What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
TechRepublic.png 2019-01-16 16:56:02 iOS dominates the corporate mobile device world (lien direct)

Developers looking to make a splash in enterprise mobile device platforms should stay far away from BlackBerry, according to a Piper Jaffray report.

no_ico.png 2019-01-16 16:52:05 Ransomware Attempts To Include PayPal Phish With Ransom Note (lien direct)

In an evolution of the usual infection, a new ransomware has beendiscoveredthat not only encrypts your files, but also tries to steal your PayPal credentials with an included phishing page. The ransomware itself is nothing special, but the ransom note is clever as it not only tries to steal your money through a normal bitcoin …

The ISBuzz Post: This Post Ransomware Attempts To Include PayPal Phish With Ransom Note appeared first on Information Security Buzz.

TechRepublic.png 2019-01-16 16:52:05 Top 5 terms to know about 5G (lien direct)

Tom Merritt shares five helpful definitions for a better understanding of 5G technology.

TechRepublic.png 2019-01-16 16:51:00 To stay competitive, MSSPs need to grow and evolve (lien direct)

​Managed Security Service Providers can alleviate many of the headaches suffered by in-house security, but they need to remain nimble and focused to retain their edge.

Kaspersky.png 2019-01-16 16:47:02 U.S. Issues Multiple Charges For 2016 SEC Hack (lien direct)

The two were able to hack into the SEC\'s computer systems due to phishing attacks that stole credentials and spread malware.

itsecurityguru.png 2019-01-16 16:40:02 F5 Networks – State Of Application Services Report. (lien direct)

F5 Networks (NASDAQ: FFIV) today unveiled the results of its 2019 State of Application Services (SOAS) report1. Now in its fifth year, the only global report of its kind reveals a fast-changing application landscape trending towards automation, cloud-centricity, as well as an increased receptivity to digitally-driven business innovation. It also highlights the most up-to-date operational […]

The post F5 Networks – State Of Application Services Report. appeared first on IT Security Guru.

itsecurityguru.png 2019-01-16 16:40:02 ExtraHop Blows Past The $100 Million Milestone Fuelled By 10x Growth In Security. (lien direct)

ExtraHop, provider of enterprise cyber analytics from the inside out, today announced that it far surpassed $100 million in bookings – a key industry milestone – in 2018, bolstered by 10x growth in cybersecurity in the second half of the year. The company continued to dominate major verticals including retail, healthcare, and financial services, where […]

The post ExtraHop Blows Past The $100 Million Milestone Fuelled By 10x Growth In Security. appeared first on IT Security Guru.

itsecurityguru.png 2019-01-16 16:40:02 Is AI The Antidote To The Cybersecurity Minefield? (lien direct)

Artificial Intelligence (AI) isn\'t going anywhere anytime soon. With 20% of the C-suite already using machine learning and 41% of consumers believing that AI will improve their lives, wide scale adoption is imminent across every industry – and cybersecurity is no exception. A lot has changed in the cyber landscape over the past few years […]

The post Is AI The Antidote To The Cybersecurity Minefield? appeared first on IT Security Guru.

itsecurityguru.png 2019-01-16 16:40:02 Pulse Secure Launches New vADC Community Edition To Help Developers Build Smarter Applications For Container And Cloud Platforms. (lien direct)

Pulse Secure, the leading provider of Secure Access solutions to both enterprises and service providers, today announced the launch of a new Community Edition of its powerful software-based virtual Application Delivery Controller (vADC) to help application developers create innovative application solutions with dramatically lower costs and time to market. Pulse vADC Community Edition integrates easily […]

The post Pulse Secure Launches New vADC Community Edition To Help Developers Build Smarter Applications For Container And Cloud Platforms. appeared first on IT Security Guru.

itsecurityguru.png 2019-01-16 16:40:02 Politicised Cyber-Attacks, Mobile Roaming And Software Security: Brexit Predictions From Tech Leaders. (lien direct)

Following events in Westminster yesterday, senior leaders from global businesses NETSCOUT, BICS and Sonatype share their thoughts on how Brexit will impact technology, from cyber-attacks and software security challenges, to the return of mobile roaming fees. Could Roaming Return? “Following the rejection of the Government\'s Brexit bill, and in the event of a \'no deal\' […]

The post Politicised Cyber-Attacks, Mobile Roaming And Software Security: Brexit Predictions From Tech Leaders. appeared first on IT Security Guru.

bleepingcomputer.png 2019-01-16 16:30:00 Bipartisan Bill Introduced to Ban Sale of US Tech to Chinese Companies (lien direct)

Bipartisan Telecommunications Denial Order Enforcement Act (H.R. 7255) was introduced today to impose a ban on selling US technology to Huawei and ZTE, as well as other Chinese companies in violation of sanctions laws and export control. [...]

