What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
bleepingcomputer.png 2019-05-21 13:53:02 Microsoft Releases Windows 10 Version 1903 - May 2019 Update (lien direct)

Microsoft has officially started to roll out Windows 10 version 1903, called the May 2019 Update, to everyone. Originally released to Insiders for testing on April 8th, Microsoft has now made it available to everyone. [...]

bleepingcomputer.png 2019-05-21 13:04:01 Forbes Global 2000 Firm Leaked Plain Text Passwords and Data (lien direct)

IT service and consulting company Hindustan Computers Limited (HCL) exposed a huge trove of employee and business information via publicly accessible pages hosted on multiple subdomains. [...]

Checkpoint.png 2019-05-21 13:00:01 Microsoft and Check Point Protect Employees from Leaking Sensitive Business Data and Intellectual Property (lien direct)

by Dana Katz, Product Marketing Manager, Security Platforms, published May 21st, 2019   It is clear that confidential data leakage, whether malicious or unintentional, can cause serious damage to any organization. Preventing sensitive and valuable information, such as customer records, intellectual property, and financial reports, from falling into the wrong hands has become a major…

The post Microsoft and Check Point Protect Employees from Leaking Sensitive Business Data and Intellectual Property appeared first on Check Point Software Blog.

WiredThreatLevel.png 2019-05-21 13:00:00 Cannondale Treadwell 2019: Price, Details, Release Date (lien direct)

The Treadwell is a simple, inexpensive bike for getting around. And it has a sensor built into the wheel that lets you log (and study) all of your rides.

TechRepublic.png 2019-05-21 12:56:04 5 tech trends your business can\'t afford to ignore (lien direct)

Business owners must determine which emerging technologies like AI and IoT they should invest in, and which they should wait on.

TechRepublic.png 2019-05-21 12:50:00 Why post-quantum encryption will be critical to protect current classical computers (lien direct)

Quantum computers are theorized to be capable of breaking RSA encryption. Experts disagree on when it could happen, but agree on a need for quantum-proof encryption.

globalsecuritymag.png 2019-05-21 12:20:03 BeyondTrust fournit les statistiques de vulnérabilités du Verizon Data Breach Investigations Report 2019 : (lien direct)

29% des violations de données en 2018 ont été réalisées en utilisant des identifiants volés ! Les résultats indiquent une augmentation continue des menaces venant de l\'intérieur et ciblant les données. BeyondTrust, leader de la gestion des accès privilégiés, annonce le lancement du 2019 Verizon Data Breach Investigations Report (DBIR), lequel exploite les statistiques de vulnérabilités fournies par BeyondTrust. Les données ont été fournies pour aider à classer les menaces constatées. Ces données ont été (...) - Marchés

globalsecuritymag.png 2019-05-21 12:04:01 Coheris enrichit sa solution de pilotage commercial Coheris CRM Nomad, d\'une application smartphone (lien direct)

Coheris, éditeur de solutions logicielles dans les domaines du CRM, de l\'IA et de l\'Analytics, annonce la disponibilité de son application smartphone, Smart Nomad, dédiée aux forces commerciales en point de vente. Cette nouvelle application est développée 100% pour un usage smartphone et disponible sur Android et IOS. Elle permet aux commerciaux nomades d\'accéder depuis leur téléphone mobile, à un ensemble de fonctionnalités de leur logiciel de pilotage commercial terrain, Coheris CRM Nomad, qu\'ils (...) - Produits

itsecurityguru.png 2019-05-21 12:01:03 Hackers Paradise:The Dark Web And Growing Cyberattacks On Businesses. (lien direct)

Attributed to: Ian Woolley, Chief Revenue Officer of Ensighten Despite more resources and investment being ploughed into data security, cybercriminals are still successfully stealing businesses’ data. One group of hackers known as Magecart were found to be the cause of at least 319,000 data breach instances in 2018, according to RiskIQ\'s Black Friday e-commerce Blacklist […]

The post Hackers Paradise:The Dark Web And Growing Cyberattacks On Businesses. appeared first on IT Security Guru.

WiredThreatLevel.png 2019-05-21 12:00:00 Vizio P-Series Quantum TV Review (2019): The Best for Less (lien direct)

Vizio\'s almost-top-end 4K TV is a dazzling testament to the power of quantum dots in a LCD display. Our full review of the 65-inch and 75-inch models.

TechRepublic.png 2019-05-21 11:47:04 Software development: What Windows 10\'s new Windows Terminal means for PowerShell (lien direct)

Microsoft breaks down how Windows Terminal will work with Windows 10\'s existing command-line tools.

