What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
DarkReading.png 2019-01-16 12:00:00 Fortnite Players Compromised Via Epic Games Vulnerability (lien direct)

Bugs in Epic Games\' platform could let intruders take over players\' accounts, view personal data, and/or buy in-game currency.

WiredThreatLevel.png 2019-01-16 12:00:00 As the Government Shutdown Drags on, Security Risks Intensify (lien direct)

From potential nation state hacks to a brain drain, the shutdown has done nothing good for cybersecurity.

WiredThreatLevel.png 2019-01-16 12:00:00 The Millions Silicon Valley Spends on Security for Execs (lien direct)

Facebook told investors it expects to spend $10 million annually on security for CEO Mark Zuckerberg.

WiredThreatLevel.png 2019-01-16 12:00:00 Porny Presidential Fanfic Isn\'t Just Kinky-It\'s Political (lien direct)

You probably won\'t enjoy reading about President Trump getting it on with Mike Pence (or Putin, or Shrek), but you\'re not really supposed to.

bleepingcomputer.png 2019-01-16 11:07:00 LoJax Command and Control Domains Still Active (lien direct)

Security researchers have uncovered new details about the infrastructure used by LoJax UEFI rootkit used in attacks from APT28. The analysis revealed two command and control (C2) servers were still active in early 2019. [...]

ZDNet.png 2019-01-16 10:43:02 Fortnite security issue would have granted hackers access to accounts (lien direct)

Check Point recommends that Fortnite players enable two-factor authentication (2FA) for their accounts.

bleepingcomputer.png 2019-01-16 10:31:05 MageCart Skimmer Hits Hundreds of Sites In Ad Supply Chain Attack (lien direct)

Most attackers who utilize malicious scripts known as MageCart to steal payment information usually try to keep a low profile to stay undetected on the sites they compromise. New research shows how one MageCart criminal group recently compromised an advertising script to inject MageCart into hundreds of sites at the same time. [...]

DarkReading.png 2019-01-16 10:20:00 Triton/Trisis Attack Was More Widespread Than Publicly Known (lien direct)

Signs of the attack first showed up two months before it was identified as a cyberattack, but they were mistaken for a pure equipment failure by Schneider Electric, security expert reveals at S4x19.

The_Hackers_News.png 2019-01-16 10:04:00 Hackers infect e-commerce sites by compromising their advertising partner (lien direct)

Magecart strikes again, one of the most notorious hacking groups specializes in stealing credit card details from poorly-secured e-commerce websites. According to security researchers from RiskIQ and Trend Micro, cybercriminals of a new subgroup of Magecart, labeled as "Magecart Group 12," recently successfully compromised nearly 277 e-commerce websites by using supply-chain attacks. Magecart

bleepingcomputer.png 2019-01-16 09:59:03 NVIDIA Tesla T4 GPUs in Beta on the Google Cloud Platform (lien direct)

The Google Cloud Platform is the first cloud vendor to provide its customers with access to NVIDIA\'s professional Tesla T4 GPU, via a beta program with instances available for customers from Brazil, India, Netherlands, Singapore, Tokyo, and the United States. [...]

Korben.png 2019-01-16 09:49:04 Le danger des contrôleurs RF dans les applications industrielles (lien direct)

Quand on pense " sécurité + systèmes industriels " d’un point de vue grand public, le premier truc qui vient à l’esprit est en général SCADA en place dans les usines, et qu’on peut parfois croiser au détour d’un Shodan ou autre. On pense aussi à Windows Embedded pour les systèmes embarqués … Suite

SecurityAffairs.png 2019-01-16 08:59:01 Experts link attack on Chilean interbank network Redbanc NK Lazarus APT (lien direct)

Researchers from Flashpoint linked the recently disclosed attack on Chilean interbank network Redbanc to the North Korean APT group Lazarus. Security experts at Flashpoint linked the recently disclosed attack on the Chilean interbank network to the dreaded Lazarus APT group. The activity of the Lazarus Group surged in 2014 and 2015, its members used mostly custom-tailored malware […]

The post Experts link attack on Chilean interbank network Redbanc NK Lazarus APT appeared first on Security Affairs.

securityintelligence.png 2019-01-16 08:55:04 The Success of Your Business Depends on Digital Trust. Here Is How to Measure It (lien direct)

>As consumers become more aware of their data privacy, organizations across sectors are under increasing pressure to deliver frinctionless digital trust.

