www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-13T13:07:03+00:00 www.secnews.physaphae.fr Graham Cluley - Blog Security Who on earth would want to use Google\'s Allo chat app? Who on earth would want to use Google's Allo chat app?Google makes a u-turn on privacy with its new chat app, Allo. ]]> 2016-09-21T23:06:38+00:00 https://www.grahamcluley.com/2016/09/earth-want-use-googles-allo-chat-app/ www.secnews.physaphae.fr/article.php?IdArticle=107720 False None None None Graham Cluley - Blog Security Danger USB! Oz police warn of malware in the letterbox Danger USB! Oz police warn that criminals are more desperate than everResidents in a suburb of Melbourne, Australia, have been blighted by a plague of malicious USB sticks. ]]> 2016-09-21T22:35:00+00:00 https://www.grahamcluley.com/2016/09/danger-usb-police-warn-malware-letterbox/ www.secnews.physaphae.fr/article.php?IdArticle=107612 False None None 2.0000000000000000 Graham Cluley - Blog Security Almost any file is up for grabs when this Android banking trojan attacks Almost any file is up for grabs when this Android banking trojan attacksAt first glance, Tordow behaves like other mobile banking malware targeting the Android operating system. But then things get somewhat more sophisticated... David Bisson reports. ]]> 2016-09-21T21:48:40+00:00 https://www.grahamcluley.com/2016/09/file-grabs-android-banking-trojan-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=107613 False None None None Graham Cluley - Blog Security Cisco customers targeted by hackers using leaked NSA hacking tools Cisco customers targeted by hackers using leaked NSA hacking toolsCisco has announced it will be releasing a patch for a zero-day vulnerability exploited by a group of NSA hackers. David Bisson reports. ]]> 2016-09-20T16:29:22+00:00 https://www.grahamcluley.com/2016/09/cisco-customers-targeted-hackers-using-leaked-nsa-hacking-tools/ www.secnews.physaphae.fr/article.php?IdArticle=100331 False None None None Graham Cluley - Blog Security Android community MoDaCo suffers data breach, user database stolen Modaco thumbCriminal hackers appear to have broken in via compromised admin account. ]]> 2016-09-20T13:46:20+00:00 https://www.grahamcluley.com/2016/09/android-community-modaco-suffers-data-breach-user-database-stolen/ www.secnews.physaphae.fr/article.php?IdArticle=99600 False None None None Graham Cluley - Blog Security How any Facebook page could have been hijacked or deleted, in just 10 seconds How any Facebook page could have been hijacked or deleted... in just 10 secondsCan you imagine just how much online criminals would pay to be able to hijack, and even delete, any page on Facebook? Read more in my article on the Hot for Security blog. ]]> 2016-09-20T12:26:43+00:00 https://www.hotforsecurity.com/blog/how-any-facebook-page-could-have-been-hijacked-or-deleted-in-just-10-seconds-16690.html www.secnews.physaphae.fr/article.php?IdArticle=99252 False None None None Graham Cluley - Blog Security Watch Teslas being hacked as they drive, from up to 20 km away Watch Teslas being hacked as they drive, from up to 20 km awayChinese hackers literally open a backdoor on a Tesla car... ]]> 2016-09-20T12:22:43+00:00 https://www.grahamcluley.com/2016/09/watch-teslas-hacked-drive-20-away/ www.secnews.physaphae.fr/article.php?IdArticle=99253 False None Tesla None Graham Cluley - Blog Security Bypass an iPhone\'s passcode lock for $100 Iphone5c thumbWhich is a lot cheaper than the $1.3 million the FBI paid to break into the San Bernardino shooter's iPhone 5c. ]]> 2016-09-19T20:49:27+00:00 https://www.grahamcluley.com/2016/09/bypass-iphones-passcode-lock-100/ www.secnews.physaphae.fr/article.php?IdArticle=95751 False None None None Graham Cluley - Blog Security Misspelled Malwarebytes isn\'t the real deal. It\'s ransomware! Misspelled Malwarebytes isn't the real deal. It's ransomware!A piece of software masquerading as a security product from Malwarebytes is making its rounds on the web and distributing ransomware to unsuspecting users. David Bisson reports. ]]> 2016-09-19T16:18:22+00:00 https://www.grahamcluley.com/2016/09/misspelled-malwarebytes-isnt-real-deal-ransomware/ www.secnews.physaphae.fr/article.php?IdArticle=94152 False None None None Graham Cluley - Blog Security Uninstall your anti-virus says Amazon, if you