What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
SecurityWeek.png 2019-05-23 15:42:02 Authorities Take Down Cryptocurrency Mixing Service Bestmixer.io (lien direct)

Authorities in Europe this week said they took down Bestmixer.io, one of the leading cryptocurrency mixing service in the world. 

The takedown was possible due to a collaboration between the Dutch Fiscal Information and Investigation Service (FIOD), Europol, and authorities in Luxembourg. 

read more

TechRepublic.png 2019-05-23 15:27:03 The top 10 most innovative big data analytics companies in 2019 (lien direct)

With data analytics sweeping the enterprise, these are the top vendors organizations should pay attention to this year, according to Analytics Insight Magazine.

TechWorm.png 2019-05-23 15:01:01 Tor Browser 8.5 For Android Launched On Google Play Store (lien direct)

First stable version of the Tor browser for Android now available on Google Play Store Yesterday, the Tor Project released the stable version of Tor Browser for Android on Google\'s Play Store, which is now available as a free download. For those unaware, Tor is a network technology that preserves users\' privacy by concealing their […]

The post Tor Browser 8.5 For Android Launched On Google Play Store appeared first on TechWorm.

DarkReading.png 2019-05-23 15:00:00 Mobile Exploit Fingerprints Devices with Sensor Calibration Data (lien direct)

Data from routines intended to calibrate motion sensors can identify individual iOS and Android devices in a newly released exploit.

WiredThreatLevel.png 2019-05-23 15:00:00 Scientists Find a Volume Knob for Emotional Memories (lien direct)

Using mice whose neurons had been engineered to respond to light, researchers found they could dial up or down the emotional intensity of a memory.

onapsis.png 2019-05-23 14:57:02 Paving Your Way Through SAP Digital Transformation Part 3 (lien direct)

In this blog post, we will discuss how you can make security and compliance an enabler rather than see it as a roadblock for your move to S/4HANA. Without a strong cybersecurity strategy, organizations are at risk of compliance failures, data breaches, financial fraud and system downtime.

ResearchAnand Kotti
itsecurityguru.png 2019-05-23 14:54:00 comforte AG Launches New Payments Industry Data Security Solution. (lien direct)

comforte AG has announced its Data Security Solution and Practice for the Payments Industry. The solution is making its debut at Card Forum 2019, the annual gathering of card and payment executives from the industry\'s leading issuers, networks, retailers and innovators. Card Forum 2019 is being held this week in New Orleans. comforte AG has […]

The post comforte AG Launches New Payments Industry Data Security Solution. appeared first on IT Security Guru.

WiredThreatLevel.png 2019-05-23 14:39:00 Depth of Field: \'Game of Thrones\' Was Always Doomed to Disappoint (lien direct)

Not every fan finds the answers they seek. The truth is all there in this one image.

securityintelligence.png 2019-05-23 14:31:03 Uncover Modern Identity and Access Management (IAM) Challenges With Enterprise Design Thinking (lien direct)

>Identity and access management (IAM) has become increasingly challenging due to the complexity of more devices, applications, information, users and data privacy regulations.

The post Uncover Modern Identity and Access Management (IAM) Challenges With Enterprise Design Thinking appeared first on Security Intelligence.

TechRepublic.png 2019-05-23 14:27:00 One year in, fewer than half of professionals believe GDPR increased data protection (lien direct)

Younger workers are more impassioned about technology regulation, while half of all professionals are annoyed by pop-ups and opt-ins for data handling.

SecurityAffairs.png 2019-05-23 14:26:01 Tor Browser for Android is available through the Play Store (lien direct)

Tor Browser for Android is now available on the Play Store, this is a great result for experts that everyday fight to defend human rights and privacy online. The Tor Project announced on Tuesday that the Tor Browser version Tor Browser 8.5 for Android is finally available on the Google Play Store. “Tor Browser 8.5 […]

The post Tor Browser for Android is available through the Play Store appeared first on Security Affairs.

no_ico.png 2019-05-23 14:15:01 Organisations See Huge Rise In Encryption Implementation Following GDPR Enforcement (lien direct)

More than half of organisations enforce encryption of data on all mobile devices and removable media  Apricorn, the leading manufacturer of software-free, 256-bit AES XTS hardware-encrypted USB drives, today announced findings from a survey highlighting the rise in encryption technology post GDPR enforcement. Two thirds (66%) of respondents now hardware encrypt all information as standard, which is a positive step …

The ISBuzz Post: This Post Organisations See Huge Rise In Encryption Implementation Following GDPR Enforcement appeared first on Information Security Buzz.

