What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
bleepingcomputer.png 2019-05-23 08:32:05 Google Under GDPR Probe After Ad Exchange Privacy Complaint (lien direct)

The Irish Data Protection Commission (DPC) announced that it started investigating if Google\'s processing of personal data collected by the company as part of Ad Exchange online advertising transactions is breaching GDPR regulations. [...]

WiredThreatLevel.png 2019-05-23 08:30:00 GitHub \'Sponsors\' Now Lets Users Back Open Source Projects (lien direct)

GitHub\'s new Patreon-like service aims to reward developers for maintaining free software, and bolster the open source ecosystem.

Pirate.png 2019-05-23 08:27:02 Etat des lieux de la cybersécurité des technologies opérationnelles (OT) (lien direct)
Les technologies opérationnelles (OT) désignent le matériel et les logiciels utilisés pour exploiter les systèmes de contrôle industriels (ICS), tels que les systèmes SCADA.
TechRepublic.png 2019-05-23 07:47:00 GDPR: A cheat sheet (lien direct)

Enforcement of the EU General Data Protection Regulation (GDPR) applies to any company that transacts with European Union citizens. Here\'s your GDPR go-to guide.

CSO.png 2019-05-23 07:25:00 BrandPost: Threat Intelligence and the Evolving Threat Landscape (lien direct)

As organizations continue to adopt and drive digital transformation (DX), staying ahead of the threat landscape and attack chain curves is becoming increasingly difficult to achieve. Today, rather than having a single network to secure, most organizations now own and manage a variety of environments, including physical networks, private cloud and virtual SDN environments, multiple public clouds, an expanding WAN edge, IT/OT convergence, and an increasingly mobile workforce.

This also includes things like ongoing DevOps application development, containerized environments, and the adoption of IaaS and SaaS solutions-including Shadow IT. And given the advent of more deeply integrated solutions, such as smart cars, companies, and cities, and the looming launch of 5G and the myriad of new immersive applications and rich media sources that will result from that, the impact of DX seems to stretch out over the horizon.

To read this article in full, please click here

ZDNet.png 2019-05-23 07:20:05 TalkTalk customer bank details found through Google search (lien direct)

A Google query was all it took to find the data of 4,500 customers -- none of whom were informed about the leak.

The_Hackers_News.png 2019-05-23 06:41:01 5 Cybersecurity Tools Every Business Needs to Know (lien direct)

Cybersecurity experts all echo the same thing – cyber attacks are going to get more rampant, and they will continue to pose severe threats against all technology users. Businesses, in particular, have become prime targets for cybercriminals due to the nature of data and information they process and store. 2018 saw a slew of data breaches targeting large enterprises that resulted in the theft

bleepingcomputer.png 2019-05-23 03:30:00 PoC Exploits Released for Two More Windows Vulnerabilities (lien direct)

Right on the heels of a privilege escalation zero-day vulnerability for Windows 10 released yesterday, the same researcher has released two more zero-day vulnerabilities [...]

The_Hackers_News.png 2019-05-23 02:18:03 Tor Browser for Android - First Official App Released On Play Store (lien direct)

Wohooo! Great news for privacy-focused users. Tor Browser, the most popular privacy-focused browser, for Android is finally out of beta, and the first stable version has now arrived on Google Play Store for anyone to download. The Tor Project announced Tuesday the first official stable release of its ultra-secure internet browser for Android devices, Tor Browser 8.5-which you can now

SecurityWeek.png 2019-05-23 00:59:04 Amazon Shareholders Support Selling Face Recognition Tech to Police (lien direct)

Amazon on Wednesday confirmed that shareholders rejected proposals to prohibit sales of facial recognition technology to governments and study how it might threaten privacy or civil rights.

read more

WiredThreatLevel.png 2019-05-23 00:26:00 Las Vegas Orders Up a Boring Company Loop (lien direct)

Which means Elon Musk\'s “mass transit” tunneling company has its first official customer.