Pirate.png 2019-05-21 11:14:03 29% des violations de données de 2018 réalisées en utilisant des identifiants volés (lien direct)
Le 2019 Verizon Data Breach Investigations Report (DBIR) pour lequel BeyondTrust a fourni ses statistiques de vulnérabilités est disponible. On y apprend notamment que 29% des violations de données en 2018 ont été réalisées en utilisant des identifiants volés.
Pirate.png 2019-05-21 11:11:01 RGPD, seuls 4 salariés sur 10 ont confiance dans la sécurité de leurs données (lien direct)
Un an après le RGPD, seuls 4 français sur 10 ont confiance dans la sécurité de leurs données gérées par leur employeur.
TechRepublic.png 2019-05-21 11:00:01 How to future-proof your career: 5 tips (lien direct)

At the SAP SAPPHIRE 2019 conference in Orlando, Kerry Brown discussed how to remain valuable in your job position.

WiredThreatLevel.png 2019-05-21 11:00:00 The True Victims of the Opioid Crisis Are Starting to Rebel (lien direct)

The push to end opioid abuse has ended up hurting the people who use the drugs legitimately. Now those chronic pain patients are starting a movement of their own.

WiredThreatLevel.png 2019-05-21 11:00:00 Can Tech \'Objectively\' Assess Pain? (lien direct)

Some combination of data and machinery may finally provide an objective marker of pain-but beware of bias.

bleepingcomputer.png 2019-05-21 10:48:05 Contractor Faces Jail for Using Govt Servers for CryptoMining (lien direct)

The Australian Federal Police (AFP) arrested a 33-year-old government IT contractor from the Upper North Shore Killara suburb of Sydney, New South Wales, for running a shadow mining scheme using the government\'s computing systems. [...]

no_ico.png 2019-05-21 10:45:04 Adding A Recovery Phone Number To Your Google Account Can Block Up To 100% Of Automated Bots (lien direct)

Google published a blog post highlighting their research that showed that simply adding a recovery phone number to your Google Account can block up to 100% of automated bots, 99% of bulk phishing attacks, and 66% of targeted attacks that occurred during our investigation. Expert Comments: Jake Moore, Security Specialist at ESET: “All of the …

The ISBuzz Post: This Post Adding A Recovery Phone Number To Your Google Account Can Block Up To 100% Of Automated Bots appeared first on Information Security Buzz.

The_State_of_Security.png 2019-05-21 10:41:00 HawkEye Attack Wave Sends Stolen Data to Another Keylogger Provider (lien direct)

A recent attack wave involving HawkEye malware sends data stolen from its victims to another keylogger provider’s website. On 21 May, My Online Security came across a new sample of HawkEye. The actual delivery mechanism itself wasn’t unique compared to previous attacks involving the malware. In this particular instance, the attack email used the lure […]… Read More

The post HawkEye Attack Wave Sends Stolen Data to Another Keylogger Provider appeared first on The State of Security.

bleepingcomputer.png 2019-05-21 10:28:01 Firefox 67 Released With Cryptominer Blocking, Performance Boost (lien direct)

Mozilla has officially released Firefox 67 to the Windows, Mac, Linux, and Android release channels.  This version comes with cryptominer and fingerprinter blocking, WebRender, changes to Private Browsing, increased ARM64 support, and improved performance. [...]

no_ico.png 2019-05-21 10:26:04 GDPR: The Best Strategy For International Businesses (lien direct)

The EU\'s General Data Protection Regulation (GDPR) was created with the aim of homogenising data privacy laws across the EU. GDPR also applies to organisations outside the EU, if they monitor EU data subjects, or offer goods and services to them. The GDPR applies to personal data, which is defined as any information relating to …

The ISBuzz Post: This Post GDPR: The Best Strategy For International Businesses appeared first on Information Security Buzz.

securityintelligence.png 2019-05-21 10:00:02 How Cyber-Secure Are Business Travelers? New Report Says Not Very (lien direct)

>I know that open Wi-Fi is sometimes better than no Wi-Fi, which is why I always use a VPN when connecting to public networks. But not all business travelers are so careful, according to a new report.

The post How Cyber-Secure Are Business Travelers? New Report Says Not Very appeared first on Security Intelligence.

WiredThreatLevel.png 2019-05-21 10:00:00 The USPS Tests Out Self-Driving Trucks for Hauling Mail (lien direct)

In a two-week test, startup TuSimple will transport mail for the US Postal Service between Phoenix and Dallas.

WiredThreatLevel.png 2019-05-21 10:00:00 Abortion Bans Create a Public Health Nightmare (lien direct)

Making abortion mostly illegal will kick off an unintentional, vast experiment in public health-one where the outcomes are sick or dying women and children.