WiredThreatLevel.png 2019-05-23 14:00:00 Central Asia\'s Wild Soviet Architecture (lien direct)

Photographers Roberto Conte and Stefano Perego traveled to four former republics for their latest book.

Pirate.png 2019-05-23 13:58:04 Un week-end de quatre jours se profile à l\'horizon, attention à vos connexions Wi-Fi lors de vos escapades (lien direct)
Selon une étude*, 94% des personnes interrogées déclarent que la connexion Wi-Fi est le service le plus important lorsqu\'elles envisagent de réserver une chambre.
globalsecuritymag.png 2019-05-23 13:57:03 16 - 20 juin - Hack In Paris 2019 : La 9ème édition de l\'évènement international cybersécurité approche à grands pas (lien direct)

Sysdream, Division Cybersécurité de Hub One, organise du 16 au 20 juin 2019 l\'événement Hack In Paris à la Maison de la Chimie, au cÅ“ur de Paris. A cette occasion, les professionnels et les passionnés de la cybersécurité se rencontreront autour d\'un programme riche et varié, et de partages d\'expériences avec des conférenciers internationaux. "Nous sommes ravis d\'organiser cette 9ème édition d\'Hack In Paris riche en contenu, nouveautés et partenaires. Cet évènement international est une rencontre majeure (...) - Événements

Pirate.png 2019-05-23 13:56:00 Cybersécurité : Un impératif dans la numérisation de nos sociétés (lien direct)
A tous les fans de sensations fortes, bienvenue dans le monde des cyberattaques ! Au carrefour de Matrix, Minority report et du Bureau des Légendes, le cyber-espace est à la fois le lieu de tous les fantasmes et de tous les risques.
Pirate.png 2019-05-23 13:53:00 La sécurité des API : un défi grandissant pour les entreprises (lien direct)
Les API, ces interfaces logiciels qui permettent de connecter entre elles des applications, existent depuis de longues années. Mais elles suscitent aujourd\'hui un véritable engouement dans la nouvelle économie digitale, car elles jouent un rôle d\'accélérateur de croissance pour toujours plus d\'entreprises.
Pirate.png 2019-05-23 13:34:01 La plateforme BestMixer.io hors service – Un rapport McAfee à l\'origine de l\'enquête (lien direct)
Aujourd\'hui, la FIOD (le service d\'information et d\'enquêtes fiscales néerlandais) et le service de poursuites pénales viennent de mettre Bestmixer.io, l\'un des 3 plus grands services de mélanges et de blanchiment d\'argent pour les cryptomonnaies, hors-service.
no_ico.png 2019-05-23 13:30:00 LinkedIn Certificate Outage – Lesson Learnt (lien direct)

It was reported this morning that when some users noticed on Tuesday that when they tried to access LinkedIn from their desktop or laptop computer they were greeted by an alert that said the connection was not secure. It turned out that the company had forgotten to renew the TLS certificate for its lnkd.in URL shortener. The company quickly took action …

The ISBuzz Post: This Post LinkedIn Certificate Outage – Lesson Learnt appeared first on Information Security Buzz.

TechRepublic.png 2019-05-23 13:22:00 How to choose e-commerce services and software (lien direct)

Finding the right e-commerce solution requires a careful assessment of your needs and the available features and tools. These guidelines will help you zero in on the best options for your business.

TechRepublic.png 2019-05-23 13:03:04 IoT Industry projected to have economic impact of $11 trillion by 2025 (lien direct)

Industries including manufacturing, healthcare, and agriculture are increasing IoT device usage for a variety of purposes, according to a Particle report.

bleepingcomputer.png 2019-05-23 13:02:01 Two More Windows 10 Zero-Day PoC Exploits Released, Brings Total to 4 (lien direct)

After releasing exploit code for three zero-day vulnerabilities in Windows 10 over the past 48 hours, security researcher and exploit developer SandboxEscaper today has published two more, bypass for the CVE-2019-0841 patch and LPE PoC exploit dubbed InstallerBypass. [...]

WiredThreatLevel.png 2019-05-23 13:00:00 Hopsy Sub Home Tap Review: A Crafty Way to Enjoy Draft Beer at Home (lien direct)

A craft beer subscription service ensures this mini keg fridge is always kickin\'.

TechWorm.png 2019-05-23 12:58:05 The World\'s Most Destructive Laptop Running 6 Malware Is Up For Auction (lien direct)

A laptop with 6 of the deadliest malware threats ever is selling for $1,200,749 Did you know that a laptop infected with six of the deadliest malware ever found on the Internet is selling for $1,200,749? Yes, you have heard it right! The laptop in question is an air-gapped Samsung NC10-14GB 10.2-Inch Blue Netbook (2008) […]

The post The World’s Most Destructive Laptop Running 6 Malware Is Up For Auction appeared first on TechWorm.