The_Hackers_News.png 2019-05-23 00:00:01 Hacker Disclosed 3 Unpatched Microsoft Zero-Day Exploits In Less Than 24 Hours (lien direct)

Less than 24 hours after publicly disclosing an unpatched zero-day vulnerability in Windows 10, the anonymous hacker going by online alias "SandboxEscaper" has now dropped new exploits for two more unpatched Microsoft zero-day vulnerabilities. The two new zero-day vulnerabilities affect Microsoft\'s Windows Error Reporting service and Internet Explorer 11. Just yesterday, while releasing a

ZDNet.png 2019-05-22 23:52:03 DNS Flag Day 2020: DNS servers must support both UDP and TCP queries (lien direct)

Industry group wants to make DNS over TCP support mandatory.

WiredThreatLevel.png 2019-05-22 22:58:05 A Critical Hit to Huawei, the Student Space Race, and More News (lien direct)

Catch up on the most important news from today in two minutes or less.

SecurityAffairs.png 2019-05-22 22:10:02 Emsisoft released a free Decrypter for the GetCrypt ransomware (lien direct)

For the second time in a few days, experts at Emsisoft released a free decrypter, this time to help victims of the GetCrypt ransomware. Security experts at Emsisoft released a new decrypted in a few days, it could be used for free by victims of the GetCrypt ransomware to decrypt their files encrypted by the malware. The […]

The post Emsisoft released a free Decrypter for the GetCrypt ransomware appeared first on Security Affairs.

TechRepublic.png 2019-05-22 21:47:03 Top 5 delivery robots (lien direct)

In the future, robots might handle all of our deliveries. Tom Merritt looks at five companies that are developing autonomous delivery services.

SecurityAffairs.png 2019-05-22 20:55:03 ActiveX Controls in South Korean websites are affected by critical flaws (lien direct)

Security experts discovered tens of critical vulnerabilities were found in 10 South Korean ActiveX controls as part of a short research project. Security researchers at Risk Based Security have discovered tens of critical vulnerabilities in 10 South Korean ActiveX controls as part of a research project. The experts discovered that many South Korean websites still […]

The post ActiveX Controls in South Korean websites are affected by critical flaws appeared first on Security Affairs.

Blog.png 2019-05-22 20:49:05 DHS Warns That Drones Made in China Could Steal U.S. Data (lien direct)

The Department of Homeland Security is warning U.S. firms that drones made in China may be spying on them and sending sensitive data to the Chinese government.

The post DHS Warns That Drones Made in China Could Steal U.S. Data appeared first on The Security Ledger.

-->
WiredThreatLevel.png 2019-05-22 20:46:02 Facial Recognition Has Already Reached Its Breaking Point (lien direct)

Facial recognition technology has proliferated unchecked in the US so far. Congress finally seems ready to do something about it.

ZDNet.png 2019-05-22 19:57:00 Two more Microsoft zero-days uploaded on GitHub (lien direct)

SandboxEscaper has now published seven zero-days in Microsoft products; two more to come.

Chercheur.png 2019-05-22 19:26:00 Legal Threats Make Powerful Phishing Lures (lien direct)

Some of the most convincing email phishing and malware attacks come disguised as nastygrams from a law firm. Such scams typically notify the recipient that he/she is being sued, and instruct them to review the attached file and respond within a few days -- or else. Here\'s a look at a recent spam campaign that peppered more than 100,000 business email addresses with fake legal threats harboring malware.

DarkReading.png 2019-05-22 19:15:00 Alphabet\'s Chronicle Explores Code-Signing Abuse in the Wild (lien direct)

A new analysis highlights the prevalence of malware signed by certificate authorities and the problems with trust-based security.

grahamcluley.png 2019-05-22 19:13:02 Fingerprinting iPhones with the built-in gyroscope (lien direct)

Some rather ingenious researchers have found a way to unique identify iPhones and iPads by examining data gathered from a device’s accelerometer, gyroscope and magnetometer sensors.

WiredThreatLevel.png 2019-05-22 18:55:04 Judge Finds Qualcomm\'s Pricing Policy Violates Antitrust Law (lien direct)

The US joins China, the European Union, and South Korea, in ruling that Qualcomm violated laws in how it licenses its smartphone chips.

