What's new arround internet

Src Date (GMT) Titre Description Tags Stories Notes
Blog.png 2019-05-20 19:26:00 MY TAKE: Android users beware: Google says \'potentially harmful apps\' on the rise (lien direct)

Even if your company issues you a locked-down smartphone, embracing best security practices remains vital Our smartphones. Where would we be without them? Related Q&A: Diligence required of Android users If you\'re anything like me, making a phone call is the fifth or sixth reason to reach for your Android or iPhone. Whichever OS you […]

Kaspersky.png 2019-05-20 18:44:05 Windows 10 Update Bricks PCs, Microsoft Offers Workarounds (lien direct)

A glitch in Microsoft\'s Windows 10 update is causing systems to freeze after users tried to use the System Reboot function. Luckily, workarounds exist.

SecurityAffairs.png 2019-05-20 18:23:05 Linux kernel privilege escalation flaw CVE-2019-11815 affects RDS (lien direct)

Experts discovered a privilege escalation vulnerability in the Linux Kernel, tracked as CVE-2019-11815, that affects the implementation of RDS over TCP. Experts discovered a memory corruption vulnerability in Linux Kernel that resides in the implementation of the Reliable Datagram Sockets (RDS) over TCP. The vulnerability tracked as CVE-2019-11815 could lead to privilege escalation, it received a […]

The post Linux kernel privilege escalation flaw CVE-2019-11815 affects RDS appeared first on Security Affairs.

WiredThreatLevel.png 2019-05-20 18:05:03 \'Game of Thrones\': The Fans Were the Biggest Losers (lien direct)

The series finale was better than some expected-but still wildly disappointing.

bleepingcomputer.png 2019-05-20 17:43:02 Firefox Lockwise Aims to Revamp Browser Password Management (lien direct)

Mozilla is rebranding their LockBox password management service as Lockwise and getting ready to start a trial for the desktop versions of Firefox. [...]

SecureMac.png 2019-05-20 17:41:00 Apple Releases iOS 12.3 and Security Updates to Its Products (lien direct)

The newest array of updates from Apple has arrived, with an array of updates for a variety of products addressing numerous security concerns, some of them serious. While these updates, particularly iOS 12.3, also add several new and exciting features that are sure to please users, there are also new layers of security and fresh bug fixes going into place behind the scenes to keep iPhone users safe. Here’s how ...

The post Apple Releases iOS 12.3 and Security Updates to Its Products appeared first on SecureMac.

TechRepublic.png 2019-05-20 17:37:03 The current cybersecurity landscape of guerrilla warfare (lien direct)

A cybersecurity expert discuses breaches, data protection laws, and why he considers multi-factor authentication the beginning of security.

DarkReading.png 2019-05-20 17:30:00 TeamViewer Admits Breach from 2016 (lien direct)

The company says it stopped the attack launched by a Chinese hacking group.

ZDNet.png 2019-05-20 17:02:03 Google changes how the Escape key is handled in Chrome to fight popup ads (lien direct)

Google Chrome v76 is getting a new security feature to fight popup spam.

ESET.png 2019-05-20 16:55:01 What the ban on facial recognition tech will – and will not – do (lien direct)

>As San Francisco moves to regulate the use of facial recognition systems, we reflect on some of the many \'faces\' of the fast-growing technology

The post What the ban on facial recognition tech will – and will not – do appeared first on WeLiveSecurity

SecurityWeek.png 2019-05-20 16:42:05 Linux Kernel Privilege Escalation Vulnerability Found in RDS Over TCP (lien direct)

A memory corruption vulnerability recently found in Linux Kernel\'s implementation of RDS over TCP could lead to privilege escalation. 

Tracked as CVE-2019-11815 and featuring a CVSS base score of 8.1, the flaw impacts Linux kernels prior to 5.0.8, but only systems that use the Reliable Datagram Sockets (RDS) for the TCP module.

read more

no_ico.png 2019-05-20 16:30:01 Top 50 Internet Site Stack Overflow Breached (lien direct)

Developer knowledge sharing site Stack Overflow has confirmed hackers breached its systems, but said customer data is unaffected.  Stack Overflow, founded in 2008, has more than 50 million monthly active users who use the site to share code and knowledge. It remains one of the top 50 most popular sites on the web, according to rankings by internet analytics …

The ISBuzz Post: This Post Top 50 Internet Site Stack Overflow Breached appeared first on Information Security Buzz.

TechRepublic.png 2019-05-20 16:19:00 How has GDPR actually affected businesses? (lien direct)

The EU\'s General Data Protection Regulation is now a year old, and has resulted in financial repercussions and changes to how businesses handle data.

bleepingcomputer.png 2019-05-20 16:10:01 Microsoft Defender ATP Adds Live Response for SecOps (lien direct)

Microsoft announced the addition of live response capabilities to its Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) enabling security operation teams to perform system forensic analysis remotely. [...]

