What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
WiredThreatLevel.png 2019-03-21 22:10:05 Finally! A DNA Computer That Can Actually Be Reprogrammed (lien direct)

DNA computers have to date only been able to run one algorithm, but a new design shows how these machines can be made more flexible-and useful.

SecurityAffairs.png 2019-03-21 21:54:03 Facebook passwords stored in plain text, hundreds of millions users affected (lien direct)

News problems for Facebook that admitted to have stored the passwords of hundreds of millions of users in plain text. Facebook revealed to have stored the passwords of hundreds of millions of users in plain text, including passwords of Facebook Lite, Facebook, and Instagram users. “As part of a routine security review in January, we […]

The post Facebook passwords stored in plain text, hundreds of millions users affected appeared first on Security Affairs.

no_ico.png 2019-03-21 21:36:00 ZOLL Medical Device Data Breach Caused By Third Party (lien direct)

Medical device company ZOLL has announced a data breach of patient information involving a third-party provider, stating:  On January 24, 2019, ZOLL learned of a data security incident that impacted the personal and medical information of some patients. As a precaution, ZOLL is providing this notice to make potentially affected patients aware of the incident and provide information on …

The ISBuzz Post: This Post ZOLL Medical Device Data Breach Caused By Third Party appeared first on Information Security Buzz.

Kaspersky.png 2019-03-21 20:47:04 WordPress Plugin Removed After Zero Day Discovered (lien direct)

The plugin, Social Warfare, is no longer listed after a cross site scripting flaw was found being exploited in the wild.

securityintelligence.png 2019-03-21 20:26:01 5 Characteristics of an Effective Incident Response Team: Lessons From the Front Line (lien direct)

>How you respond to a data breach matters. What qualities do the most elite incident response teams possess? The IBM X-Force IRIS team shares its lessons from the front line.

The post 5 Characteristics of an Effective Incident Response Team: Lessons From the Front Line appeared first on Security Intelligence.

TechRepublic.png 2019-03-21 20:15:00 Flash storage: A cheat sheet (lien direct)

With over a dozen form factors, knowing what the best flash memory card and SSD technology is available can be daunting.

TechRepublic.png 2019-03-21 20:02:00 How IBM is using smart sensors and computer modeling at Lake George, NY (lien direct)

IoT sensors are being used at Lake George, in New York, in order to collect data that can be used to improve the freshwater ecosystem.

TechRepublic.png 2019-03-21 19:55:01 Top 5 decentralized social networks (lien direct)

Facebook and Twitter are undeniably popular, but they\'re not the only social media platforms to consider. Tom Merritt discusses five alternative social media networks that focus on user freedom.

SecurityWeek.png 2019-03-21 19:33:02 Threat Hunting Tips to Improve Security Operations (lien direct)

From Ferdinand Magellan to Lewis and Clark to Neil Armstrong – humans have an innate desire to understand the unknown. In security operations, we see this phenomenon every day in several forms, one of which is threat hunting. Threat hunting is not triggered by an event, but by the unknown. It is the practice of proactively and iteratively searching for abnormal indications within networks and systems.

read more

no_ico.png 2019-03-21 19:15:05 Windows, Netflix Users Hit By Targeted Phishing Campaigns (lien direct)

In response to reports from Windows Defender Security Intel that AmEx and NetFlix customers are being hit with well-crafted phishing campaigns to get their credit card information, an expert with Centripetal Networks offers thoughts.  Colin Little, Senior Threat Analyst at Centripetal Networks:  Phishing emails are one of the highest-risk intrusion methods to date. They are easy to craft, easy to …

The ISBuzz Post: This Post Windows, Netflix Users Hit By Targeted Phishing Campaigns appeared first on Information Security Buzz.

TechRepublic.png 2019-03-21 19:14:04 How to create a virtual desktop in macOS (lien direct)

macOS users are in luck as the platform includes virtual desktops. Find out how these can help you be more efficient and how to create them.

