What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
TechRepublic.png 2019-09-18 23:31:03 How to change Windows 10 toast notifications into balloon notifications (lien direct)

With a subtle manual edit of a specific Windows 10 configuration setting, it is possible to change modern toast-style system notifications into old-fashioned balloon notifications.

TechRepublic.png 2019-09-18 23:16:32 How to create a data backup plan using AWS Backup (lien direct)

Secure backup of vital data is a necessity in business. With cloud computing services like AWS Backup, businesses can contract for fast, reliable backup services on an as-needed basis.

grahamcluley.png 2019-09-18 23:04:47 Smashing Security 146: Password secrets and baking brownies (lien direct)

In the latest edition of the “Smashing Security” podcast, hosted by computer security veterans Graham Cluley and Carole Theriault, Carole has suffered an injury, we journey back in time to one of our earliest episodes to discuss the perils of passwords, and Rachael Stockton from LastPass drops by for a chat.

WiredThreatLevel.png 2019-09-18 23:00:47 An Area 51 Warning, Trump Takes on California, and More News (lien direct)

Catch up on the most important news from today in two minutes or less.

ZDNet.png 2019-09-18 22:31:38 GitHub security alerts now support PHP projects (lien direct)

GitHub is now also a CVE CNA and can issue its own CVE numbers for bugs disclosed in projects hosted on the platform.

WiredThreatLevel.png 2019-09-18 21:41:59 On Roku and Amazon Fire TV, Channels Are Watching You (lien direct)

New research shows that over 2,000 streaming apps track information about your devices-even when you tell them not to.

TechRepublic.png 2019-09-18 20:56:43 How to edit and update your Slack profile (lien direct)

Help inform your fellow Slack collaborators who you are, what you do, and how they can contact you by editing your workspace profile.

WiredThreatLevel.png 2019-09-18 20:42:48 The Fight Over California\'s Emissions Rules Just Got Real (lien direct)

The Trump administration plans to revoke California\'s authority to set regulations for vehicle fuel economy and emissions, likely setting up a court fight.

SecureMac.png 2019-09-18 20:39:03 iOS 13 security and privacy features (lien direct)

It\'s official: iOS 13 is here, come friday. iPhone users will be able to try out all the new features announced at the WWDC keynote in June: Dark Mode, QuickPath swipe typing, a revamped Maps, and more.

In addition to all of this, iOS 13 also offers a number of security and privacy enhancements- some of which are already making waves. We\'ll take you through the most important of these ...

The post iOS 13 security and privacy features appeared first on SecureMac.

SecurityAffairs.png 2019-09-18 20:37:33 More than 737 million medical radiological images found on open PACS servers (lien direct)

Researchers at Greenbone Networks vulnerability analysis and management company discovered 400 Million medical radiological images exposed online via unsecured PACS servers. The experts at Greenbone Networks vulnerability analysis and management company discovered 600 unprotected servers exposed online that contained medical radiological images. The research was conducted between mid-July 2019 and early September 2019. The unprotected […]

The post More than 737 million medical radiological images found on open PACS servers appeared first on Security Affairs.

Vulnerability
ZDNet.png 2019-09-18 19:47:47 Windows Defender malware scans are failing after a few seconds (lien direct)

Windows Defender "Quick" and "Full" scans stop after a few files and a few seconds.

Malware
bleepingcomputer.png 2019-09-18 19:33:17 Microsoft Acquires Semmle, GitHub Now a CVE Numbering Authority (lien direct)

Microsoft subsidiary GitHub announced today that it has become a CVE Numbering Authority and that it completed its acquisition of Semmle code-analysis platform. [...]

no_ico.png 2019-09-18 19:22:05 Experts Comments Linux Malware (Skidmap) Illicit Cryptocurrency Mining (lien direct)

As part of our experts’ comment series, please find below comments from security experts on Linux malware (Skidmap) disguising itself on infected machines for the purpose of unlawful cryptocurrency mining,   BREAKING NEWS: Skidmap, a Linux malware, now mines crypto on your computer in complete stealth. This virus also gives complete backdoor access to the hackers as …

The ISBuzz Post: This Post Experts Comments Linux Malware (Skidmap) Illicit Cryptocurrency Mining appeared first on Information Security Buzz.