MalwarebytesLabs.png 2019-05-20 15:57:02 A week in security (May 13 – 19) (lien direct) A roundup of security news from May 13–19, including ransomware attacks on the upswing, website hacking, pseudo-VPNs, bloatware, and more.

Categories:

Security world Week in security

Tags:

(Read more...)

The post A week in security (May 13 – 19) appeared first on Malwarebytes Labs.

Kaspersky.png 2019-05-20 15:55:03 Salesforce Woes Linger as Admins Clean Up After Service Outage (lien direct)

An accidental permissions snafu caused a massive outage for all Salesforce customers that continues to affect some businesses.

TechRepublic.png 2019-05-20 15:43:02 How to become a consultant: 15 tips for success (lien direct)

With the rise of the gig economy, now is the time to pursue consulting, according to author Elaine Biech.

Pirate.png 2019-05-20 15:42:01 Vade Secure alerte sur une vaste arnaque à la mise en conformité RGPD (lien direct)
Entré en application, il y a un an (le 25 mai 2018), le RGPD est plus que jamais un prétexte idéal pour des campagnes d\'arnaques ciblant les entreprises françaises.
SecurityWeek.png 2019-05-20 15:39:04 Faulty Database Script Exposed Salesforce Data to Wrong Users (lien direct)

Salesforce Shuts Down Instances After Database Script Erroneously Enabled All Permissions on User Profiles

read more

no_ico.png 2019-05-20 15:30:00 Microsoft RDP Pre-authentication Vulnerability (lien direct)

It has been reported that fears of a massive global computer virus outbreak have prompted Microsoft to issue security updates for very old versions of its Windows software.One patch is for Windows XP, which debuted in 2001 and Microsoft stopped supporting in 2014. Microsoft said the patch closed a hole that could be used to spread a virus. Malicious …

The ISBuzz Post: This Post Microsoft RDP Pre-authentication Vulnerability appeared first on Information Security Buzz.

TechRepublic.png 2019-05-20 15:29:02 Huawei\'s "plan B" smartphone OS: What it needs to succeed (lien direct)

Component manufacturers around the world are cutting off Huawei following an executive order signed by President Trump. As a result, Huawei\'s contingency plan may see the light of day.

Kaspersky.png 2019-05-20 15:14:05 Behind the Naming of ZombieLoad and Other Intel Spectre-Like Flaws (lien direct)

A lot of thought and meaning goes into the naming of infamous CPU side channel flaws, like ZombieLoad, Spectre and Meltdown.

SecurityWeek.png 2019-05-20 15:06:01 Huawei Vows to Deliver Android Security Updates After Google Cut-Off (lien direct)

Future Huawei phones may stop using Android

read more

TechRepublic.png 2019-05-20 15:02:01 The Chuwi Hi10 Air: A serviceable convertible hampered by Windows (lien direct)

The Chuwi Hi10 Air doesn\'t quite live up to its name, but you could certainly do worse.

no_ico.png 2019-05-20 14:50:02 Hacking Tesla Cars- How Leaving A Bluetooth Diagnostics Module Connected Is A Bad Idea (lien direct)

According to new research from Pen Test Partners, hackers could attach an ELM327 Bluetooth module to analyse the traffic and read CAN messages. If left in, a hacker could shut the car down.  Bluetooth 5.5" X3 Large Screen Car HUD Head Up Display With Built-in ELM327 Module 44.99USDhttp://t.co/FipBlxjYbu pic.twitter.com/V7vPghihGX — obd16shop.com (@OBD16shop) August 26, 2015 Dennis Kengo Oka, Senior Solution …

The ISBuzz Post: This Post Hacking Tesla Cars- How Leaving A Bluetooth Diagnostics Module Connected Is A Bad Idea appeared first on Information Security Buzz.

itsecurityguru.png 2019-05-20 14:45:05 The Five Myths Of GDPR. (lien direct)

By Frank Krieger, Vice-President, Governance, Risk and Compliance, iland May 2019 will mark the first anniversary of the General Data Protection Regulation (GDPR), and early numbers make clear that its implementation has been a success as a breach notification law. As such, GDPR has affected multiple aspects of a business. It has created increased requirements […]

The post The Five Myths Of GDPR. appeared first on IT Security Guru.

itsecurityguru.png 2019-05-20 14:44:04 SecureLink Launches SecureDetect Intelligence To Provide Digital Risk Protection Through Strategic Partnership With Digital Shadows. (lien direct)