SecurityWeek.png 2019-05-23 12:52:04 PoC Exploits Created for Wormable Windows RDS Flaw (lien direct)

Several proof-of-concept (PoC) exploits, including ones that can be used for remote code execution, have been developed for the recently patched Windows Remote Desktop Services (RDS) vulnerability tracked as CVE-2019-0708 and dubbed BlueKeep.

read more

bleepingcomputer.png 2019-05-23 12:44:02 Microsoft Releases Windows 10 Version 1903 Security Baseline (lien direct)

Microsoft announced today the final version of its security configuration baseline settings for Windows 10 Version 1903 and Windows Server Version 1903, downloadable today using the Microsoft Security Compliance Toolkit. [...]

TechRepublic.png 2019-05-23 12:41:00 Survey: IT industry vets do not think today\'s new IT professionals have adequate training (lien direct)

A survey from INAP found half of IT professionals worried that new staff are underprepared. Here\'s the kicker: Those same pros don\'t feel adequately trained, either.

Pirate.png 2019-05-23 12:19:02 Q1 2019 : les attaques DDoS font leur grand retour (+84%) (lien direct)
Tous les trimestres, Kaspersky Lab publie une analyse des tendances qui ont marqué l\'industrie de la cyber sécurité au cours des 3 derniers mois, en ce concentrant sur quatre domaine : les attaques DDoS, les menaces persistantes avancées, le phishing / spam et les malwares.
SecurityWeek.png 2019-05-23 12:04:01 Moody\'s Downgrades Equifax Outlook to Negative Over 2017 Data Breach (lien direct)

Moody\'s has revised its Equifax outlook from stable to negative, citing the effect of the 2017 data breach. This is the first time that a cybersecurity incident has resulted in a Moody\'s outlook downgrading.

read more

TechRepublic.png 2019-05-23 12:02:03 Replacing JavaScript with WebAssembly: How eBay made a web app 50x faster by switching programming languages (lien direct)

And why JavaScript still has an important role to play.

securityintelligence.png 2019-05-23 12:00:01 In Light of Ever-Increasing Cybersecurity Risks, Boards Must Deepen Their Oversight and Engagement (lien direct)

>In light of a regulatory landscape that is becoming more complex and costly, boards need better insight into the organization\'s risk exposure and its ability to handle cybersecurity risks.

The post In Light of Ever-Increasing Cybersecurity Risks, Boards Must Deepen Their Oversight and Engagement appeared first on Security Intelligence.

WiredThreatLevel.png 2019-05-23 12:00:00 7 Items for Grilling on Your Tiny Apartment\'s Balcony or Roof (lien direct)

For those of us confined to tiny balconies, or even a roof, grilling is a challenge. But it\'s not impossible.

SecurityWeek.png 2019-05-23 11:58:04 5 Things Every SMB Should Know to Strengthen Defenses (lien direct)

You may find it surprising that small businesses make up more than 97% of total businesses in North America, according to the Better Business Bureau (BBB). Given this statistic, I suppose the good news is that fewer than half of all cyberattacks target small businesses. The bad news is that when small/midmarket businesses (SMBs) are attacked, the majority don\'t survive. But this doesn\'t have to be the case.

read more

TechRepublic.png 2019-05-23 11:44:05 How The New York Times moved an old COBOL app to a modern cloud (lien direct)

The NYT IT team chose AWS to run a business-critical app that managed daily home delivery of the newspaper since 1979. Find out why it was worth the bother.

bleepingcomputer.png 2019-05-23 11:44:04 Carders Prefer Audio Skimmers over Less Efficient Flash Skimmers (lien direct)

Although web skimming attacks are rampant these days, the underground market for physical card skimming devices is thriving and changing at the rate of technological advancements. [...]

ZDNet.png 2019-05-23 11:40:05 UK says it warned 16 NATO allies of Russian hacking activities (lien direct)

UK warns of Russian global hacking campaign targeting critical infrastructure and government networks.

WiredThreatLevel.png 2019-05-23 11:00:00 The Pentagon Launched Another Space Agency. Do We Need It? (lien direct)

By going big on small satellites, the new Space Development Agency plans to defend the country against all manner of orbital attacks.

WiredThreatLevel.png 2019-05-23 11:00:00 VW\'s \'Dieselgate\' Settlement Isn\'t Buying Many Electric Vehicles (lien direct)

States were given almost $3 billion from Volkswagen\'s diesel scandal settlement to buy cleaner vehicles. But many are buying more diesels, a report shows.