Malware
Chercheur.png 2019-09-18 18:53:16 Before He Spammed You, this Sly Prince Stalked Your Mailbox (lien direct)

A reader forwarded what he briefly imagined might be a bold, if potentially costly, innovation on the old Nigerian prince scam that asks for help squirreling away millions in unclaimed fortune: it was sent via the U.S. Postal Service, with a postmarked stamp and everything. In truth these "advance fee" or "419" scams- - so-called because they violate section 419 of the criminal code of Nigeria where many such lures originate -- predate email and have circulated via postal mail in various forms and countries over the years.

SecurityWeek.png 2019-09-18 18:51:08 Acronis Worth Over $1 Billion After Raising $147 Million (lien direct)

Acronis on Wednesday announced that it raised $147 million. With this funding round, led by Goldman Sachs, Acronis becomes a unicorn company with a valuation exceeding $1 billion.

read more

TechRepublic.png 2019-09-18 18:46:05 4 ways to protect your business from procurement risks (lien direct)

While it\'s virtually impossible to foresee and protect your business from all procurement-related dangers, you can reduce potential risks.

TechRepublic.png 2019-09-18 18:15:00 Forecast: 240 devices will have flexible or foldable screens by 2028 (lien direct)

This new feature has the potential to keep consumers on the two-year smartphone replacement cycle.

SecurityWeek.png 2019-09-18 18:14:34 GitHub Becomes CVE Numbering Authority, Acquires Semmle (lien direct)

Microsoft-owned GitHub announced on Wednesday that it has acquired code analysis platform provider Semmle and the company is now a Common Vulnerabilities and Exposures (CVE) Numbering Authority.

read more

DarkReading.png 2019-09-18 18:14:00 WannaCry Detections At An All-Time High (lien direct)

More than 12,000 variants of the infamous malware are targeting systems that are still open to the EternalBlue exploit - but the potential danger is low, Sophos warns.

Malware
TechRepublic.png 2019-09-18 18:04:17 Bloomberg Data for Good Exchange shows how big data can impact climate change (lien direct)

Bloomberg\'s Data for Good Exchange event gave scientists and researchers a chance to show how they\'re using big data to save the environment.

TechRepublic.png 2019-09-18 18:00:00 1Password releases security tool designed for businesses (lien direct)

1Password has created an advanced protection suite with new security tools for 1Password business users.

Tool
TechRepublic.png 2019-09-18 17:55:28 Researchers hope 5G expansion revolutionizes data analytics (lien direct)

ABI Research said companies needed to find new ways to use the troves of data that will come with the 5G revolution.

no_ico.png 2019-09-18 17:29:45 Improving Safety At The Rugby World Cup, On And Off The Pitch (lien direct)

This year\'s rugby world cup in Japan will be the biggest and most tech-enabled incarnation yet. It doesn\'t have a choice. The modern-day sporting spectacle is invariably a hyper-connected production of dizzying permutations and potential. 1,8 million tickets will change hands and 400,000 rugby fans will descend on the Land of the Rising Sun from …

The ISBuzz Post: This Post Improving Safety At The Rugby World Cup, On And Off The Pitch appeared first on Information Security Buzz.

datasecuritybreach.png 2019-09-18 17:04:57 Collectivités territoriales : un guide de sensibilisation au RGPD (lien direct)

Afin d\'accompagner les collectivités territoriales dans leur mise en conformité au RGPD, la CNIL a élaboré un guide de sensibilisation disponible sur son site web. Les collectivités territoriales traitent de nombreuses données personnelles, que ce soit pour assurer la gestion des services publics dont elles ont la charge (état civil, inscriptions scolaires, listes électorales, etc.), … Continue reading Collectivités territoriales : un guide de sensibilisation au RGPD

WiredThreatLevel.png 2019-09-18 17:02:55 Amazon Cracks Down on Third-Party Apps Over Privacy Violations (lien direct)

Amazon sellers use third-party apps to do business more efficiently, but they can also access shoppers\' personal information.

TechRepublic.png 2019-09-18 17:00:11 Researchers are performing integer factorization using modified MRAM (lien direct)

Ease of scaling could make probabilistic computing competitive with current-day quantum computers, though limitations of the design prompt researchers to dub it the "poor man\'s qubit."

MalwarebytesLabs.png 2019-09-18 16:49:40 International students in UK targeted by visa scammers (lien direct) Visa scammers are at it again, this time targeting Chinese international students in the UK. Learn how these scams work in order to steer clear, and advise others to do the same.