SecureLink, one of Europe\'s most respected independent cybersecurity and managed service providers, has partnered with Digital Shadows, the leader in digital risk protection to launch SecureDetect Intelligence. This will provide the industry\'s best cyber threat intelligence and digital risk protection as-a-service, and will be immediately available to European enterprises in countries including the UK, Germany, […]

The post SecureLink Launches SecureDetect Intelligence To Provide Digital Risk Protection Through Strategic Partnership With Digital Shadows. appeared first on IT Security Guru.

itsecurityguru.png 2019-05-20 14:44:01 Forcepoint Names John Sorensen As Vice President Of Global Sales Strategy And Execution. (lien direct)

Global cybersecurity leader Forcepoint today announced John Sorensen has joined the company as Vice President of Global Sales Strategy and Execution. Sorensen will report to Chief Revenue Officer Kevin Isaac. In this role, Sorensen will head up a new department to help Forcepoint scale and achieve its growth targets through an enterprise-class customer experience. Sorensen […]

The post Forcepoint Names John Sorensen As Vice President Of Global Sales Strategy And Execution. appeared first on IT Security Guru.

itsecurityguru.png 2019-05-20 14:43:05 ExtraHop Announces New Panorama Partner Program To Accelerate Enterprise Security Modernization. (lien direct)

ExtraHop, provider of enterprise cyber analytics from the inside out, today announced the new ExtraHop Panorama Partner Program. The Panorama Program is designed to enable global channel partners to accelerate the adoption and integration of network traffic analysis (NTA) to help enterprise customers modernize their security operations. Fueled by 10x growth in cybersecurity, ExtraHop is […]

The post ExtraHop Announces New Panorama Partner Program To Accelerate Enterprise Security Modernization. appeared first on IT Security Guru.

itsecurityguru.png 2019-05-20 14:43:01 23% Of Global Domains Targeted By Cyber-Attacks, Says MarkMonito. (lien direct)

Almost one-quarter of brands have had their domain targeted by cyber criminals. This is according to the latest global research report released by MarkMonitor, a world leader in enterprise brand protection. The report also highlighted that 62% of brands reported that cybercrime impacted their business in the last year. Almost half of the sample believes […]

The post 23% Of Global Domains Targeted By Cyber-Attacks, Says MarkMonito. appeared first on IT Security Guru.

itsecurityguru.png 2019-05-20 14:40:03 Javvad Malik Joins KnowBe4 As Security Awareness Advocate. (lien direct)

KnowBe4, the provider of the world\'s largest security awareness training and simulated phishing platform, today announced the appointment of the well-known industry commentator and prolific blogger, Javvad Malik, as Security Awareness Advocate to its EMEA team. Javvad joins KnowBe4 from AT&T Cybersecurity where he was a Security Advocate and takes up his position with immediate […]

The post Javvad Malik Joins KnowBe4 As Security Awareness Advocate. appeared first on IT Security Guru.

itsecurityguru.png 2019-05-20 14:39:05 New SANS Cyber Security Skills Test And Roadshow Aim To Highlight Training Needs. (lien direct)

SANS Institute has launched a new campaign in EMEA to encourage people to test their cyber security knowledge and to help highlight the cyber security skills gap. Starting with a short, fun testcovering topics such as encryption, two-factor authentication, hashing, penetration testing and incident response, the Level Up websiteaims to attract potential new cyber security […]

The post New SANS Cyber Security Skills Test And Roadshow Aim To Highlight Training Needs. appeared first on IT Security Guru.

itsecurityguru.png 2019-05-20 14:39:02 Infosecurity Europe Exhibitor Line-Up Brings Together The \'Who\'s Who\' Of Leading Cyber And Information Security Professionals. (lien direct)

This year\'s Infosecurity Europe – Europe\'s number one information security event – is raising the bar for 2019 with over 400 exhibitors set to attend, featuring some of the most forward-thinking, innovative cyber security companies from around the world. To allow visitors to make the most of the event, Infosecurity Europe has introduced the new […]

The post Infosecurity Europe Exhibitor Line-Up Brings Together The \'Who\'s Who\' Of Leading Cyber And Information Security Professionals. appeared first on IT Security Guru.

grahamcluley.png 2019-05-20 14:35:04 Don\'t have your account hijacked. Secure your online accounts with more than a password, says Google (lien direct)

Research published at the end of last week argues that the typical user can significantly harden the security of their online accounts by linking a recovery phone number that can send an alert if there is suspicious activity on the account.

Read more in my article on the Hot for Security blog.

TechRepublic.png 2019-05-20 14:33:02 Vuze XR 360 camera lets you dive into VR (lien direct)

Virtual reality and 360 video isn\'t new technology, but the accessibility to it is, as seen with the Vuze XR 360 camera by HumanEyes.

