heures, le géant financier canadien Scotia a détruit plusieurs pages et codes sources sauvegardés sur le...

Cet article Des codes sources sensibles de la banque Scotia accessibles sur le web est apparu en premier sur ZATAZ.

ZDNet.png 2019-09-19 20:00:05 Two years later, hackers are still breaching local government payment portals (lien direct)

New 20,000 batch of payment card details found on the dark web and traced back to new Click2Gov hacks.

WiredThreatLevel.png 2019-09-19 19:59:03 Generation Z Is Making Music With Anti-Radical Tones (lien direct)

Whereas millennial artists embrace experimentation and maximalism, Gen Z finds beauty inside of parameters.

SecurityWeek.png 2019-09-19 19:49:54 Don\'t Take the Bait: A Look at the Latest Phishing Trends (lien direct)

Since the start of September 2019 we\'ve seen some major attacks, including a Facebook data leak which exposed more than 400 million telephone numbers and an Android software vulnerability which revealed devices were susceptible to SMS-based attacks that could change device settings remotely.

read more

TechRepublic.png 2019-09-19 19:02:18 Software jobs expected to grow twice as fast as overall US jobs (lien direct)

Average wages for software jobs are rising and the number of jobs available are outpacing other job openings in the US economy.

MalwarebytesLabs.png 2019-09-19 18:27:51 Browser Guard combats privacy abuse, tracking, clickbait, and scammers (lien direct) The free Malwarebytes Browser Guard extension combats privacy abuse, user tracking, clickbait, unwanted advertisements, and tech support scammers while offering granular control and faster browsing.


Malwarebytes news


(Read more...)

The post Browser Guard combats privacy abuse, tracking, clickbait, and scammers appeared first on Malwarebytes Labs.

WiredThreatLevel.png 2019-09-19 18:09:19 Farm Animals Are the Next Big Antibiotic Resistance Threat (lien direct)

Bacteria harvested from pigs and chickens are developing resistance to numerous antibiotics at an alarming rate.

SecurityWeek.png 2019-09-19 17:49:16 Phishing Emails Deliver Amadey Malware to U.S. Taxpayers (lien direct)

A recently observed phishing campaign is targeting taxpayers in the United States in an attempt to infect their machines with a piece of malware named Amadey, Cofense security researchers have discovered.

read more

bleepingcomputer.png 2019-09-19 17:41:37 Windows 10 Insider Build 18985 Released With Improved Bluetooth Pairing (lien direct)

Microsoft has released Windows 10 Insider Preview Build 18985 (20H1) to Insiders in the Fast ring, which includes a new optional update experience, a Snip & Sketch update, and a new Bluetooth pairing experience. [...]

SecurityWeek.png 2019-09-19 17:33:35 MITRE Publishes New List of Most Dangerous Software Weaknesses (lien direct)

The MITRE Corporation this week published an updated list of the most dangerous software weaknesses and vulnerabilities.

Known as the Common Weakness Enumeration (CWE) Top 25 Most Dangerous Software Errors (CWE Top 25), the new list has been created based on real-world vulnerabilities found in the NVD (National Vulnerability Database).

read more

WiredThreatLevel.png 2019-09-19 17:29:31 Bob Iger Imagines an Alt-History Where Disney and Apple Merge (lien direct)

In his new memoir, the Mouse House CEO claims that if Steve Jobs were still alive they would\'ve discussed combining their companies.

TechRepublic.png 2019-09-19 17:17:16 Many US rural areas still suffer slow internet speeds (lien direct)

While metro areas are busy anticipating 5G, rural areas lag behind with an average internet speed of 39.01 Mbps.

TechRepublic.png 2019-09-19 17:08:27 Revenue from cloud services and infrastructure reaches $150 billion in first half of 2019 (lien direct)

Operators and vendors in seven cloud service and infrastructure market segments raked in $150 billion from January to June.

bleepingcomputer.png 2019-09-19 17:07:01 Thinkful Resets All User Passwords After Security Breach (lien direct)

Online developer bootcamp company Thinkful is sending out email notifications that state an unauthorized user was able to gain access to employee accounts credentials. Due to this, they are requiring all users to reset their passwords the next time they login. [...]