want to work for us from home Uninstall your anti-virus says Amazon, if you want to work for us from homeYou may want to earn money working from home as a customer service rep for Amazon, but they have some worrying rules about what you should (and shouldn't) be running on your computer. Watch my latest video to learn more. ]]> 2016-09-19T15:26:10+00:00 https://www.grahamcluley.com/2016/09/uninstall-anti-virus-amazon/ www.secnews.physaphae.fr/article.php?IdArticle=93822 False None None None Graham Cluley - Blog Security Fight cybercrime by "plug and play" encrypting all data and communications Fight cybercrime by Graham Cluley Security News is sponsored this week by the folks at Corporate Encryption. Thanks to the great team there for their support! Read below to learn more about their enterprise encryption solution. We encrypt email, chat, data, calling, calendars etc. – also on smartphones and mobile devices. TEP is the World's first turnkey enterprise encryption solution, enabling business to communicate and collaborate securely - while still being efficient and flexible. The platform is web-based and also comes with apps. Tep dashboard TEP also helps enterprises get ready for the relative high standards introduced by EU's new data protection law - General Data Protection Regulation (GDPR). The platform solves a major "headache" in one go. TEP's end-to-end encryption ensures only the sender and intended recipients are able to decode the communications and data. All data is protected, both while in transit and at rest. In short, it's all about who has the access to the encryption keys. Communications and data are protected by strong AES 256-bit end-to-end encryption and RSA 2048-bit key cryptography. Combined with our proprietary platform integration, this is the most secure and easy-to-use platform offered to the enterprise market. Your communications and data are extremely secure and protected. They deserve it. Enterprises can choose between a hosted - or an on premise solution, depending on data storage needs and requirements. TEP is developed by Corporate Encryption GmbH, a cyber-security company, specialized in secure encrypted communications. We are a strong International team of security, cyber-forensic and encryption specialists, with offices in Switzerland and Denmark. Click here to learn more, register for a free demo, and start protecting your enterprise and clients against cybercrime.
If you're interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here. ]]>
2016-09-19T09:12:05+00:00 https://www.grahamcluley.com/2016/09/feed-sponsor-corporate-encryption/ www.secnews.physaphae.fr/article.php?IdArticle=91911 False None None None
Graham Cluley - Blog Security How an attacker could exploit Windows Safe Mode to steal users\' passwords How an attacker could exploit Windows Safe Mode to steal users' passwordsSafe mode doesn't necessarily mean secure mode. David Bisson reports. ]]> 2016-09-18T19:27:34+00:00 https://www.grahamcluley.com/2016/09/attacker-exploit-windows-safe-mode-steal-users-passwords/ www.secnews.physaphae.fr/article.php?IdArticle=88357 False None None None Graham Cluley - Blog Security Anti-virus industry\'s bête noire Tavis Ormandy to enter the lion\'s den The anti-virus industry's bête noire to speak at the anti-virus industry conferenceThe Virus Bulletin conference is being held in Denver, Colorado, next month. And they have a controversial guest... ]]> 2016-09-16T16:30:39+00:00 https://www.grahamcluley.com/2016/09/anti-virus-industry-conference-tavis-ormandy/ www.secnews.physaphae.fr/article.php?IdArticle=76835 False None None 4.0000000000000000 Graham Cluley - Blog Security Cover your webcam - protect your privacy from hackers Webcam video thumbDon't let hackers spy upon you by hijacking your webcam. Cover your webcam when you're not using it. In this video, Graham Cluley describes the threat. ]]> 2016-09-16T15:20:53+00:00 https://www.grahamcluley.com/2016/09/cover-webcam-protect-privacy-hackers/ www.secnews.physaphae.fr/article.php?IdArticle=76386 False None None None Graham Cluley - Blog Security Some security advice for Colin Powell to better protect his Gmail account Some email security advice for Colin PowellFormer US Secretary of State Colin Powell has had his personal Gmail account hacked. Which is kind of