The post The Success of Your Business Depends on Digital Trust. Here Is How to Measure It appeared first on Security Intelligence.

Blog.png 2019-01-16 08:30:05 GUEST ESSAY: What your company should know about addressing Kubernetes security (lien direct)

Kubernetes is one of many key enabling technologies of digital transformation that has tended to remain obscure to non-technical company decision makers. Related podcast: Securing software containers Kubernetes is an administration console — an open source project from Google that makes containerized software applications easy to  deploy, scale, and manage. As beneficial as Kubernetes is […]

Checkpoint.png 2019-01-16 08:30:04 Fortnite\'s Vulnerability: Only the Secure Survive (lien direct)

For the last two hundred years, Darwin\'s \'Survival of the Fittest\' theory of natural selection has shaped our view of man\'s existence on earth. In the last couple of years, though, Fortnite, the massively popular online game played by millions worldwide, has taken this concept of survival to a whole new level.   Played in…

The post Fortnite’s Vulnerability: Only the Secure Survive appeared first on Check Point Software Blog.

silicon.fr.png 2019-01-16 08:22:05 IBM, Microsoft et BlackBerry rejoignent le programme Android Enterprise Recommended de Google (lien direct)

Après les appareils, comme les téléphones et les tablettes, Google étend son programme de certifications aux services et aux applications, avec des partenaires aussi répandus que Microsoft, BlackBerry ou IBM.

InfosecIsland.png 2019-01-16 06:52:05 Taking Advantage of Network Segmentation in 2019 (lien direct)

Here\'s how organizations can get started with network segmentation – including some potential issues to plan for and successfully avoid.

InfosecIsland.png 2019-01-16 06:41:05 2019 Predictions: What Will Be This Year\'s Big Trends in Tech? (lien direct)

What will 2019 bring, and how can businesses prepare themselves for the technological developments to come over the next twelve months?

bleepingcomputer.png 2019-01-16 06:33:04 Bug in Fortnite Authentication Left Accounts Open to Take Over (lien direct)

Weaknesses in Epic Games\' authentication process for the highly popular Fortnite left gamers\' accounts exposed to take over risks. An attacker could have stolen login tokens by just tricking the victim into clicking a link. [...]

bleepingcomputer.png 2019-01-16 05:30:00 Firefox 66 Lets You Reconfigure Keyboard Shortcuts for Extensions (lien direct)

Firefox lets developers create keyboard shortcuts for their extension\'s functions, which are hard coded or possibly configurable depending on the extension. In Firefox 66, Mozila is making extension keyboard shortcuts configurable by a user directly from the about:addons page.  [...]

bleepingcomputer.png 2019-01-16 05:30:00 Firefox 66 Lets You Configure Keyboard Shortcuts for Extensions (lien direct)

Firefox lets developers create keyboard shortcuts for their extension\'s functions, which are hard coded or possibly configurable depending on the extension. In Firefox 66, Mozila is making extension keyboard shortcuts configurable by a user directly from the about:addons page.  [...]

The_Hackers_News.png 2019-01-16 04:56:03 Flight Booking System Flaw Affected Customers of 141 Airlines Worldwide (lien direct)

Almost half of the fight travelers around the world were found exposed to a critical security vulnerability discovered in online flight ticket booking system that allowed remote hackers to access and modify their travel details and even claim their frequent flyer miles. Israeli network security researcher Noam Rotem discovered the vulnerability when he booked a flight on the Israeli airline

bleepingcomputer.png 2019-01-16 03:05:00 Emotet Returns from the Holidays With New Tricks (lien direct)

Following a short period of low activity, Emotet operators are back at distributing through malicious email campaigns a new strain of their payload that carries new tricks. [...]

The_Hackers_News.png 2019-01-16 02:58:01 Fortnite Flaws Allowed Hackers to Takeover Gamers\' Accounts (lien direct)

Check Point researchers have discovered multiple security vulnerabilities in Fortnite, a massively popular online battle game, one of which could have allowed remote attackers to completely takeover player accounts just by tricking users into clicking an unsuspectable link. The reported Fortnite flaws include a SQL injection, cross-site scripting (XSS) bug, a web application firewall bypass

ZDNet.png 2019-01-16 02:08:01 North Korean hackers infiltrate Chile\'s ATM network after Skype job interview (lien direct)

Redbanc employee applied for a LinkedIn job and got a call from the world\'s most active hacker crews.