WiredThreatLevel.png 2019-09-19 17:00:00 iOS 13 Arrives, But Not Without Some Bugs (lien direct)

iPhones and iPads get a software update this week, but you might want to wait for iOS 13.1.

WiredThreatLevel.png 2019-09-19 16:44:56 How Apple Arcade Will Reshape the App Store (lien direct)

The gaming app ecosystem is built on in-app purchases and ads. What happens when you take them away?

SecurityWeek.png 2019-09-19 16:09:45 Dataswift Raises $2 Million in Seed Funding to Revolutionize Personal Data Sharing (lien direct)

Dataswift, a Cambridge, UK-based company founded by Professor Irene Ng in 2015, has raised nearly $2 million (£1.6 million pounds) in seed funding from IQ Capital, with participation from Pacific & Orient Properties Ltd and Alphanumeric Corporation. Dataswift sells web services technology to apps and websites who want their users to have HAT personal data accounts.

read more

SecureMac.png 2019-09-19 16:00:48 Checklist 155: iOS 13 Feature Focus (lien direct)

On this edition of The Checklist: iOS 13\'s built-in Cycle Tracker, Privacy and security in Apple Arcade, and Facebook location follow-up.

The post Checklist 155: iOS 13 Feature Focus appeared first on SecureMac.

ESET.png 2019-09-19 15:57:31 Universities warned to brace for cyberattacks (lien direct)

The UK\'s cybersecurity agency also outlines precautions that academia should take to mitigate risks

The post Universities warned to brace for cyberattacks appeared first on WeLiveSecurity

SecurityAffairs.png 2019-09-19 15:56:02 At least 1,300 Harbor cloud registry installs open to attack (lien direct)

A critical security flaw in Harbor cloud native registry for container images could be exploited to obtain admin privileges on a vulnerable hosting system. Palo Alto Networks’ Unit 42 researcher Aviv Sasson discovered a critical vulnerability in Harbor cloud native registry for container images. The flaw, tracked as CVE-2019-16097, could be exploited to take control […]

The post At least 1,300 Harbor cloud registry installs open to attack appeared first on Security Affairs.

MalwarebytesLabs.png 2019-09-19 15:54:43 CEOs offer their own view of a US data privacy law (lien direct) Should this proposed privacy law come into effect, if a company violates that law, you, your neighbor, and your family do not have the right to sue them.




(Read more...)

The post CEOs offer their own view of a US data privacy law appeared first on

globalsecuritymag.png 2019-09-19 15:54:03 Les attaques ciblant les objets connectés et Windows SMB progressent en 2019 (lien direct)

Au premier semestre 2019, les attaques liées aux objets connectés et à SMB se sont multipliées. En témoigne un nouveau rapport publié par F-Secure sur les cyber menaces baptisé Attack Landscape H1 2019. Ce rapport décrit les cyber menaces guettant les objets connectés lorsqu\'ils ne sont pas correctement sécurisés. Il évoque notamment la popularité persistante d\'Eternal Blue et des exploits connexes, deux ans après WannaCry. Les honeypots de F-Secure - des serveurs destinés à piéger les pirates (...) - Malwares

TechRepublic.png 2019-09-19 15:46:25 The Pragmatic Programmer: Classic developer handbook is retooled for the 21st century (lien direct)

The authors of The Pragmatic Programmer 20th Anniversary Edition on how software development has changed and the essential skills for a modern dev.

bleepingcomputer.png 2019-09-19 15:44:37 Emotet Trojan Evolves Since Being Reawakend, Here is What We Know (lien direct)

With the reawakening of the Emotet botnet, the distribution methods, payloads, malicious document templates, and email templates continue to evolve. This article will go over some of the changes that have been observed by various security researchers over the past couple of days. [...]

TechRepublic.png 2019-09-19 15:33:00 Startup wants to make solar power plug-and-play (lien direct)

Span has just released a smart electric panel and an app to make it easier for homeowners to install and manage solar power.