WiredThreatLevel.png 2019-03-21 18:16:01 Facebook Stored Millions of Passwords in Plaintext-Change Yours Now (lien direct)

Facebook has disclosed that it stored hundreds of millions of user passwords in plaintext, where employees could search them.

bleepingcomputer.png 2019-03-21 17:54:03 Windows 7 Gets an Extra Life With Windows Virtual Desktop (lien direct)

Microsoft announced today that their new Windows Virtual Desktop product is now available for public preview. This technology allows the enterprise to move their desktops and applications into Azure and be hosted on Windows 10 and Windows 7 operating systems that are always secured with the latest updates. [...]

itsecurityguru.png 2019-03-21 17:53:05 $100 million BEC scammer pleads guilty. (lien direct)

Business email compromise (BEC) operation resulted in $100 million in losses to a multinational technology company and a social media firm, according to the US Attorney’s Office. Source: Dark Reading

The post $100 million BEC scammer pleads guilty. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-21 17:53:02 Two new Fin7 malware samples discovered. (lien direct)

Despite the 2018 crackdown on Fin7, the cybercrime group has been ramping up its efforts with two new malware samples and an attack panel. Source: Threatpost

The post Two new Fin7 malware samples discovered. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-21 17:52:03 Your data on health apps is no longer safe, study shows. (lien direct)

A study tested two dozen medicine apps to find out how and where they’re sharing your personal data. Source: Motherboard

The post Your data on health apps is no longer safe, study shows. appeared first on IT Security Guru.

Kaspersky.png 2019-03-21 17:51:05 Hackers Take Down Safari, VMware and Oracle at Pwn2Own (lien direct)

On the first day of Pwn2Own 2019 hackers poked holes in Apple Safari, VMware Workstation and Oracle VirtualBox.

itsecurityguru.png 2019-03-21 17:51:05 Spear phishing relies on spoofing brands. (lien direct)

As phishing attacks become increasingly commonplace, it\'s important to know what to look out for. But not all phishing attacks are the same, and some are far more sophisticated than others. Cybersecurity experts say spear phishing in particular is on the rise. Source: Gizmodo

The post Spear phishing relies on spoofing brands. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-21 17:51:01 Russia takes aim at EU elections. (lien direct)

Russian hackers have targeted European government systems ahead of the EU parliament election, cybersecurity firm FireEye said Thursday. Source: CNBC

The post Russia takes aim at EU elections. appeared first on IT Security Guru.

SecurityWeek.png 2019-03-21 17:48:00 Global Security Spend Set to Grow to $133.8 Billion by 2022: IDC (lien direct)

Global spending on security-related hardware software and services will grow at a compound annual growth rate (CAGR) of 9.2% between 2018 and 2022, to a total of $133.8 billion in 2022. The figures come from the latest Worldwide Semiannual Security Spending Guide compiled by IDC.

read more

grahamcluley.png 2019-03-21 17:16:04 Some 2000 Facebook staff had access to millions of Facebook users\' passwords… stored in plaintext (lien direct)
Some 2000 Facebook engineers had access to millions of Facebook users' passwords... stored in plaintext

Stretching back as far as 2012, Facebook has been storing the passwords of hundreds of millions of users unencrypted, in plaintext.

And those passwords were searchable by Facebook staff…

SecureMac.png 2019-03-21 17:05:04 Checklist 130: A Sick Phone, Your Face, and MySpace (lien direct)

On this week\'s Checklist by SecureMac we talk about: Viruses or Malware, Can iPhone get either?, Congress considers facial recognition legislation and MySpace teaches us all about backups.

The post Checklist 130: A Sick Phone, Your Face, and MySpace appeared first on SecureMac.

bleepingcomputer.png 2019-03-21 16:55:00 13-Year-Old Allegedly Hacked Teacher Account to Create Student \'Hit List\' (lien direct)

A 13-year-old is currently under investigation after he allegedly used a teacher\'s credentials to hack into his school district\'s computing system to steal fellow students\' personal information and create a "hit list." [...]