ANSSI.png 2019-05-21 08:42:04 La sécurité des objets connectés, c\'est possible avec le logiciel libre ! La preuve avec le projet WooKey (lien direct)

WooKey – un modèle concret et libre pour la sécurité des objets connectés Les laboratoires de l\'ANSSI ont développé depuis 2014 un disque dur USB chiffrant sécurisé, qui repose exclusivement sur le logiciel libre. Les nombreux mécanismes matériels et logiciels implémentés lui permettent de résister à tout type d’attaques sophistiquées. En menant à bien ces […]

BBC.png 2019-05-21 07:38:04 Instagram: Facebook probes breach of millions of influencer accounts (lien direct)

An Indian company had stored the data of 49 million Instagram users in an unguarded online database.

Pirate.png 2019-05-21 07:16:02 Etude – 42% des disques usages vendus sur eBay contiennent des données sensibles (lien direct)
Une étude conjointe menée par Ontrack et Blancco révèle que 42% des disques durs d\'occasion vendus sur eBay contiennent des données sensibles. 15% des supports contenaient des données personnelles, exposant les individus au risque de devenir victimes d\'actes de cybercriminalité.
The_Hackers_News.png 2019-05-21 07:03:02 Core Elastic Stack Security Features Now Available For Free Users As Well (lien direct)

Elastic, the company behind the most widely used enterprise search engine ElasticSearch and the Elastic Stack, today announced that it has decided to make core security features of the Elastic Stack free and accessible to all users. ELK Stack or Elastic Stack is a collection of three powerful open source projects-Elasticsearch, Logstash, and Kibana-that many large and small companies are

The_Hackers_News.png 2019-05-21 06:46:01 WEBINAR: How to Get Enterprise Cyber Security for your Mid-Sized Organization (lien direct)

High-quality cybersecurity posture is typically regarded as the exclusive domain of the large and heavy resourced enterprises – those who can afford a multi-product security stack and a skilled security team to operate it. This implies a grave risk to all organizations who are not part of this group, since the modern threat landscape applies to all, regardless of size and vertical. What is

ZDNet.png 2019-05-21 05:34:00 Some Elasticsearch security features are now free for everyone (lien direct)

Company makes TLS support and fine-grained user/role management free for everyone.

SecurityAffairs.png 2019-05-21 05:31:05 MuddyWater BlackWater campaign used new anti-detection techniques (lien direct)

A recent MuddyWater campaign tracked as BlackWater shows that the APT group added new anti-detection techniques to its arsenal. Security experts at Cisco Talos attributed the recently spotted campaign tracked as “BlackWater” to the MuddyWater APT group (aka SeedWorm and TEMP.Zagros).  The researchers also pointed out that the cyber espionage group has been updating its tactics, techniques, […]

The post MuddyWater BlackWater campaign used new anti-detection techniques appeared first on Security Affairs.

SecurityAffairs.png 2019-05-21 05:18:01 US Commerce Department delays Huawei ban for 90 Days (lien direct)

US Commerce Department will delay 90 days before to apply the announced Huawei ban to avoid huge disruption of the operations. During the weekend, the Reuters agency revealed in exclusive that Alphabet Inc\'s Google has suspended some business with Huawei after Trump\'s ban on the telco giant. On Thursday, President Trump added Huawei Technologies to […]

The post US Commerce Department delays Huawei ban for 90 Days appeared first on Security Affairs.

ZDNet.png 2019-05-21 04:15:00 Root account misconfigurations found in 20% of top 1,000 Docker containers (lien direct)

Issue similar to Alpine Linux\'s CVE-2019-5021 impacts 201 other Docker images.

bleepingcomputer.png 2019-05-21 03:30:00 194 of The Top 1000 Docker Containers Don\'t Have Root Passwords (lien direct)

Cisco Talos\' discovery that the Alpine Linux distribution Docker image came with a blank root password (CVE-2019-5021) led to the discovery that 194 of the top 1000 most popular Docker containers also have no root passwords. [...]

CSO.png 2019-05-21 03:00:00 How to implement and use the MITRE ATT&CK framework (lien direct)

Mitigating security vulnerabilities is difficult. Attackers need to exploit just one vulnerability to breach your network, but defenders have to secure everything. That\'s why security programs have been shifting resources toward detection and response: detecting when the bad guys are in your network and then responding to their actions efficiently to gather evidence and mitigate the risk.

bleepingcomputer.png 2019-05-21 00:28:03 Windows 10 Could Break If Capability SIDs Are Removed From Permissions (lien direct)

Microsoft issued a warning yesterday stating that removing Windows account security identifiers (SIDS) that do not have a "friendly" name from security permissions could cause problems in Windows and installed applications. [...]

WiredThreatLevel.png 2019-05-20 23:50:04 GM\'s Big Upgrade, *Game of Thrones*\' Unsatisfying End, and More News (lien direct)

Catch up on the most important news from today in two minutes or less.