DarkReading.png 2019-01-16 16:30:00 Oklahoma Data Leak Compromises Years of FBI Data (lien direct)

The Oklahoma Securities Commission accidentally leaked 3 TB of information, including data on years of FBI investigations.

TechRepublic.png 2019-01-16 16:25:04 Microsoft fixes Windows 10\'s Wi-Fi hotspot problems and closes app snooping loophole (lien direct)

The flaws and a tranche of others were resolved by three bundles of updates for Windows 10 that were pushed out yesterday.

Kaspersky.png 2019-01-16 16:16:05 Fortnite Hacked Via Insecure Single Sign-On (lien direct)

Leaky Fortnite single sign-on mechanism could have allowed hackers to access game accounts.

bleepingcomputer.png 2019-01-16 16:09:04 Windows 10 19H1 Update Splits Up Windows Search and Cortana (lien direct)

Windows 10 19H1 which is supposed to launch in April 2019 will finally split up Windows Search and Cortana to offer the best search and voice-first digital assistant experience. [...]

itsecurityguru.png 2019-01-16 15:52:01 Blue Planet Networks Appoints Steve Corfe As Its CEO. (lien direct)

Blue Planet Networks, a leading Carrier-Grade Internet Connectivity Provider, has appointed Steve Corfe as its CEO to accelerate the growth of its Carrier-Grade Internet offering to the Service Provider community. The appointment marks a new phase of growth for Blue Planet Networks as it enables partners to address growing demand for Internet connectivity to enterprise […]

The post Blue Planet Networks Appoints Steve Corfe As Its CEO. appeared first on IT Security Guru.

itsecurityguru.png 2019-01-16 15:51:01 Disclosure of Chilean Redbanc Intrusion Leads To Lazarus Ties. (lien direct)

By Vitali Kremez, Director of Research, Flashpoint Flashpoint analysts believe that the ​recently disclosed intrusion​ suffered in December 2018 by Chilean interbank network Redbanc involved PowerRatankba, a malware toolkit with ties to North Korea-linked advanced persistent threat (APT) group Lazarus. Redbanc confirmed that the malware was installed on the company\'s corporate network without triggering antivirus […]

The post Disclosure of Chilean Redbanc Intrusion Leads To Lazarus Ties. appeared first on IT Security Guru.

bleepingcomputer.png 2019-01-16 15:39:03 Microsoft and VirusTotal Team Up to Detect Malicious Signed MSI Files (lien direct)

Microsoft and Chronicle\'s VirusTotal have teamed up to better detect signed MSI files that have been modified to include malicious Java archives.  [...]

WiredThreatLevel.png 2019-01-16 15:36:04 Most Users Still Don\'t Know How Facebook Advertising Works (lien direct)

A new Pew survey also finds that more than 50 percent of Facebook users are uncomfortable with how the company compiles their information for ads.

Blog.png 2019-01-16 15:32:05 Koadic – COM Command & Control Framework (lien direct)

Hello friends!! In this article we are introducing another most interesting tool “KOADIC – COM Command & Control” tool which is quite similar to Metasploit and Powershell Empire. So let\'s began with its tutorial and check its functionality. Table of Content Introduction to Koadic Installation of Koadic Usage of Koaidc Koadic Stagers Privilege Escalation with... Continue reading

The post Koadic – COM Command & Control Framework appeared first on Hacking Articles.

TechRepublic.png 2019-01-16 15:25:00 Top 10 app vulnerabilities: Unpatched plugins and extensions dominate (lien direct)

Despite the existence of patches, the proliferation of unpatched installations are enticing targets for malicious actors, according to a WhiteHat report.

TechRepublic.png 2019-01-16 15:16:03 Why 41% of IT hiring managers say finding tech talent is becoming harder (lien direct)

Some 80% of tech and engineering managers report a gap between available technical talent and the type of talent they need, according to Modis.