WiredThreatLevel.png 2019-05-22 18:45:05 Social Issues Raised by Amazon Investors Aren\'t Going Away (lien direct)

Amazon\'s shareholder resolutions on climate change and facial recognition technology didn\'t pass. Here\'s why they matter anyway.

bleepingcomputer.png 2019-05-22 18:35:04 Google Tracks Purchases For Paying G Suite Users, Doesn\'t Show It (lien direct)

Google is also tracking all purchases made by G Suite users just as is it happens for users of the free Gmail email service, although the Google Account\'s Purchases page will not list them for review for the paid accounts. [...]

ESET.png 2019-05-22 17:41:03 Patch now! Why the BlueKeep vulnerability is a big deal (lien direct)

What you need to know about the critical security hole that could enable the next WannaCryptor

SecurityWeek.png 2019-05-22 17:38:01 GDPR: One Year Down…Now What? (lien direct)

On May 25, 2018 the General Data Protection Regulation came into law for European Union countries, created to protect data relating to E.U. citizens, ensuring the right to know what is being stored, where and why. 

read more

Blog.png 2019-05-22 17:23:04 unknowndevice64 v2.0: Vulnhub Walkthrough (lien direct)

Today we are going to take on another boot2root challenge “uknowndevice64 v2.0” by Ajay Verma. Our goal is to get root and read flag.txt with at least two different ways. Download it from here: //download.vulnhub.com/unknowndevice64/unknowndevice64-V2.0.ova Difficulty: Beginner Penetrating Methodology: Scanning Netdiscover NMAP Enumeration Web Directory search  Credential harvesting Exploiting SSH login (1st Method) ADB login... Continue reading

The post unknowndevice64 v2.0: Vulnhub Walkthrough appeared first on Hacking Articles.

Blog.png 2019-05-22 17:10:02 Silky-CTF: 0x01: Vulnhub Walkthrough (lien direct)

Today we will be solving a boot2root lab from Vulnhub called SILKY-1. This lab, like many others, is a good way to keep your penetration testing skills sharp while getting some variety. Download it from here: https://www.vulnhub.com/series/silky-ctf,207/ Level: Easy-Intermediate Task: Boot to Root (flag.txt) Penetration Methodologies Scanning Netdiscover Nmap Enumeration Web Spreading txt Generating Password... Continue reading

The post Silky-CTF: 0x01: Vulnhub Walkthrough appeared first on Hacking Articles.

WiredThreatLevel.png 2019-05-22 17:00:00 Scientists Go Back in Time to Find More Troubling News About Earth\'s Oceans (lien direct)

A clever study finds communities of foraminifera, a hard-shelled kind of plankton, have transformed dramatically since the Industrial Revolution.

WiredThreatLevel.png 2019-05-22 17:00:00 A Rocket Built by Students Reached Space for the First Time (lien direct)

A USC team won the collegiate space race by sending a rocket above the Kármán line, the imaginary boundary that marks the end of Earth\'s atmosphere.

ZDNet.png 2019-05-22 16:44:00 Android and iOS devices impacted by new sensor calibration attack (lien direct)

SensorID technique can track users across apps and websites using sensor calibration data.

WiredThreatLevel.png 2019-05-22 16:33:05 If Huawei Loses ARM\'s Chip Designs, It\'s Toast (lien direct)

ARM designs the chips that power everything from smartphones to data centers. Without it, Huawei has few good options.

SecurityWeek.png 2019-05-22 16:31:05 Attackers Could Use Mobile Device Sensors to Generate Unique Device Fingerprint: Research (lien direct)

Researchers at Cambridge University have determined that attackers could use the built-in motion sensors in mobile devices to generate a unique device fingerprint.

read more

MalwarebytesLabs.png 2019-05-22 16:10:01 Governments increasingly eye social media meltdown (lien direct) It seems problems never quite go away for social media platforms, and more governments of the world are taking keen interest. Will the tech giants be able to sort things out before legislators steps into the fray?

Categories:

Cybercrime Privacy

Tags:

(Read more...)

The post Governments increasingly eye social media meltdown appeared first on Malwarebytes Labs.

WiredThreatLevel.png 2019-05-22 16:09:02 Logan Broadbent Shows Us How to Throw a Boomerang Like a Pro (lien direct)

A world champion thrower explains how a boomerang flies, and how to augment its performance.