SecurityWeek.png 2019-05-20 23:17:05 US Delays Huawei Ban for 90 Days (lien direct)

US officials have issued a 90-day reprieve on their ban on dealing with Chinese tech giant Huawei, saying breathing space was needed to avoid huge disruption.

read more

WiredThreatLevel.png 2019-05-20 23:00:00 Political Parties Still Have Cybersecurity Hygiene Problems (lien direct)

Three years after the DNC hack, a new report finds that political parties around the world have ongoing security flaws that leave them vulnerable to attack.

SecurityAffairs.png 2019-05-20 22:36:05 Data belonging to Instagram influencers and celebrities exposed online (lien direct)

A new data leak made the headlines, a database containing the contact information of millions of Instagram influencers, celebrities and brand accounts has been found online. The news was first reported by the TechCrunch website, a database was left unprotected on an AWS bucket, anyone was able to access it without authentication. The unprotected database was discovered […]

The post Data belonging to Instagram influencers and celebrities exposed online appeared first on Security Affairs.

WiredThreatLevel.png 2019-05-20 22:27:00 James Holzhauer\'s \'Jeopardy!\' Greatness, in Charts (lien direct)

How good is \'Jeopardy!\' champ James Holzhauer? You have to see it to believe it.

ZDNet.png 2019-05-20 22:11:02 Google research: Most hacker-for-hire services are frauds (lien direct)

Survey of 27 hacker-for-hire services found that only five launched attacks against victims.

bleepingcomputer.png 2019-05-20 21:44:00 BlueKeep Remote Desktop Exploits Are Coming, Patch Now! (lien direct)

Security researchers have created exploits for the remote code execution vulnerability in Microsoft\'s Remote Desktop Services, tracked as CVE-2019-0708 and dubbed BlueKeep, and hackers may not be far behind. [...]

Checkpoint.png 2019-05-20 21:02:01 Critical Vulnerability in Windows OS – Learn How To Protect Yourself (lien direct)

  In Brief   In the last few days, Microsoft has released information about a critical vulnerability in the Windows operating system (CVE-2019-0708).  This vulnerability allows remote code execution by an attacker directly from the network using the Remote Desktop Protocol (RDP) in remote desktop services that affects older versions of Windows used by many…

The post Critical Vulnerability in Windows OS – Learn How To Protect Yourself appeared first on Check Point Software Blog.

SecurityWeek.png 2019-05-20 20:44:00 DHS Highlights Common Security Oversights by Office 365 Customers (lien direct)

As organizations migrate to Microsoft Office 365 and other cloud services, many fail to use proper configurations that ensure good security practices, the U.S. Department of Homeland Security\'s (DHS) Cybersecurity and Infrastructure Security Agency (CISA) warns. 

read more

Kaspersky.png 2019-05-20 20:08:03 Sharing Threat Intelligence: Time for an Overhaul (lien direct)

All too often, information-sharing is limited to vertical market silos; to build better defenses, it\'s time to take a broader view beyond the ISAC.

WiredThreatLevel.png 2019-05-20 19:50:04 \'Game of Thrones\' Recap, Season 8 Episode 6: The Endings We Choose to Believe (lien direct)

HBO\'s drama will always have alternative interpretations, debates about its meaning, and revisionist histories-especially now that it\'s over.

WiredThreatLevel.png 2019-05-20 19:49:05 FCC Chair Backs Sprint/T-Mobile Merger, Clearing One Hurdle (lien direct)

Ajit Pai said he\'s satisfied with the companies\' promises to build a 5G network and spin off a subsidiary brand. The Justice Department still has doubts.

no_ico.png 2019-05-20 19:30:01 One Year On And 84% Of UK Consumers Don\'t Think GDPR Has Been Effective (lien direct)

Three-fifths (59%) of consumers would feel more secure if their personal information was protected by their fingerprint  Despite the introduction of the General Data Protection Regulation (GDPR) in May last year, research from IDEX Biometrics Asa has revealed UK consumers don\'t feel their personal information is any safer. In fact, 84% of respondents don\'t think GDPR …

The ISBuzz Post: This Post One Year On And 84% Of UK Consumers Don\'t Think GDPR Has Been Effective appeared first on Information Security Buzz.

SecurityWeek.png 2019-05-20 19:27:05 Siemplify Raises $30 Million in Series C Funding (lien direct)

Siemplify, a New York, NY-based provider of security orchestration, automation and response (SOAR) tools, today announced that it has secured $30 million in a Series C funding round led by Georgian Partners.

read more

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21

Information mise à jours le: 2019-05-27 08:01:36
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Notre RSS (filtré) Twitter