Categories:

Scams

Tags:

(Read more...)

The post International students in UK targeted by visa scammers appeared first on Malwarebytes Labs.

ESET.png 2019-09-18 16:38:07 Remote access flaws found in popular routers, NAS devices (lien direct)

In almost all tested units, the researchers achieved their goal of obtaining remote root-level access

The post Remote access flaws found in popular routers, NAS devices appeared first on WeLiveSecurity

WiredThreatLevel.png 2019-09-18 16:30:07 The Myth of Technophobia (lien direct)

Opinion: From the telegraph to cars, we\'ve never feared tech as much as we think we have.

TechRepublic.png 2019-09-18 16:26:22 A new type of DDoS attack can amplify attack strength by more than 15,300% (lien direct)

By abusing a little-known multicast protocol, attackers can launch DDoS attacks of immense power, but there may be an easy fix.

itsecurityguru.png 2019-09-18 16:18:41 Attackers Could Gain Access to 15K Private Business Webcams. (lien direct)

Webcams could be potentially accessed and manipulated by anyone with an Internet connection, researchers say. More than 15,000 webcams, many of which are located inside people’s homes, are potentially accessible to anyone with an Internet connection. Researchers at Wizcase who discovered the cameras say many are vulnerable to attackers who could steal data or adjust […]

The post Attackers Could Gain Access to 15K Private Business Webcams. appeared first on IT Security Guru.

itsecurityguru.png 2019-09-18 16:17:53 (Déjà vu) Google Users have had their Calendars Shared With the World. (lien direct)

Thousands of Google users are exposing the contents of their calendars to the public. The information is indexed by search engines and can include email addresses as well as private events from individuals and businesses. The problem is due to misconfiguring Google Calendar to share its contents with others. However, making the data public means that […]

The post Google Users have had their Calendars Shared With the World. appeared first on IT Security Guru.

itsecurityguru.png 2019-09-18 16:16:53 (Déjà vu) Venmo Scams Targeting Users via Text Messages. (lien direct)

A local police department in the U.S. are warning of a wave of phishing scams targeting users Venmo mobile payment service with text messages that direct to a fake website. Owned by PayPal, Venmo is a peer-to-peer payment app that allows sending and receiving money to and from contacts on your phone. Source: Bleeping Computer

The post Venmo Scams Targeting Users via Text Messages. appeared first on IT Security Guru.

itsecurityguru.png 2019-09-18 16:15:52 Malindo Air has confirmed passenger data breach. (lien direct)

KUALA LUMPUR: Malaysia’s Malindo Air, a subsidiary of Indonesia’s Lion Group, said on Wednesday (Sep 18) it was investigating a data breach involving the personal details of its passengers. Malindo Air’s statement followed a report by Moscow-based cybersecurity firm Kaspersky Lab that the details of around 30 million passengers of Malindo and fellow Lion Group subsidiary […]

The post Malindo Air has confirmed passenger data breach. appeared first on IT Security Guru.

Data Breach
itsecurityguru.png 2019-09-18 16:13:42 (Déjà vu) 24.3 Million Patients Confidential Data Discovered Online. (lien direct)

Greenbone Networks has released details of new research in to the security of the servers used by health providers across the world to store images of X-rays as well as CT, MRI and other medical scans. Of the 2,300 medical image archive systems worldwide that Greenbone analyzed between mid-July and early September 2019, 590 of […]

The post 24.3 Million Patients Confidential Data Discovered Online. appeared first on IT Security Guru.

no_ico.png 2019-09-18 16:10:11 New Algorithms Identify Twitter Cyber-Bullies (lien direct)

It has been reported that scientists have developed new machine learning algorithms which can successfully identify bullies and aggressors on Twitter with 90 per cent accuracy. New algorithm spots Twitter bullies 'with 90% accuracy' https://t.co/QHStqJqo2h — Sky News (@SkyNews) September 17, 2019  

The ISBuzz Post: This Post New Algorithms Identify Twitter Cyber-Bullies appeared first on Information Security Buzz.

no_ico.png 2019-09-18 16:07:42 New LogMeIn Central Report Reveals Seven Trends & Threats Facing SMB IT (lien direct)

Research finds implementing RMM solution saves IT professionals ~$50,000 per year Central by LogMeIn today released its findings of a new global report, “Uncovering the Latest IT Trends, Threats, & ROI Solutions Deliver” revealing current market trends, security concerns, and quantification of the value IT solutions deliver. In addition, the report uncovers best practices to keep companies …