SecurityWeek.png 2019-03-21 16:53:03 Facebook Stored Passwords of Hundreds of Millions Users in Plain Text (lien direct)

Facebook today admitted to have stored the passwords of hundreds of millions of its users in plain text, including the passwords of Facebook Lite, Facebook, and Instagram users. 

read more

SecurityWeek.png 2019-03-21 16:38:01 How Three of 2018\'s Critical Threats Used Email to Execute Attacks (lien direct)

History Tends to Repeat Itself - Attackers Repurpose Tried and Tested Methods to Launch Attacks

read more

ZDNet.png 2019-03-21 16:33:02 Nokia firmware blunder sent some user data to China (lien direct)

Company behind Nokia smartphones accidentally left a data collection package inside some Nokia 7 Plus devices\' firmware.

SecurityWeek.png 2019-03-21 16:27:01 Multiple Vulnerabilities Patched in PuTTY and LibSSH2 (lien direct)

PuTTY, an SSH and Telnet client program, and LibSSH2, a client-side C library for the SSH2 protocol, have both received updates fixing multiple vulnerabilities. Eight vulnerabilities have been fixed in version 0.71 of PuTTY, and nine vulnerabilities fixed in version 1.8.1 of LibSSH2.

read more

SecurityWeek.png 2019-03-21 16:18:03 Facebook Pays Big Bounty for DoS Flaw in Fizz TLS Library (lien direct)

While Facebook\'s bug bounty program does not typically cover denial-of-service (DoS) vulnerabilities, the social media giant has decided to award a significant bounty for a serious flaw affecting Fizz, its open source TLS library.

read more

SecurityWeek.png 2019-03-21 16:16:01 FIN7 Hackers Use New Malware in Recent Attacks (lien direct)

The financially-motivated hacking group FIN7 has used new malware samples in a recent attack campaign, Flashpoint security researchers warn. 

read more

Kaspersky.png 2019-03-21 16:14:03 Facebook Stored Passwords in Plain Text For Years (lien direct)

The social media giant said that it is notifying users whose passwords it stored in plain text, which made them accessible for Facebook employees to view.

WiredThreatLevel.png 2019-03-21 16:10:05 Markiplier Is Not Done With YouTube (lien direct)

Gamer, vlogger, and sketch comic Mark Edward Fischbach-alias Markiplier, one of YouTube\'s most successful stars-reflects on his seven years on the platform.

Blog.png 2019-03-21 16:03:01 Opinion: my Grandfather\'s John Deere would support our Right to Repair (lien direct)

Willie Cade\'s grandfather, Theo, an engineer at John Deere, helped invent the manure spreader. His grandson thinks John Deere\'s efforts to kill right to repair legislation is what stinks.

The post Opinion: my Grandfather\'s John Deere would support our Right to Repair appeared first on The Security Ledger.

WiredThreatLevel.png 2019-03-21 16:00:00 It\'s a Short Hop From \'Fortnite\' to a New AI Best Friend (lien direct)

Epic Games CEO Tim Sweeney knows exactly what he\'s doing with the battle royale juggernaut: charting a path to the virtual metaverse.

TechRepublic.png 2019-03-21 16:00:00 How BYOD policies can help hourly employees improve productivity (lien direct)

Some 61% of hourly employees cited scheduling and communication issues as the main obstacles in reaching their workflow, according to a WorkJam study.

ArsTechnica.png 2019-03-21 15:57:05 Microsoft ships antivirus for macOS as Windows Defender becomes Microsoft Defender (lien direct)

Microsoft is expanding the reach of its device management services.

Blog.png 2019-03-21 15:45:05 Web application exposures continue to bedevil companies as digital transformation accelerates (lien direct)

As sure as the sun will rise in the morning, hackers will poke and prod at the web applications companies rely on – and find fresh weaknesses they can exploit. Related: Cyber spies feast on government shutdown Companies are scaling up their use of web apps as they strive to integrate digital technology into every […]

TechRepublic.png 2019-03-21 15:45:03 Falling NAND prices will drive PCIe SSDs to 50% market share in 2019 (lien direct)

Sales of PCIe-connected drives are expected to reach parity with SATA SSDs this year, as the price premium for NVMe decreases.

bleepingcomputer.png 2019-03-21 15:39:05 An Outage is Bad for Facebook, but Great for PornHub (lien direct)

One site\'s outage is another site\'s gain, which is exactly what PornHub discovered during the recent extended outage experienced by Facebook, WhatsApp, and Instagram.  [...]