embarrassing... Here's what people should do to better protect their email accounts. ]]> 2016-09-16T10:33:36+00:00 https://www.grahamcluley.com/2016/09/email-gmail-security-advice-colin-powell/ www.secnews.physaphae.fr/article.php?IdArticle=75110 False None None None Graham Cluley - Blog Security How one teen gained access to T-Mobile\'s network for free - without any data plan or contract Teen gains access to T-Mobile network for free - without any data plan or contractA teenager recently found a way to gain access to T-Mobile's mobile network for free - that is, without any data plan or contracts. David Bisson reports. ]]> 2016-09-15T16:23:41+00:00 https://www.grahamcluley.com/2016/09/teen-gains-access-mobile-network-free-data-plan-contract/ www.secnews.physaphae.fr/article.php?IdArticle=70022 False None None None Graham Cluley - Blog Security Hack an Android phone remotely, and win $200,000 Hack an Android phone remotely, and win $200,000Google has announced a hacking contest offering a $200,000 first prize to vulnerability hunters around the world if they can find a way to remotely hack an Android device knowing nothing more than its phone number or email address. Read more in my article on the Hot for Security blog. ]]> 2016-09-15T11:18:29+00:00 https://www.hotforsecurity.com/blog/hack-an-android-phone-remotely-and-win-200000-16656.html www.secnews.physaphae.fr/article.php?IdArticle=68650 False None None None Graham Cluley - Blog Security Turning the tables on a scammer... by contacting his mum on Facebook Turning the tables on a scammer... by contacting his mum on FacebookSome scammers think the chances of the police ever catching them are low, but there's one thing they are afraid of: their mum. ]]> 2016-09-15T08:38:56+00:00 https://www.grahamcluley.com/2016/09/turning-tables-scammer-contacting-mum-facebook/ www.secnews.physaphae.fr/article.php?IdArticle=67924 False None None None Graham Cluley - Blog Security Google Play obsessed with tracking Android users\' every move Google maps surveillance thumbGoogle Play has a keen interest in tracking Android users as they go about their day, and there's little that can be done to stop it. David Bisson reports. ]]> 2016-09-14T21:47:26+00:00 https://www.grahamcluley.com/2016/09/google-play-obsessed-tracking-android-users/ www.secnews.physaphae.fr/article.php?IdArticle=65757 False None None None Graham Cluley - Blog Security Adblock Plus wants to put more ads on your screen Adblock Plus wants to put more ads on your screenWhen an ad blocker announces its plans to put more ads on users' screens, you can probably imagine the internet's reaction... ]]> 2016-09-14T15:49:30+00:00 https://www.grahamcluley.com/2016/09/adblock-plus-wants-ads-screen/ www.secnews.physaphae.fr/article.php?IdArticle=64127 False None None None Graham Cluley - Blog Security iPhones bricked as Apple releases iOS 10.0 (and then - rather rapidly - 10.0.1) Apple releases iOS 10.0 (and then - rather rapidly - 10.0.1)The "biggest release of iOS ever" is plagued by reports of bricked iPhones and iPads. Thankfully, Apple was quick to release a fix - version 10.0.1. ]]> 2016-09-14T00:32:34+00:00 https://www.grahamcluley.com/2016/09/apple-releases-ios-10/ www.secnews.physaphae.fr/article.php?IdArticle=61988 False None None None Graham Cluley - Blog Security A patchtastic day for Flash and Windows users - don\'t delay! A patchtastic day for Flash and Windows users - don't delay!Don't drag your feet. If the likes of Adobe and Microsoft describe vulnerabilities as critical it's important that you patch them at your earliest opportunity. ]]> 2016-09-13T23:51:48+00:00 https://www.grahamcluley.com/2016/09/patchtastic-day-flash-windows-users-dont-delay/ www.secnews.physaphae.fr/article.php?IdArticle=61796 False None None None Graham Cluley - Blog Security Hacker jailed after stealing thousands of pounds worth of gold bullion Gold bullion hackerA Canary Wharf-based hacker compromised a gold bullion trading company in order to gather information that would help his gang intercept the valuable packages. ]]> 2016-09-13T20:48:17+00:00 https://www.grahamcluley.com/2016/09/hacker-jailed-stealing-thousands-pounds-worth-gold-bullion/ www.secnews.physaphae.fr/article.php?IdArticle=61222 False None None None Graham Cluley - Blog Security \'Now the cyber