Kaspersky.png 2019-01-16 15:11:02 Magecart Returns with Advertising Library Tactic (lien direct)

The threat group also has a new subsidiary, Magecart Group 12.

WiredThreatLevel.png 2019-01-16 15:00:00 The Dutch Science Park Unlocking the Secrets of the Universe (lien direct)

For his book Universe, photographer Jos Jansen documented a neutrino-detecting orb, data visualizations, and other ambitious projects in the Netherlands.

WiredThreatLevel.png 2019-01-16 15:00:00 Best Skiing and Snowboarding Gear (2019): Jackets, Boots, and More (lien direct)

From custom skis to the ultimate in-bounds backpack, everything you need to make the most of powder days.

ESET.png 2019-01-16 14:59:04 Car and almost $1m on offer for Tesla Model 3 hacks (lien direct)

>The electric car maker is raising the ante in automotive security, putting one of its swanky models as a target at a hacking contest

The post Car and almost $1m on offer for Tesla Model 3 hacks appeared first on WeLiveSecurity

Korben.png 2019-01-16 14:45:04 GameHub – Un soft sous Linux pour unifier votre bibliothèque de jeux (lien direct)

Si vous êtes sous Linux et que vous aimez jouer, voici GameHub, une application permettant de centraliser dans une bibliothèque tous vos jeux en provenance de Steam, GoG, Humble Bundle, Humble Trove ainsi que les jeux installés de manière indépendante en local. Grâce à GameHub, vous pourrez d’un seul coup … Suite

TechRepublic.png 2019-01-16 14:44:00 Why 83% of enterprises will increase tech investments this year (lien direct)

Digital transformation investment accounts for the majority of businesses\' profitability, according to a DXC Technology report.

bleepingcomputer.png 2019-01-16 14:40:04 Windows 10 Insider Build 18317 Released and Breaks WSL Again (lien direct)

The latest update to Windows 10 19H1 separates Cortana from search, improves the Windows Insider page and also focuses on Start Menu reliability. [...]

ZDNet.png 2019-01-16 14:09:00 Advertising network compromised to deliver credit card stealing code (lien direct)

Hundreds of online stores confirmed to be impacted, thousands of more under investigation.

bleepingcomputer.png 2019-01-16 14:03:03 EU Copyright Directive to Turn Google into Ghost Town (lien direct)

Google\'s search results will look like a deserted town according to the search giant, with no article titles, no images, and no news summaries if the SERP templates following the EU Copyright Directive provisions will go live [...]

WiredThreatLevel.png 2019-01-16 14:00:00 A \'Fortnite\' Vulnerability Exposed Accounts to Takeover (lien direct)

Epic Games has since patched the attack, which would have allowed attackers to view account info, listen in on in-game conversations, and more.

WiredThreatLevel.png 2019-01-16 14:00:00 For Nervous Californians, Fire-Proofing Is a New Obsession (lien direct)

In wildfire-prone cities and towns, increasingly worried residents are banding together to prevent future disasters.

Kaspersky.png 2019-01-16 14:00:00 VOIPO Database Exposes Millions of Texts, Call Logs (lien direct)

VOIPO acknowledged that a development server had been accidentally left publicly accessible, and took the server offline.

WiredThreatLevel.png 2019-01-16 14:00:00 8 Best Travel Coffee Mugs (2019): Insulated, Steel, Thermal (lien direct)

From classics like Zojirushii, Yeti, and Stanley to new mugs from OtterBox and Snow Peak, I tried a ton of travel tumblers this winter. These are the best.

SecurityAffairs.png 2019-01-16 13:57:05 I swiped right, Viewing sensitive data cached in your Safari browser. (lien direct)

By using multi-gesture trackpad along with Safari browser in MacBook Pro, one can view sensitive data which is cached in your Safari browser. (Note: This is not a back button browsing vulnerability) I figured out this issue while playing around with Safari browser, looks like the most recent activity of any authenticated or un-authenticated website is stored in […]

The post I swiped right, Viewing sensitive data cached in your Safari browser. appeared first on Security Affairs.

securityintelligence.png 2019-01-16 13:55:01 Stay Ahead of the Growing Security Analytics Market With These Best Practices (lien direct)

>Armed with security analytics tools, organizations can benefit from big data capabilities to analyze data and enhance detection with proactive alerts about potential malicious activity.