Blog.png 2019-01-16 01:32:03 Podcast Episode 129: Repair Eye on the CES Guy and Sensor Insecurity (lien direct)

In this week\'s podcast: For all the great new gadgets unveiled in Las Vegas, how many can be repaired? Kyle Wiens of iFixit joins us to report from the CES show. Also: more and more our physical surroundings are populated by small, wireless sensors. How secure are they from hacking and manipulation? Not very says our second guest, Roi Mit of...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/592283864/0/thesecurityledger -->»

The_Hackers_News.png 2019-01-16 01:21:02 Unprotected VOIP Server Exposed Millions of SMS Messages, Call Logs (lien direct)

A California-based Voice-Over-IP (VoIP) services provider VOIPO has accidentally left tens of gigabytes of its customer data, containing millions of call logs, SMS/MMS messages, and plaintext internal system credentials, publicly accessible to anyone without authentication. VOIPo is one of a leading providers of Voice-Over-IP (VoIP) services in the United States offering reseller VoIP, Cloud

WiredThreatLevel.png 2019-01-16 01:10:05 Bracing for a Hazy Robo-Future, Ford and VW Join Forces (lien direct)

By joining forces, the major automakers have each diversified their self-driving portfolios.

WiredThreatLevel.png 2019-01-16 00:58:00 10 Years Later, Retrace the \'Miracle on the Hudson\' Flight (lien direct)

On the anniversary of the remarkable crash landing, remember just how quickly it all happened.

Chercheur.png 2019-01-16 00:52:03 “Stole $24 Million But Still Can\'t Keep a Friend” (lien direct)

Unsettling new claims have emerged about Nicholas Truglia, a 21-year-old Manhattan resident accused of hijacking cell phone accounts to steal tens of millions of dollars in cryptocurrencies from victims. The lurid details, made public in a civil lawsuit filed this week by one of his alleged victims, paints a chilling picture of a man addicted to thievery and all its trappings. The documents suggest that Truglia stole from his father and even a dead man -- all the while lamenting that his fabulous new wealth brought him nothing but misery.

ZDNet.png 2019-01-16 00:09:00 New Ethereum version postponed after discovery of serious security flaw (lien direct)

Ethereum Constantinople Upgrade hits last minute snag that saves many users from catastrophic losses.

TechRepublic.png 2019-01-15 23:39:03 Jamie Foxx talks tech during HANDL launch event at CES 2019 (lien direct)

TechRepublic spoke with Jamie Foxx at HANDL New York\'s CES 2019 launch. The Academy Award-winning actor shared his thoughts on how technology can help people be more creative.

WiredThreatLevel.png 2019-01-15 23:39:00 Facebook\'s \'10 Year Challenge\' Is Just a Harmless Meme-Right? (lien direct)

Opinion: The 2009 vs. 2019 profile picture trend may or may not have been a data collection ruse to train its facial recognition algorithm. But we can\'t afford to blithely play along.

The_Hackers_News.png 2019-01-15 23:15:04 5 Popular Web Hosting Services Found Vulnerable to Multiple Flaws (lien direct)

A security researcher has discovered multiple one-click client-side vulnerabilities in the some of the world\'s most popular and widely-used web hosting companies that could have put millions of their customers as well as billions of their sites\' visitors at risk of hacking. Independent researcher and bug-hunter Paulos Yibelo, who shared his new research with The Hacker News, discovered roughly

no_ico.png 2019-01-15 23:02:03 Reddit Security Incident (lien direct)

Following the news that Reddit has locked user accounts whilst it investigates a potential security incident, Raj Samani, Chief Scientist and McAfee Fellow commented below. Raj Samani, Chief Scientist and McAfee: “Again, 330 million users find themselves grappling with the fact that hackers might have had the potential to access a treasure trove of their data, putting their privacy …

The ISBuzz Post: This Post Reddit Security Incident appeared first on Information Security Buzz.

Kaspersky.png 2019-01-15 22:43:04 IDenticard Zero-Days Allow Corporate Building Access, Location Recon (lien direct)

Multiple hardcoded passwords allow attackers to create badges to gain building entry, access video surveillance feeds, manipulate databases and more.