is so big\' says Donald Trump 'Now the cyber is so big' says Donald Trump"You know cyber is becoming so big today. lt's becoming something that a number of years ago, a short number of years ago wasn't even a word. Now the cyber is so big." Hear what I think in my latest video. ]]> 2016-09-13T20:18:23+00:00 https://www.grahamcluley.com/2016/09/cyber-big-says-donald-trump/ www.secnews.physaphae.fr/article.php?IdArticle=61080 False None None None Graham Cluley - Blog Security Backdoor targeting corporate data through... Microsoft Publisher files? Backdoor targeting corporate data through... Microsoft Publisher files?Malicious hackers are abusing Microsoft Publisher files to try to infect businesses with a backdoor and steal corporate data. David Bisson reports. ]]> 2016-09-13T19:58:59+00:00 https://www.grahamcluley.com/2016/09/backdoor-microsoft-publisher/ www.secnews.physaphae.fr/article.php?IdArticle=61081 False None None None Graham Cluley - Blog Security No over-the-air update means GM has to recall four million cars to fix fatal software defect No over-the-air update means GM has to recall four million cars to fix fatal software defectUS motor company General Motors is recalling four million vehicles worldwide due to a software bug that has been linked to at least one death. Read more in my article on the Hot for Security blog. ]]> 2016-09-13T14:32:32+00:00 https://www.hotforsecurity.com/blog/no-over-the-air-update-means-gm-has-to-recall-four-million-cars-to-fix-fatal-software-defect-16637.html www.secnews.physaphae.fr/article.php?IdArticle=59884 False None None None Graham Cluley - Blog Security How 911 emergency services across the United States could be knocked offline by a mobile botnet How 911 emergency services across the United States could be knocked offline by a mobile botnetIsraeli researchers have published a paper describing how hackers could use a mobile botnet to threaten the United States's 911 emergency call infrastructure. David Bisson reports. ]]> 2016-09-12T13:00:05+00:00 https://www.grahamcluley.com/2016/09/emergency-services-botnet/ www.secnews.physaphae.fr/article.php?IdArticle=54212 False None None None Graham Cluley - Blog Security Bank\'s data center knocked offline by really loud noise Bank's data center knocked offline by really loud noiseSound is just a vibration. And guess what hard drives don't like? Big vibrations... ]]> 2016-09-12T09:12:07+00:00 https://www.grahamcluley.com/2016/09/banks-data-center-knocked-offline-really-loud-noise/ www.secnews.physaphae.fr/article.php?IdArticle=53416 False None None None Graham Cluley - Blog Security FBI arrests Crackas With Attitude who allegedly hacked CIA boss\'s AOL account FBI arrests Crackas With Attitude who allegedly hacked CIA boss's AOL accountTwo alleged hackers, said to have compromised the online accounts of senior government officials, have had their collars felt. ]]> 2016-09-12T09:07:19+00:00 https://www.grahamcluley.com/2016/09/fbi-arrests-crackas-attitude-allegedly-hacked-cia-bosss-aol-account/ www.secnews.physaphae.fr/article.php?IdArticle=53417 False None None None Graham Cluley - Blog Security Discover VASCO\'s top 10 tips for a successful and secure Mobile First Strategy! Register now for this webinar Discover VASCO's top 10 tips for a successful and secure Mobile First Strategy! Register now for this webinarGraham Cluley Security News is sponsored this week by the folks at VASCO. Thanks to the great team there for their support! VASCO, a global leader in authentication, electronic signatures, and identity management, is sharing its expertise in a free webinar entitled "Top 10 tips for a successful and secure mobile first strategy." Mobile banking has definitely shifted focus from transaction to customer interaction, enabling users to engage with their bank anytime, anywhere and more frequently. But how can you establish a successful and secure mobile first strategy, while keeping an eye on user convenience? Register today for this FREE 30-min webinar! Discover the necessary tips to establish a successful and secure mobile first strategy: Enable more services on mobile Make user experience fast, convenient and secure Score your user's device and context Combat malware and other attacks Adopt mobile as the key to all your banking channels and many more...