Blog.png 2019-05-22 16:08:03 GUEST ESSAY: Dear America, Facebook is an addictive digital drug of little productive value (lien direct)

Social media consumers are getting wise to the joke that when the product is free, they\'re the ones being sold. But despite the growing threat of consumer exploitation, Washington still shrinks from confronting our social media giants. Why? Because the social giants have convinced the chattering class that America simply can\'t do without them. Confront […]

SecurityWeek.png 2019-05-22 15:47:05 Critical Vulnerabilities Plague South Korean ActiveX Controls (lien direct)

Tens of very basic but Critical vulnerabilities were found in 10 South Korean ActiveX controls as part of a short research project, security researchers with Risk Based Security say. 

read more

SecurityWeek.png 2019-05-22 15:43:03 LinkedIn Allowed TLS Certificate to Expire-Again (lien direct)

Microsoft-owned social media giant LinkedIn has once again put user data and privacy at risk by allowing a TLS certificate to expire.

read more

TechRepublic.png 2019-05-22 15:42:00 Tech news roundup: GDPR turns 1, and who makes the best apps? (lien direct)

Karen Roby reports on this week\'s biggest tech news, including Huawei\'s Android license and the one year anniversary of GDPR. How have businesses been affected by the legislation and what does Microsoft have to say about a potential version of the law in the US?

TechRepublic.png 2019-05-22 15:34:05 More users worldwide are refusing to share location data with apps (lien direct)

The Airship report looked at mobile app user permissions for 700 million people across the globe.

SecurityWeek.png 2019-05-22 15:34:00 Magecart Skimmer Poses as Payment Service Provider (lien direct)

The skimmer used in a recently discovered Magecart attack on a Magento-based e-commerce website was posing as a payment service provider via a rogue iframe, Malwarebytes reports.

read more

bleepingcomputer.png 2019-05-22 15:24:03 GetCrypt Ransomware Brute Forces Credentials, Decryptor Released (lien direct)

A new ransomware called GetCrypt is being installed via the RIG exploit kit. While encrypting a computer it will try to brute force the network credentials of unmapped network shares. [...]

SecurityWeek.png 2019-05-22 15:22:03 One Year On, EU Has 145,000 Data Law Complaints (lien direct)

One year after the entry into force of landmark EU rules to better protect personal data, nearly 145,000 complaints have been registered, an initial assessment revealed on Wednesday.

read more

SecurityWeek.png 2019-05-22 15:14:02 No Root Password for 20% of Popular Docker Containers (lien direct)

An analysis of 1,000 popular Docker containers revealed that nearly 20% of them have nulled root passwords, Kenna Security says. 

read more

TechRepublic.png 2019-05-22 15:13:02 How to activate and use the built-in Windows 10 back-up feature (lien direct)

Criminal activity targeting personal computers continues to grow at an alarming rate. Even the most basic of back-up systems can prevent future headaches.

mcafee.png 2019-05-22 14:57:04 Cryptocurrency Laundering Service, BestMixer.io, Taken Down by Law Enforcement (lien direct)

A much overlooked but essential part in financially motivated (cyber)crime is making sure that the origins of criminal funds are obfuscated or made to appear legitimate, a process known as money laundering. \'Cleaning\' money in this way allows the criminal to spend their loot with less chance of being caught. In the physical world, for […]

The post Cryptocurrency Laundering Service, BestMixer.io, Taken Down by Law Enforcement appeared first on McAfee Blogs.

TechRepublic.png 2019-05-22 14:53:01 How to set your default calendar for Google Assistant (lien direct)

If you want to use Google Assistant to create events to a specific calendar, you\'ll have to make a quick change in the settings.

TechRepublic.png 2019-05-22 14:51:02 Sony Mobile effectively exiting US market amid slowing sales of smartphones (lien direct)

Sony\'s new CEO Kenichiro Yoshida calls the loss-making division "indispensable," though half-hearted efforts in the US and struggles in carrier partnerships made Sony a minority player stateside.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21

Information mise à jours le: 2019-05-27 08:01:36
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Notre RSS (filtré) Twitter