SecurityAffairs.png 2019-01-15 22:08:02 Cranes, drills and other industrial machines exposed to hack by RF protocols (lien direct)

Researchers from Trend Micro have analyzed the communication protocols used by cranes and other industrial machines and discovered several flaws. Security experts from Trend Micro have discovered several vulnerabilities in the communication protocols used by cranes, hoists, drills and other industrial machines. The experts found vulnerabilities in products from several vendors, including Saga, Juuko, Telecrane, […]

The post Cranes, drills and other industrial machines exposed to hack by RF protocols appeared first on Security Affairs.

WiredThreatLevel.png 2019-01-15 21:54:01 The \'Spider-Man: Far From Home\' Trailer Raises Some Questions (lien direct)

Think Peter Parker got dusted for good in \'Infinity War\'? Think again.

Kaspersky.png 2019-01-15 21:44:03 Data Breach Roundup: U.S. Healthcare, Cryptopia, SingHealth and Experian (lien direct)

January is off to a running start on the data breach front, while Experian is predicting new attack frontiers ahead.

no_ico.png 2019-01-15 21:00:04 Sharing Geo-location Information (lien direct)

An investigative report by Motherboard has uncovered how geo-location data frommobile carriers such as T-Mobile, Sprint and AT&T have been shared with third-party partners who sell the information to unauthorized entities not licensed to possess it. The story focused on a company known as Microbilt, that was found to sell geolocation information without regard to …

The ISBuzz Post: This Post Sharing Geo-location Information appeared first on Information Security Buzz.

WiredThreatLevel.png 2019-01-15 20:57:02 The Subversive, Delectable Fun of Troye Sivan\'s "Lucky Strike" (lien direct)

Not to make this about politics or walls or borders or displacement, but the Australian pop singer\'s new song is all about politics and walls and borders and displacement.

ZDNet.png 2019-01-15 20:54:04 US charges Ukrainian for SEC 2016 hack, others for insider trading (lien direct)

Hacker also participated in the notorious hack of three newswire services in 2014.

TechRepublic.png 2019-01-15 20:33:04 Why the enterprise should pay attention to NASCAR\'s research tactics (lien direct)

NASCAR\'S use of aggregated data, analytics, and social media helped grow its fan base. Learn how it could do the same for your business.

WiredThreatLevel.png 2019-01-15 20:27:01 The Instagram Egg\'s Delightful Appeal (lien direct)

The egg feels absurd, but it\'s part of a viral playbook we\'ve seen before.

WiredThreatLevel.png 2019-01-15 19:49:00 How GPS Tracking Technology Can Curb Domestic Violence (lien direct)

Opinion: GPS-monitored violent offenders are 95 percent less likely to commit a new crime. We need to implement an integrated, nationwide domestic violence program that tracks domestic abusers.

no_ico.png 2019-01-15 19:44:01 Google Search Results Listings Can Be Manipulated For Propaganda (lien direct)

The “knowledge panel” on Google’s search engine lets threat actors alter search results in a way that could be used to push political propaganda, oppressive views, or promote fake news. The “knowledge panel” is a box that usually appears at the right side of the search results, usually highlighting the main search result for a …

The ISBuzz Post: This Post Google Search Results Listings Can Be Manipulated For Propaganda appeared first on Information Security Buzz.

TechRepublic.png 2019-01-15 19:33:04 How to install Orangescrum project management server on Ubuntu 18.04 (lien direct)

If you\'re looking for a powerful, in-house project management tool, look no further than Orangescrum.

bleepingcomputer.png 2019-01-15 19:12:01 Djvu Ransomware Spreading New .TRO Variant Through Cracks & Adware Bundles (lien direct)

In December 2018, a new ransomware called Djvu, which could be a variant of STOP,  was released that has been heavily promoted through crack downloads & adware bundles. Originally, this ransomware would append a variation of the .djvu string as an extension to encrypted files, but a recent variant has switched to the .tro extension. [...]

TechRepublic.png 2019-01-15 19:00:01 Smart building security flaws leave schools, hospitals at risk (lien direct)

Vendors of smart building hardware issued updates to products without disclosing that vulnerabilities were patched, leading security systems for schools and hospitals to be accessible via the web.

Kaspersky.png 2019-01-15 18:53:04 Judge: Law Enforcement Can\'t Force Suspects to Unlock iPhones with FaceID (lien direct)

A ruling found that coercing suspects to open their phones using biometrics violates the fourth and fifth amendments.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21

Information mise à jours le: 2019-01-19 06:03:28
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Notre RSS (filtré) Twitter