Blog.png 2019-09-19 15:29:03 MY TAKE: What everyone should know about the promise and pitfalls of the Internet of Things (lien direct)

The city of Portland, Ore. has set out to fully leverage the Internet of Things and emerge as a model “smart” city. Related: Coming soon – driverless cars Portland recently shelled out $1 million to launch its Traffic Sensor Safety Project, which tracks cyclists as they traverse the Rose City\'s innumerable bike paths. That\'s just […]

WiredThreatLevel.png 2019-09-19 15:26:55 You Can Soon Get Your DNA Sequenced Anonymously (lien direct)

Using a blockchain, Nebula Genomics has crafted a way for customers to get their genomes sequenced without revealing personally identifying data.

TechRepublic.png 2019-09-19 14:57:32 Why businesses would rather lose revenue than data (lien direct)

While businesses don\'t want to lose data, 66% of business decision makers said their current IT resources do not keep up with growing technological demands.

SecurityWeek.png 2019-09-19 14:50:48 Kaspersky Unveils ICS Vulnerabilities Database (lien direct)

Kaspersky on Thursday announced the ICS Vulnerabilities Database, a new service designed to help industrial organizations keep track of relevant security flaws and protect their networks against potential threats.

read more

securityintelligence.png 2019-09-19 14:15:24 Night Vision: Navigating the Darknet for Improved Threat Intelligence (lien direct)

Reading Time: 4 minutes Securely accessing the darknet can help organizations overhear criminal conversations, find actionable data, look for evidence of compromise, build better defenses and uncover critical user risks.

The post Night Vision: Navigating the Darknet for Improved Threat Intelligence appeared first on Security Intelligence.

securityintelligence.png 2019-09-19 14:00:34 Speak Up! How a Graduate Security Architect Learned to Challenge the Status Quo (lien direct)

Reading Time: 5 minutes One of the hardest - and most rewarding - lessons I learned during my first bid as a graduate security architect was to back my suggestions with confidence, but know when to back off.

The post Speak Up! How a Graduate Security Architect Learned to Challenge the Status Quo appeared first on Security Intelligence.

DarkReading.png 2019-09-19 14:00:00 Deconstructing an iPhone Spearphishing Attack (lien direct)

How criminals today bypass smartphone anti-theft protection and harvest AppleID and passwords taken from fake Apple servers.

WiredThreatLevel.png 2019-09-19 14:00:00 The Traces of Human Activity in the Burning Man Void (lien direct)

Photographer Michael Light captures surreal, manmade marks in the Great Basin region.

SecurityWeek.png 2019-09-19 13:53:22 The Global Reach of GDPR (lien direct)

It isn\'t that no one saw it coming.  After all, today\'s regimen of European Union General Data Protection Regulations had been crafted under public scrutiny since 2012 and in full force since May 2018.  But its implementation left a degree of uncertainty, particularly among multinationals.

read more

ZDNet.png 2019-09-19 13:50:22 Old Magecart web domains resurrected for fraudulent ad schemes (lien direct)

Card skimming is the modus operandi of Magecart but many of the new campaigns focus on malvertising instead.

TechRepublic.png 2019-09-19 13:46:14 How to handle the public disclosure of bugs and security vulnerabilities (lien direct)

A full 90% of security professionals say yes, according to a poll conducted by 451 Research and commissioned by security testing company Veracode.

TechRepublic.png 2019-09-19 13:45:54 Yahoo data breach settlement means affected users may get $100 (lien direct)

If you had a Yahoo account between January 1, 2012 and December 31, 2016, you may be entitled to a bit of money.

Data Breach
WiredThreatLevel.png 2019-09-19 13:45:08 \'Sorry to This Man\' Is the Perfect Meme for Right Now (lien direct)

Keke Palmer\'s accidental roast of Dick Cheney encapsulates a lot of people\'s feelings in this moment in time.

TechRepublic.png 2019-09-19 13:34:02 Some tech CEOs eyed as untrustworthy but certain companies are still favored (lien direct)

Tech moguls Tim Cook, Mark Zuckerberg, and Jeff Bezos all scored on the bottom half of the scale for trustworthiness, according to analysis conducted by global brand consultancy Landor.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21

Information mise à jours le: 2019-09-22 08:07:45
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Notre RSS (filtré) Twitter