The post Stay Ahead of the Growing Security Analytics Market With These Best Practices appeared first on Security Intelligence.

TechRepublic.png 2019-01-16 13:34:05 Two-thirds of US tech workers make over $100K per year (lien direct)

IT employees in the US earn higher salaries than those in any other nation, according to a Puppet report.

ZDNet.png 2019-01-16 13:34:03 VOIPO database exposed millions of call and SMS logs, system data (lien direct)

The database was used for development purposes but the data on offer to the public was valid.

SecurityAffairs.png 2019-01-16 13:16:05 Multiple Fortnite flaws allowed experts to takeover players\' accounts (lien direct)

Security researchers at Check Point have discovered several flaws in the popular game Fortnite that could be exploited to takeover gamers’account. Security experts at Check Point discovered several issues in the popular online battle game Fortnite. One of the flaws is an OAuth account takeover vulnerability that could have allowed a remote attacker to takeover […]

The post Multiple Fortnite flaws allowed experts to takeover players’ accounts appeared first on Security Affairs.

TechRepublic.png 2019-01-16 13:03:02 These companies are hiring the most remote workers in 2019 (lien direct)

The tech industry is singled out by FlexJobs as being especially willing to offer opportunities to work outside of an office.

WiredThreatLevel.png 2019-01-16 13:00:00 A Floating Glass Bead Could Help Physicists Probe the Unknown (lien direct)

New tabletop sensors could be sensitive enough to glimpse gravitational waves and even dark matter particles.

WiredThreatLevel.png 2019-01-16 13:00:00 A Poker-Playing Robot Goes to Work for the Pentagon (lien direct)

A bot trained to beat poker stars could offer strategic lessons to generals simulating a future war.

Pirate.png 2019-01-16 12:37:02 Fortnite : Les chercheurs de Check Point dévoilent une série de failles de sécurité (lien direct)
Check Point dévoile des failles sur les profils, les données et les moyens de paiement des utilisateurs de Fortnite. Les vulnérabilités identifiées permettraient aux pirates de déclencher leur propre " battle royale " contre les joueurs.
Pirate.png 2019-01-16 12:32:00 Déployer un SD-WAN : comment éviter les pièges (lien direct)
Les entreprises multisites sont toutes soumises aux mêmes contraintes : elles doivent s\'assurer que chacun de leurs bureaux bénéficie des performances réseau nécessaires pour utiliser efficacement la voix sur IP, la vidéo et les applications critiques.
Pirate.png 2019-01-16 12:27:02 Sécurité et risques du monde digital : une situation explosive (lien direct)
Alors que l\'univers du numérique évolue à la vitesse de la lumière, le domaine de la sécurité semble être resté à l\'âge de pierre.
ZDNet.png 2019-01-16 12:19:00 NanoCore Trojan is protected in memory from being killed off (lien direct)

If you are infected with this malware, you might find it is more difficult to eradicate than standard Trojans.

Pirate.png 2019-01-16 12:17:04 Se former en cybersécurité – Kaspersky Lab lance un programme automatisé, pour faciliter l\'apprentissage (lien direct)
A une semaine du Forum International sur la Cybersécurité, la société Kaspersky Lab revient sur le principal maillon faible de la sécurité des entreprises : l\'humain.
The_State_of_Security.png 2019-01-16 12:15:04 Two Ukrainians Charged with Plot to Hack into SEC and Commit Fraud (lien direct)

The U.S. Department of Justice (DOJ) has charged two Ukrainians with participating in a plot to hack into computers systems at the U.S. Securities and Exchange Commission (SEC) and use the information they stole to commit fraud. On 15 January, the U.S. Attorney’s Office for the District of New Jersey announced a 16-count indictment charging […]… Read More

The post Two Ukrainians Charged with Plot to Hack into SEC and Commit Fraud appeared first on The State of Security.

bleepingcomputer.png 2019-01-16 12:02:05 Over 140 International Airlines Affected by Major Security Breach (lien direct)

Potential attackers could view and change private information in flight bookings made by millions of customers of major international airlines because of a security issue in the Amadeus online booking system [...]

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21

Information mise à jours le: 2019-01-19 06:03:28
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Notre RSS (filtré) Twitter