WiredThreatLevel.png 2019-05-20 14:30:04 \'John Wick\' Shot Down \'Avengers\' at the Box Office (lien direct)

Also, here\'s your first look at the third season of \'Westworld\'.

WiredThreatLevel.png 2019-05-20 14:30:00 GM Gives All Its Vehicles a New Soul (lien direct)

GM\'s new "electronic platform" offers five times the bandwidth and compute power of its predecessor, to deliver better maps and new accessories.

Kaspersky.png 2019-05-20 14:22:00 Slack Bug Allows Remote File Hijacking, Malware Injection (lien direct)

An attacker can supply a malicious hyperlink in order to secretly alter the download path for files shared in a Slack channel.

WiredThreatLevel.png 2019-05-20 14:00:00 The Physics of Mississippi Flood Control (lien direct)

Louisiana\'s Bonnet Carré Spillway diverts some of the Mississippi\'s floodwaters. But it also offers up a wealth of good physics questions.

TechRepublic.png 2019-05-20 13:51:04 Why only 18% of data scientists are women (lien direct)

While data scientist is one of the most in-demand jobs in America, 11% of data teams have no women, according to a Harnham report.

Kaspersky.png 2019-05-20 13:42:05 ZombieLoad: How Intel\'s Latest Side Channel Bug Was Discovered and Disclosed (lien direct)

Daniel Gruss, the researcher behind Spectre, Meltdown - and most recently, ZombieLoad - Intel CPU side channel attacks, gives an inside look into how he discovered the flaws.

bleepingcomputer.png 2019-05-20 13:40:04 MuddyWater Hacking Group Upgrades Arsenal to Avoid Detection (lien direct)

The MuddyWater threat group has been updating its tactics, techniques, and procedures (TTPs) to include a number of new anti-detection techniques designed to provide remote access to compromised systems while evading detection as part of a new campaign dubbed BlackWater. [...]

SecurityAffairs.png 2019-05-20 13:40:01 Defiant Tech firm who operated LeakedSource pleads guilty (lien direct)

The Royal Canadian Mounted Police (RCMP), announced that the company behind LeakedSource, Defiant Tech Inc., pleads guilty in Canada. Defiant Tech Inc., the company behind the LeakedSource.com website, pleaded guilty in Canada. The LeakedSource website was launched in late 2015, in January 2017 the popular data breach notification website has been raided by feds. It reported some of […]

The post Defiant Tech firm who operated LeakedSource pleads guilty appeared first on Security Affairs.

WiredThreatLevel.png 2019-05-20 13:00:00 Star Wars News: The \'Game of Thrones\' Showrunners Are Helming the Next Movie (lien direct)

It\'ll come out in three years, which is about how long it\'ll take people to forgive them for that series finale.

Pirate.png 2019-05-20 13:00:00 Comment sécuriser son site Internet et faire face aux pirates informatiques ? (lien direct)
Dès que vous avez une présence sur Internet, et ce, quelque soit le type de votre site Web, des milliers de pirates informatiques et autres robots malveillant seront là pour chercher la moindre faille et l\'exploiter à leur avantage pour divers actions. Voici les règles de base à respecter pour sécuriser un minimum son site Internet sans être un expert.
bleepingcomputer.png 2019-05-20 12:53:02 Microsoft Officially Releases Microsoft Edge for Mac (lien direct)

Microsoft has officially released the Microsoft Edge for Mac preview, which contains optimizations made specifically to make it look and feel like a macOS application. [...]

SecurityWeek.png 2019-05-20 12:51:05 TeamViewer Confirms It Was Hacked in 2016 (lien direct)

Remote control and support solutions provider TeamViewer has confirmed that hackers likely operating out of China breached its systems back in 2016, but the company decided not to disclose the incident at the time as it found no evidence that it affected customers.

read more

TechRepublic.png 2019-05-20 12:47:05 How to block hijacking attacks on your Google account (lien direct)

Bot and phishing attacks can compromise your G Suite account, but there is an easy way to block the majority of these attempts, according to Google.

BBC.png 2019-05-20 12:19:01 Huawei\'s Android loss: How it affects you (lien direct)

Google\'s move to end business ties with Huawei will affect current devices and future purchases.

SecurityWeek.png 2019-05-20 12:09:01 How to Evaluate Threat Intelligence Vendors That Cover the Deep & Dark Web (lien direct)

Deep & dark web (DDW) communities have long been must-have data sources for threat intelligence programs, but only recently has the market caught up with this need.

read more

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21

Information mise à jours le: 2019-05-27 08:01:36
Voir la liste des sources.

Mon email:

Vous souhaitez ne rien manquer: Notre RSS (filtré) Twitter