The ISBuzz Post: This Post New LogMeIn Central Report Reveals Seven Trends & Threats Facing SMB IT appeared first on Information Security Buzz.

no_ico.png 2019-09-18 15:57:16 Experts Insight On Data Of 24.3 Million Patients Exposed Online (lien direct)

Greenbone Networks has released details of new research in to the security of the servers used by health providers across the world to store images of X-rays as well as CT, MRI and other medical scans. Of the 2,300 medical image archive systems worldwide that Greenbone analysed between mid-July and early September 2019, 590 of them …

The ISBuzz Post: This Post Experts Insight On Data Of 24.3 Million Patients Exposed Online appeared first on Information Security Buzz.

SecurityWeek.png 2019-09-18 15:39:41 300 More Chinese Arrested in Philippines Crackdown (lien direct)

Philippines immigration agents, backed by troops, have arrested more than 300 Chinese for alleged cyber crimes, a week after a similar number were detained during a raid linked to investment fraud.

The Bureau of Immigration late Tuesday said 324 Chinese nationals were arrested in Puerto Princesa City on Palawan island during Monday\'s operation.

read more

TechRepublic.png 2019-09-18 15:32:00 How to quiet big data noise (lien direct)

Follow this expert advice on how to refine your big data and team to understand what insights you really need.

no_ico.png 2019-09-18 15:31:07 Interesting reads (lien direct)

There were widely circulated reports of voice cloning being used in phishing. I’ve been predicting these for a while (Threat…

SecurityWeek.png 2019-09-18 15:30:10 Emotet Returns, Spreads via Hijacked Email Conversations (lien direct)

Following a 4-month vacation, Emotet\'s operators are back at it, borrowing a recently introduced spear-phishing technique to deliver their malware: hijacking legitimate email conversations.

read more

TechRepublic.png 2019-09-18 15:25:11 How to subscribe to a Google Calendar (lien direct)

If you need to follow another Google user\'s calendar, you\'re only a few clicks away. Find out how to make this a reality.

globalsecuritymag.png 2019-09-18 15:24:54 Sophos suit l\'évolution de WannaCry, du prédateur initial au récent vaccin à haut risque (lien direct)

Sophos vient de publier WannaCry Aftershock, un article sur le malware WannaCry, devenu tristement célèbre suite à l\'attaque mondiale qui a débuté le 12 Mai 2017. La recherche effectuée par les SophosLabs montre que la menace WannaCry demeure endémique, avec des millions de tentatives d\'infection arrêtées tous les mois et que, même si le malware d\'origine n\'a pas été mis à jour, plusieurs milliers de variantes éphémères courent toujours. La persistance de la menace WannaCry est en grande partie due à la (...) - Malwares

Malware
TechRepublic.png 2019-09-18 15:22:09 Virginia tech research team studies low latency military networks with DOD-funded grant (lien direct)

Using a $7.5 million, five-year Multidisciplinary University Research Initiative grant, a Virginia Tech research team looks into the latency of military IoT systems.

Studies
TechRepublic.png 2019-09-18 15:20:51 How the pods approach can be an effective project management strategy (lien direct)

Read about the benefits of using the pods method for project management, and get tips on implementing this strategy.

TechRepublic.png 2019-09-18 15:11:12 How to deploy a Kubernetes cluster on Ubuntu server (lien direct)

Getting a Kubernetes cluster up and running isn\'t as difficult as you might think.

TechRepublic.png 2019-09-18 14:54:11 Small businesses underestimate financial damage of cyberattacks (lien direct)

The average breach causes an average of $149,000 in damages, yet most small-to-medium-sized businesses thought cyberattacks would cost them under $10,000, survey reports.

TechRepublic.png 2019-09-18 14:52:43 What does upstream and downstream development even mean? (lien direct)

Have you heard the terms upstream and downstream applied to source code, and wondered what they meant? Here\'s a simplified explanation.

ZDNet.png 2019-09-18 14:50:47 Crypto-mining malware saw new life over the summer as Monero value tripled (lien direct)

Crypto-mining malware returns to take the crown as today\'s most prevalent malware threat.

Malware
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21

Information mise à jours le: 2019-09-22 08:07:45
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Notre RSS (filtré) Twitter