TechRepublic.png 2019-03-21 15:38:04 How to encrypt files with FinalCrypt (lien direct)

If you\'re looking for an encryption tool that offers a unique approach and a well-designed GUI, FinalCrypt might be just the tool.

WiredThreatLevel.png 2019-03-21 15:35:05 Disney Is Building a Box Office Death Star (lien direct)

The Mouse House just took in a Fox and the \'Masters of the Universe\' movie might\'ve found its He-Man.

SecurityWeek.png 2019-03-21 15:26:01 Finland to Investigate Suspected Nokia Chinese Data Breach (lien direct)

Finnish authorities will launch an investigation into claims that Nokia phones have been transmitting users\' personal data to China, the country\'s data protection ombudsman announced on Thursday.

read more

Kaspersky.png 2019-03-21 15:19:02 MyPillow and Amerisleep Targeted in Magecart Group Attacks (lien direct)

In both breaches of MyPillow and Amerisleep, the customers whose payment information was potentially stolen were not informed.

Chercheur.png 2019-03-21 15:17:05 Facebook Stored Hundreds of Millions of User Passwords in Plain Text for Years (lien direct)

Hundreds of millions of Facebook users had their account passwords stored in plain text and searchable by thousands of Facebook employees -- in some cases going back to 2012, KrebsOnSecurity has learned. Facebook says an ongoing investigation has so far found no indication that employees have abused access to this data.

SecurityWeek.png 2019-03-21 15:15:02 Securing Industrial IoT in the Modern World (lien direct)

Manufacturing arguably offers the largest attack surface of almost any industry with regards to cybersecurity threats, and has long been a prime target for \'everyday\' attacks like phishing, ransomware, data-theft – you name it, they\'ve seen it. But these \'everyday\' attacks and the associated losses are only the tip of the iceberg when it comes to what could potentially happen in the future.

read more

TechRepublic.png 2019-03-21 15:04:04 Upgrading from Samsung Galaxy S7 Edge to Galaxy S10: A personal account (lien direct)

Read about one system administrator\'s experience upgrading his smartphone and the issues that followed.

MalwarebytesLabs.png 2019-03-21 15:00:00 Are hackers gonna hack anymore? Not if we keep reusing passwords (lien direct) A look at the not-so-hacking hacker techniques attackers are using to compromise user accounts via weak passwords and gain access to enterprise networks.


Cybercrime Hacking


(Read more...)

The post Are hackers gonna hack anymore? Not if we keep reusing passwords appeared first on Malwarebytes Labs.

SecurityAffairs.png 2019-03-21 14:51:03 South Korea – 1,600 guests at 30 motels secretly live streamed (lien direct)

Four people from South Korea are accused of secretly live streaming, and selling videos made with spy-cam installed in 42 motel rooms at 30 motels in 10 cities in South Korea. According to the media, 1600 motel guests between November 24 and March 2 were spied by the indicted individuals that now face up to […]

The post South Korea – 1,600 guests at 30 motels secretly live streamed appeared first on Security Affairs.

TechRepublic.png 2019-03-21 14:37:04 Desktop App Assure: The help you need to keep Windows 10 up to date (lien direct)

If you have an enterprise or educational Windows licence, Microsoft promises to do whatever it takes to make your business applications work with Windows 10 and Office.

SecurityWeek.png 2019-03-21 14:35:00 Many Vulnerabilities Found in Oracle\'s Java Card Technology (lien direct)

Poland-based cybersecurity research firm Security Explorations claims to have identified nearly 20 vulnerabilities in Oracle\'s Java Card, including flaws that could be exploited to compromise the security of chips using this technology.

read more

TechRepublic.png 2019-03-21 14:23:00 3 ways businesses can help project managers succeed (lien direct)

Organizations wasted almost 12% of project spend investment last year due to poor performance, according to the Project Management Institute.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21

Information mise à jours le: 2019-03-26 04:01:32
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Notre RSS (filtré) Twitter