What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
bleepingcomputer.png 2019-03-20 05:30:00 Fake eBay Ad in Google Search Led to Tech Support Scams (lien direct)

A fake advertisement in the Google search results has been running for the past week that looked just like a legitimate ad for eBay. When you clicked on it, though, instead of being brought to the auction site you would be shown an incredibly annoying tech support scam that would try to lock up your browser. [...]

bleepingcomputer.png 2019-03-20 03:27:03 KDE Connect Kicked From Google Play, Returns Less the App It Was (lien direct)

Google today temporarily removed KDE Connect from Play store because it violated a newly-imposed policy for SMS and Call Logs permissions, which the companion app needs in order to offer a full-featured experience. [...]

CSO.png 2019-03-20 03:00:00 What is malvertising? And how to protect against it (lien direct)

Malvertising definition

Malvertising, a word that blends malware with advertising, refers to a technique cybercriminals use to target people covertly. Typically, they buy ad space on trustworthy websites, and although their ads appear legitimate, they have malicious code hidden inside them. Bad ads can redirect users to malicious websites or install malware on their computers or mobile devices.

CSO.png 2019-03-20 03:00:00 How to audit Windows Task Scheduler for cyber-attack activity (lien direct)

Recently Google announced two zero-days that impacted both the Chrome browser and Windows 7 operating system. Google released an update to Chrome to protect users from the issue, and Microsoft patched the Windows 7 zero-day with the March 12 updates. At this time the attack is only seen on Windows 7, and Google believes that Windows 10 is not vulnerable to the attack due to its sandbox technologies.

To read this article in full, please click here

The_Hackers_News.png 2019-03-20 02:41:03 PuTTY Releases Important Software Update to Patch 8 High-Severity Flaws (lien direct)

The popular SSH client program PuTTY has released the latest version of its software that includes security patches for 8 high-severity security vulnerabilities. PuTTY is one of the most popular and widely used open-source client-side programs that allows users to remotely access computers over SSH, Telnet, and Rlogin network protocols. Almost 20 months after releasing the last version of

The_Hackers_News.png 2019-03-20 01:50:05 Google Will Prompt European Android Users to Select Preferred Default Browser (lien direct)

Google announced some major changes for its Android mobile operating system in October after the European Commission hit the company with a record $5 billion antitrust fine for pre-installing its own apps and services on third-party Android phones. The European Commission accused Google of forcing Android phone manufacturers to "illegally" tie its proprietary apps and services-specifically,

WiredThreatLevel.png 2019-03-20 01:22:04 Facebook Changes Its Ad Tech to Stop Discrimination (lien direct)

As part of a settlement of five legal cases that claimed Facebook allowed advertisers to discriminate against minorities, the company is making changes to its ad-targeting technology.

itsecurityguru.png 2019-03-19 22:58:04 99% Of SMEs Do Not Have Sufficient Skills To Prevent Cyberattacks. (lien direct)

An alarming cybersecurity skills shortage has been exposed with just one in five companies revealed to have sufficient in-house capability to protect critical assets from attack, a study has found. 96% of those hit by a data breach in the last year report that inadequate security testing was at least somewhat responsible for the issue. […]

The post 99% Of SMEs Do Not Have Sufficient Skills To Prevent Cyberattacks. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-19 22:53:03 Proofpoint Research Reveals 65% Increase In Cloud Application Attacks In Q1 2019; 40% Of Attacks Originating From Nigeria. (lien direct)

Proofpoint, Inc., a leading cybersecurity and compliance company, today released its Cloud Application Attack Snapshot: Q1 2019 research, which examined over one hundred thousand cloud application attacks aimed at global organizations between September 2018 and February 2019. Overall, targeting attempts increased by 65 percent during that time period with 40 percent originating in Nigeria. China […]

The post Proofpoint Research Reveals 65% Increase In Cloud Application Attacks In Q1 2019; 40% Of Attacks Originating From Nigeria. appeared first on IT Security Guru.