If you're interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here. ]]>
2016-09-12T09:05:53+00:00 https://www.grahamcluley.com/2016/09/vasco-feed-sponsor-7/ www.secnews.physaphae.fr/article.php?IdArticle=53418 False Guideline None None
Graham Cluley - Blog Security CallJam malware infects Androids and keeps ringing premium rate numbers CallJam malware infects Androids and keeps ringing premium rate numbersThe CallJam malware masquerades as a four-star rated Android game on Google Play, and has a worrying addiction to making premium rate phone calls. David Bisson reports. ]]> 2016-09-10T08:12:28+00:00 https://www.grahamcluley.com/2016/09/calljam-malware-infects-androids-keeps-ringing-premium-rate-numbers/ www.secnews.physaphae.fr/article.php?IdArticle=41791 False None None None Graham Cluley - Blog Security Facebook censors iconic image of Vietnamese girl fleeing napalm attack written an open letter to Facebook chief Mark Zuckerberg. The reason? Facebook removed a post published by the Norwegian newspaper Aftenposten which contained the Pulitzer Prize-winning photograph of a young girl running naked down a road after being burnt in a napalm attack during the Vietnam war. Listen, Mark, this is serious. First you create rules that don't distinguish between child pornography and famous war photographs. Then you practice these rules without allowing space for good judgement. Finally you even censor criticism against and a discussion about the decision – and you punish the person who dares to voice criticism. Facebook is too powerful, and its decisions often erratic and contradictory. There are plenty of ghastly and unpleasant things on Facebook that it could protect its users from, but to which it chooses to turn a blind eye. However, banning such a well-known and iconic image, a photograph that has gone down in history and helped hasten the end of the Vietnam War, seems absurd. ]]> 2016-09-09T14:41:21+00:00 https://www.grahamcluley.com/2016/09/facebook-censors-iconic-image-vietnamese-girl-fleeing-napalm-attack/ www.secnews.physaphae.fr/article.php?IdArticle=37144 False None None None Graham Cluley - Blog Security Online DDoS service vDOS hacked, spills details of its customers and targets writes: vDOS - a "booter" service that has earned in excess of $600,000 over the past two years helping customers coordinate more than 150,000 so-called distributed denial-of-service (DDoS) attacks designed to knock Web sites offline - has been massively hacked, spilling secrets about tens of thousands of paying customers and their targets. The vDOS database, obtained by KrebsOnSecurity.com at the end of July 2016, points to two young men in Israel as the principal owners and masterminds of the attack service, with support services coming from several young hackers in the United States. If information about vDOS's customers falls into the hands of law enforcement that could prove to be a little... ummm... uncomfortable for those paying to knock innocent websites offline without the permission of their owners. Chances are that many of vDOS's customers may have imagine that their details would have been kept private, and that there would have been little risk of their identities being discovered. That belief was clearly misguided. Security blogger Brian Krebs has the full story, including how for years vDOS used PayPal to launder its ill-gotten gains (they're now accepting payments via Bitcoin). ]]> 2016-09-09T14:12:34+00:00 https://www.grahamcluley.com/2016/09/online-ddos-service-vdos-hacked-spills-details-customers-targets/ www.secnews.physaphae.fr/article.php?IdArticle=37145 True None None None Graham Cluley - Blog Security Unencrypted website? Expect to start being shamed by Google Chrome from January Unencrypted website? Expect to start being shamed by Google Chrome from JanuaryToo many websites are being lax with the security of your passwords and credit card information, and Google says enough is enough. Read more in my article on the Hot for Security blog. ]]> 2016-09-09T13:03:03+00:00 https://www.hotforsecurity.com/blog/unencrypted-website-expect-to-start-being-shamed-by-google-chrome-from-january-16597.html www.secnews.physaphae.fr/article.php?IdArticle=36853 False None None None Graham Cluley - Blog Security Holy Mokes! OS X users warned of