WiredThreatLevel.png 2019-05-23 11:00:00 Big Tech: Breaking Us Up Will Only Help China (lien direct)

Amid escalating tension with China, executives at Google and Facebook argue that tough regulations against tech will hurt US competitiveness.

bleepingcomputer.png 2019-05-23 10:58:04 Microsoft Defender ATP is Now Publicly Available for Macs (lien direct)

Microsoft Defender ATP for Mac is now publicly available after being tested in a limited preview that started in March. With the release of a Mac endpoint, enterprise customers utilizing Microsoft Defender ATP can now manage the security of Mac computers from a centralized administrative console. [...]

SecurityAffairs.png 2019-05-23 10:55:02 Anonymous and LulzSec target the Italian Police and doctors (lien direct)

In the last 10 days, the collectives of Anonymous and LulzSec continued their operations carrying out several cyber attacks. The main objectives of the attacks carried out by Anonymous and LulzSec ITA were the Italian doctors and the Law enforcement agencies Forces, in particular, the Police and the Carabinieri. They protest against the abuses the […]

The post Anonymous and LulzSec target the Italian Police and doctors appeared first on Security Affairs.

ZDNet.png 2019-05-23 10:43:01 London Underground to begin tracking passengers through Wi-Fi hotspots (lien direct)

TfL says the default data collection will be used to boost customer services.

SecurityWeek.png 2019-05-23 10:30:05 UK Has Warned 16 NATO Allies of Russia Hacking Attempts: Foreign Minister (lien direct)

Britain has shared with 16 NATO allies details of malicious Russian cyber activity in their countries over the last 18 months, foreign minister Jeremy Hunt was to say on Thursday.

read more

DarkReading.png 2019-05-23 10:30:00 Incident Response: 3 Easy Traps & How to Avoid Them (lien direct)

Sage legal advice about navigating a data breach from a troubleshooting cybersecurity outside counsel.

SecurityAffairs.png 2019-05-23 10:17:04 Playing Cat and Mouse: Three Techniques Abused to Avoid Detection (lien direct)

The experts at Yoroi-Cybaze Zlab described three techniques commonly implemented by threat actors to avoid detection. Introduction During our analysis we constantly run into the tricks cyber-attackers use to bypass companies security defences, sometimes advanced, others not. Many times, despite their elegance (or lack of it), these techniques are effective and actually help the cyber […]

The post Playing Cat and Mouse: Three Techniques Abused to Avoid Detection appeared first on Security Affairs.

itsecurityguru.png 2019-05-23 10:12:02 Tufin Extends Its Leadership In Policy-Based Security Automation. (lien direct)

Tufin® (NYSE: TUFN), a company pioneering a policy-centric approach to security and IT operations, today announced the release of Tufin Orchestration Suite R19-1, advancing its leadership in network security automation with the industry\'s first solution to feature policy-based automation for server policy cloning. Enterprises today devote significant time and resources to processing access requests related […]

The post Tufin Extends Its Leadership In Policy-Based Security Automation. appeared first on IT Security Guru.

SecurityAffairs.png 2019-05-23 09:43:04 SandboxEscaper disclosed 3 Microsoft zero-day flaws in 24 hours (lien direct)

Yesterday SandboxEscaper publicly disclosed a Windows zero-day vulnerability, now she disclosed other two unknown issues in less than 24 hours. Just Yesterday, the popular developer SandboxEscaper publicly disclosed a Windows zero-day vulnerability in the Task Manager, now in less than 24 hours the revealed two more unpatched Microsoft zero-day flaws. The two new zero-day issues […]

The post SandboxEscaper disclosed 3 Microsoft zero-day flaws in 24 hours appeared first on Security Affairs.

ZDNet.png 2019-05-23 09:33:01 Bestmixer seized by police for washing $200 million in tainted cryptocurrency clean (lien direct)

Bestmixer.io was known for \'washing\' cryptocurrency to make the funds untraceable.

ESET.png 2019-05-23 09:30:04 Fake cryptocurrency apps crop up on Google Play as bitcoin price rises (lien direct)

>ESET researchers have analyzed fake cryptocurrency wallets emerging on Google Play at the time of bitcoin\'s renewed growth

The post Fake cryptocurrency apps crop up on Google Play as bitcoin price rises appeared first on WeLiveSecurity

Pirate.png 2019-05-23 09:12:00 Cybermenace sur les élections : quelles mesures les DSI européennes, nationales et locales doivent prendre pour sécuriser les scrutins ? (lien direct)
À l\'approche des élections européennes, qui se tiendront le 26 mai dans l\'Hexagone, toute l\'Europe doit se préparer à un degré de cybermenace encore inédit.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21

Information mise à jours le: 2019-05-27 08:01:36
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Notre RSS (filtré) Twitter