ZDNet.png 2019-03-19 22:52:03 Kaspersky files antitrust complaint against Apple in Russia (lien direct)

After Spotify complained about Apple\'s unfair App Store policies to EU authorities, Kaspersky does the same in Russia.

itsecurityguru.png 2019-03-19 22:51:05 Neustar Named A Leader In IDC MarketScape Worldwide DDoS Prevention Report. (lien direct)

Neustar®, Inc., a trusted, neutral provider of real-time information services, announced today that it has been named a Leader in the IDC MarketScape: Worldwide DDoS Prevention Solutions 2018- 2019 Vendor Assessment (DOC # US43699318 March 2019). In the published excerpt, Neustar\'s advanced features, functionality, detection and mitigation techniques were all cited as strengths within the […]

The post Neustar Named A Leader In IDC MarketScape Worldwide DDoS Prevention Report. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-19 22:50:02 The Biometric Smart Card: Connecting The Digitally Excluded. (lien direct)

By Stan Swearingen, CEO of IDEX Biometrics Digital inclusion is the ability of individuals to access and use information and communication technologies (ICT). Even in today\'s hyper-connected and technologically advanced world, there are still those who struggle to access basic IT and are being excluded as a result. In fact, according to recent research, 11.5m […]

The post The Biometric Smart Card: Connecting The Digitally Excluded. appeared first on IT Security Guru.

itsecurityguru.png 2019-03-19 22:48:01 Over Half Of European Organisations Have Suffered Consequences Caused By At Least One Cyberattack In The Last Two Years. (lien direct)

With the complexity of IT business infrastructure on the rise and the continuously evolving threat landscape, IT decision makers find it increasingly challenging to safeguard their organisations from cyberattacks – more than half of European businesses (54%) have faced at least one cyberattack in the last 24 months which resulted in some sort of disruption […]

The post Over Half Of European Organisations Have Suffered Consequences Caused By At Least One Cyberattack In The Last Two Years. appeared first on IT Security Guru.

WiredThreatLevel.png 2019-03-19 21:56:00 The Internet Made Dumbledore Gay (lien direct)

J.K. Rowling seems to have lost touch with, if not downright alienated, the portion of the internet she hopes to engage with and delight. Are fans partly to blame?

Kaspersky.png 2019-03-19 21:07:05 Cardinal RAT Resurrected to Target FinTech Firms (lien direct)

A long-quiet malware family has been spotted targeting financial technology firms, armed with new obfuscation techniques to avoid detection.

Kaspersky.png 2019-03-19 20:43:00 Host of Flaws Found in CUJO Smart Firewall (lien direct)

Some of the flaws would allow remote code-execution.

Blog.png 2019-03-19 20:25:02 Norsk Hydro Hit with \'Severe\' LockerGoga Ransomware Attack (lien direct)

Global aluminum manufacturer Norsk Hydro was hit with an alleged ransomware attack Tuesday. The attack is having a major impact on the company\'s global business and production.

The post Norsk Hydro Hit with ‘Severe’ LockerGoga Ransomware Attack appeared first on The Security Ledger.

-->
Kaspersky.png 2019-03-19 19:40:03 Podcast: The High-Risk Threats Behind the Norsk Hydro Cyberattack (lien direct)

Threatpost talks to Phil Neray with CyberX about Tuesday\'s ransomware attack on aluminum producer Norsk Hydro, and how it compares to past manufacturing attacks like Triton, WannaCry and more.

TechRepublic.png 2019-03-19 19:17:00 How Facebook uses art to improve employee well-being (lien direct)

At SXSW, the Facebook Art Dept. made its public debut with artists working on a massive scale public mural that has AR features when viewed through a mobile app.

bleepingcomputer.png 2019-03-19 18:47:00 Heeere\'s Clippy! He\'s Back, but Only for Microsoft Teams. (lien direct)

Microsoft just revived the heavily criticized and parodied Clippy, the default Microsoft Office assistant for 4 years - yes, we thought it was longer too - transforming it into an open source Microsoft Teams app designed to help you add various Clippy animated emotes within messages. [...]

SecurityAffairs.png 2019-03-19 18:34:02 Experts observed the growth of hi-tech crime landscape in Asia in 2018 (lien direct)

Security experts at Group-IB presented at Money2020 Asia the results of an interesting analysis of hi-tech crime landscape in Asia in 2018. Group-IB, an international company that specializes in preventing cyberattacks, on Money2020 Asia presented the analysis of hi-tech crime landscape in Asia in 2018 and concluded that cybercriminals show an increased interest in Asia […]

The post Experts observed the growth of hi-tech crime landscape in Asia in 2018 appeared first on Security Affairs.

Kaspersky.png 2019-03-19 18:31:03 Old Tech Spills Digital Dirt on Past Owners (lien direct)

Researcher buys old computers, flash drives, phones and hard drives and finds only two properly wiped devices out of 85 examined.

SecurityWeek.png 2019-03-19 18:28:00 Industrial Cybersecurity Firm Nozomi Launches Research Department (lien direct)

Industrial cybersecurity solutions provider Nozomi Networks on Tuesday announced the formal launch of the company\'s research department, Nozomi Networks Labs.

read more

SecurityWeek.png 2019-03-19 18:21:01 Cloudflare Launches New HTTPS Interception Detection Tools (lien direct)

Security services provider Cloudflare on Monday announced the release of two new tools related to HTTPS interception detection. 

read more

WiredThreatLevel.png 2019-03-19 18:21:00 HP\'s New Reverb VR Headset Bumps Up the Resolution (lien direct)

The price has swelled too. The Reverb bundle will cost between $599 and $649 when it ships in late April.

WiredThreatLevel.png 2019-03-19 18:15:00 With Google Stadia, Gaming Dreams Head For the Cloud (lien direct)

The company this morning introduced Stadia, its new vision for anywhere, any-device gaming.

WiredThreatLevel.png 2019-03-19 18:03:04 The Deeper Education Issue Under the College Bribery Scandal (lien direct)

There\'s a vast pool of talent out there. But they need access to courses that suit their learning style and schedules, according to Sebastian Thrun.

SecurityWeek.png 2019-03-19 17:53:01 Mobile App Security Firm Blue Cedar Raises $17 Million (lien direct)

Blue Cedar, a San Francisco-based company that specializes in securing mobile applications, on Tuesday announced that it raised $17 million in a Series B funding round.

read more

SecurityThroughEducation.PNG 2019-03-19 17:43:00 Introverted Social Engineer (lien direct)

When you think of a social engineer do you picture a charming, socialite type? A person who can influence and talk to anyone with very little effort? That does sound like a very effective SE. So, is there a place for an introverted social engineer? In this blog find out why Introversion is not a barrier to being a professional social engineer.

The post Introverted Social Engineer appeared first on Security Through Education.

TechRepublic.png 2019-03-19 17:15:03 How to install Cachet status page system on Ubuntu Server 18.04 (lien direct)

Keep clients and users apprised of server downtime with the Cachet status page system.

ZDNet.png 2019-03-19 17:15:00 Severe security bug found in popular PHP library for creating PDF files (lien direct)

Vulnerability patched last year, but many websites and web apps will most likely remain vulnerable for years.

Korben.png 2019-03-19 17:12:02 Webosaures – Techniques d\'écriture pour le web (lien direct)

Nouvelle semaine, nouvel épisode des Webosaures. Lors de cet épisode, avec Rémi, nous avons abordé le vaste sujet de l’écriture pour le web. Avec en vrac les thématiques suivantes : Curation Angles d’approche pour articles de blog Ligne éditoriale Poster sur les réseaux sociaux SEO Promouvoir son contenu Corriger ses … Suite

Blog.png 2019-03-19 17:09:04 Podcast Episode 138: Hacker President? Joseph Menn of Reuters talks Beto and Cult of the Dead Cow (lien direct)

In this exclusive podcast interview with Security Ledger, Reuters investigative technology journalist Joseph Menn talks about his upcoming book on the iconic hacking group Cult of the Dead Cow and his discovery that U.S. presidential candidate Beto O\'Rourke of Texas was an early member.

The post Podcast Episode 138: Hacker President? Joseph Menn...

Read the whole entry...  _!fbztxtlnk!_ https://feeds.feedblitz.com/~/599802276/0/thesecurityledger -->»

WiredThreatLevel.png 2019-03-19 16:43:02 Trump\'s Casinos Couldn\'t Make Atlantic City Great Again (lien direct)

Photographer Brian Rose turns his lens on the city where Donald Trump built (and nearly destroyed) his reputation.

TechRepublic.png 2019-03-19 16:30:03 Google and Harvard test a machine learning approach to food safety (lien direct)

A new digital health epidemiology model that uses a data-driven approach to foodborne illnesses shows promising results.

DarkReading.png 2019-03-19 16:30:00 Microsoft Office Dominates Most Exploited List (lien direct)

Lone Android vulnerability among the top 10 software flaws most abused by cybercriminals.

SecurityWeek.png 2019-03-19 16:26:00 Microsoft Dominates 2018\'s Most Exploited Vulnerabilities (lien direct)

Eight of the top ten most exploited vulnerabilities in 2018 affected Microsoft products. Only one -- but the second most exploited -- was an Adobe vulnerability. The last one, ranking at the ninth most exploited vulnerability of 2018, was an Android vulnerability.

read more

no_ico.png 2019-03-19 16:25:03 Threat Modeling in 2019 (lien direct)

RSA has posted a video of my talk, “Threat Modeling in 2019”

DarkReading.png 2019-03-19 16:25:00 DDoS Attack Size Drops 85% in Q4 2018 (lien direct)

The sharp decline follows an FBI takedown of so-called "booter," or DDoS-for-hire, websites in December 2018.

SecurityWeek.png 2019-03-19 16:11:00 Researcher Finds Novel Bug Class in Windows Kernel (lien direct)

A security researcher working with Google Project Zero has discovered a novel bug class that impacts Windows and some of its drivers. 

read more

SecurityWeek.png 2019-03-19 15:53:05 Aluminum Giant Norsk Hydro Hit by Ransomware (lien direct)

Norwegian metals and energy giant Norsk Hydro, one of the world\'s biggest aluminum producers, has been hit by a ransomware attack that has impacted operations, forcing the company to resort to manual processes.

read more

SecurityAffairs.png 2019-03-19 15:53:02 Aluminum producer Norsk Hydro hit by a massive cyber attack (lien direct)

The giant of aluminum producers, Norway’s Norsk Hydro, announced on Tuesday that it had been hit by a cyber-attack of unknown origin. One of the biggest Aluminum producer, the Norwegian Norsk Hydro, suffered an extensive cyber attack. “Hydro became victim of an extensive cyberattack in the early hours of Tuesday, impacting operations in several of […]

The post Aluminum producer Norsk Hydro hit by a massive cyber attack appeared first on Security Affairs.

ESET.png 2019-03-19 15:38:05 You should pick your Android security app wisely, test shows (lien direct)

>It\'s prudent to get a security solution for your device, but a test by AV-Comparatives shows why you need to choose judiciously

The post You should pick your Android security app wisely, test shows appeared first on WeLiveSecurity

Kaspersky.png 2019-03-19 15:26:04 Researcher Says NSA\'s Ghidra Tool Can Be Used for RCE (lien direct)

Researchers have released a proof-of-concept showing how a XXE vulnerability can be exploited to attack Ghidra project users.

TechRepublic.png 2019-03-19 15:14:00 Why Adobe and Moleskine want to sync your sketchbook (lien direct)

Thanks to the latest partnership between Adobe and Moleskine, your sketchbook doodles or drawings can easily sync up to the Adobe Creative Suite.

MalwarebytesLabs.png 2019-03-19 15:00:00 New research finds hospitals are easy targets for phishing attacks (lien direct) New research from Brigham and Women\'s Hospital in Boston finds hospital employees are extremely vulnerable to phishing attacks. The study highlights just how effective phishing remains as a tactic, and why awareness of email scams is more critical than ever.

Categories:

101 Business

Tags:

(Read more...)

The post New research finds hospitals are easy targets for phishing attacks appeared first on Malwarebytes Labs.

TechRepublic.png 2019-03-19 15:00:00 Trello gets 13 new enterprise features to improve team security, productivity (lien direct)

The biggest Trello Enterprise update since 2015 gives organizations more security controls and management functionality.

SecurityAffairs.png 2019-03-19 14:57:04 New JNEC.a Ransomware delivered through WinRAR exploit (lien direct)

A new strain of ransomware tracked as JNEC.a is spreading through an exploit that triggers the recently discovered vulnerability in WinRAR. The ransomware was involved in the attacks observed by the Qihoo 360 Threat Intelligence Center in the wild, threat actors used an archive named “vk_4221345.rar” that delivers JNEC.a when its contents are extracted with […]

The post New JNEC.a Ransomware delivered through WinRAR exploit appeared first on Security Affairs.

Kaspersky.png 2019-03-19 14:53:02 Norsk Hydro Calls Ransomware Attack \'Severe\' (lien direct)

When asked if the company plans to pay the ransom, its CFO said its main strategy is to use the backup data stored in the system.

DarkReading.png 2019-03-19 14:30:00 The Case of the Missing Data (lien direct)

The latest twist in the Equifax breach has serious implications for organizations.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21

Information mise à jours le: 2019-03-26 04:01:32
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Notre RSS (filtré) Twitter