sophisticated backdoor malware Holy Mokes! OS X users warned of sophisticated backdoor malwareMac users are at risk of a version of the sophisticated Moke backdoor malware, already discovered for Windows and Linux, that can spy upon you. David Bisson reports. ]]> 2016-09-08T16:24:09+00:00 https://www.grahamcluley.com/2016/09/holy-mokes-users-warned-sophisticated-backdoor-malware/ www.secnews.physaphae.fr/article.php?IdArticle=32398 False None None None Graham Cluley - Blog Security WordPress bloggers \'strongly encouraged\' to immediately apply security update Wordpress thumbWith the huge number of sites running WordPress, and the frequency with which attackers exploit vulnerabilities on the platform to launch malicious attacks, it makes sense for self-hosting bloggers to update their systems as soon as possible. ]]> 2016-09-08T12:48:33+00:00 https://www.grahamcluley.com/2016/09/wordpress-bloggers-strongly-encouraged-immediately-apply-security-update/ www.secnews.physaphae.fr/article.php?IdArticle=31369 False None None None Graham Cluley - Blog Security Want the iPhone 7? Make sure you sell your old phone safely! Want the iPhone 7? Make sure you sell your old phone safely!Tempted to upgrade your old iPhone to a brand new iPhone 7? David Bisson reports on what safety steps you should take before selling your old device. ]]> 2016-09-07T21:58:51+00:00 https://www.grahamcluley.com/2016/09/iphone-7-sell-old-phone-tips/ www.secnews.physaphae.fr/article.php?IdArticle=28299 False None None None Graham Cluley - Blog Security Dell has acquired RSA writes: Today is a new beginning for RSA as we are now a part of the collective team of Dell Technologies, the world's largest privately controlled tech company. No doubt, many of you are asking what the impact of this merger will be to RSA. I am happy to tell you that RSA's mission remains unchanged. And our commitment and passion to help our customers transform their security programs remain unchanged. RSA will continue to focus on delivering solutions that help enable our customers worldwide to create business-driven security strategies that connect business context with threat activities to more quickly and efficiently defend against cyber risk. There will be no changes to our product strategies, sales models, customer support interactions, processes, or resources that we are not driving. The acquisition comes as part of Dell's multi-billion dollar takeover of RSA's parent company EMC. RSA has published customer and partner FAQs. Yeah, yeah... RSA is a security company. That's why it offers its customers FAQs in the form of PDF files. ]]> 2016-09-07T21:26:35+00:00 https://www.grahamcluley.com/2016/09/dell-acquired-rsa/ www.secnews.physaphae.fr/article.php?IdArticle=28136 False None None None Graham Cluley - Blog Security Porn sites are giving up on Adobe Flash - and who can blame them? reports: On Tuesday, porn site Pornhub said it would be ditching all Flash content from its site, opting instead for HTML5, the most recent version of the web language that offers more support for multimedia content. Since hackers have had a number of successes at compromising porn sites, it's notable that one of the largest is taking this step, albeit when Flash is already on its last legs. "It was just a matter of time until we switched, as HTML5 is becoming the standard across platforms. Now makes the most sense as Google and Firefox are slowly pushing Flash support out of their browsers. Plus HTML5 has improved security, better power consumption and it's faster to load," Corey Price, vice president of Pornhub, told Motherboard in an email. “All adult sites should make the transition to HTML5. Flash is nearly dead,” he added. Ahh, la petite mort... It has been a long and lingering death, but when Adobe Flash is finally gone for good, please don't send any flowers. We're well rid of it. If you're bold enough to still be using the internet with Flash enabled please enable "Click to Play" at the very least. But if you want to enter the brave new world of a Flash-less world, here is our guide on how to uninstall it from your computers. ]]> 2016-09-07T21:07:57+00:00 https://www.grahamcluley.com/2016/09/porn-sites-giving-adobe-flash/ www.secnews.physaphae.fr/article.php?IdArticle=28137 False None None None Graham Cluley - Blog Security How to turn the tables on fake CEO scammers Ceo scam thumbA security consultant reveals how he was able to find out information about a scammer, attempting to trick a company into making an urgent wire transfer. Find out how your company can better protect itself from similar business email compromise attacks. ]]> 2016-09-07T20:48:35+00:00 https://www.grahamcluley.com/2016/09/turn-tables-fake-ceo-scammers/ www.secnews.physaphae.fr/article.php?IdArticle=28138 False None None None Graham Cluley - Blog Security Stop calling it \'the cloud\', start selling t-shirts... something to the press that became a minor meme. My suggestion was that people should "stop calling it 'the cloud'" and start referring to it as "somebody else's computer" instead. After all, as soon as you start using language like that, your brain makes an important shift when it comes to thinking about privacy and security considerations. Security Memetics refined things further, suggesting "There is no cloud, just other people's computers". Lo-and-behold today you can purchase any number of t-shirts and stickers bearing the message, many using an image designed by Chris Watterston. Don't believe me? Check out "The many faces of There is no cloud". I wish I had been so entrepreneurial. I haven't made a single cent out of it! ]]> 2016-09-06T22:16:23+00:00 https://www.grahamcluley.com/2016/09/stop-calling-cloud-start-selling-shirts/ www.secnews.physaphae.fr/article.php?IdArticle=22511 False None None None Graham Cluley - Blog Security Taking umbrage at Umbreon, the Linux rootkit that likes to hide Taking umbrage at Umbreon, the Linux rootkit that likes to hideA Pokémon-themed rootkit called Umbreon is targeting Linux systems. David Bisson reports. ]]> 2016-09-06T21:13:01+00:00 https://www.grahamcluley.com/2016/09/taking-umbrage-umbreon-linux-rootkit-likes-hide/ www.secnews.physaphae.fr/article.php?IdArticle=22512 False None None None Graham Cluley - Blog Security Owen Smith forgets to wipe his whiteboard, and reveals his password Owen Smith forgets to wipe his whiteboard, and reveals his passwordTwitter snap reveals more than it planned of British politician's campaign secrets. ]]> 2016-09-06T13:27:08+00:00 https://www.grahamcluley.com/2016/09/owen-smith-forgets-wipe-whiteboard-reveals-password/ www.secnews.physaphae.fr/article.php?IdArticle=20828 False None None None Graham Cluley - Blog Security Riseup, providing encrypted comms for over 15 years, could run out of money next month https://riseup.net/donate It seems that Riseup.net saw a boom in new users in the wake of the Edward Snowden revelations, but has not managed to match that growth with sufficient regular donations. If Riseup.net shuts down, that also means the end for 150,000 email accounts and over 18,000 mailing lists that depend on the service for their privacy and security. It would be sad to see Riseup.net close its doors. I hope people who value online liberty will support this noble cause. (Yes, I already donated.) ]]> 2016-09-05T16:36:02+00:00 https://www.grahamcluley.com/2016/09/riseup-encrypted-communications/ www.secnews.physaphae.fr/article.php?IdArticle=18066 False None None None Graham Cluley - Blog Security Exposed! Almost 800,000 Brazzers usernames and passwords revealed after forum hack Exposed! Almost 800,000 Brazzers usernames and passwords revealed after forum hackSome 790,724 unique email addresses and the associated usernames and plaintext passwords used by members of the Brazzers message forum have been… umm.. exposed. Read more in my article on the Hot for Security blog. ]]> 2016-09-05T16:00:09+00:00 https://www.hotforsecurity.com/blog/exposed-almost-800000-brazzers-usernames-and-passwords-revealed-after-forum-hack-16572.html www.secnews.physaphae.fr/article.php?IdArticle=17941 False None None None Graham Cluley - Blog Security Podcast with Ahmed Mansoor, the world\'s most spied-on man critical updates have been pushed out for iOS and OS X in the last couple of weeks, addressing vulnerabilities that state-sponsored hackers have been using to spy upon people of interest. Malware exploiting the vulnerabilities could intercept every SMS message you receive, read your email, scoop up your contacts list, steal your passwords, spy upon your FaceTime calls, turn on your iPhone's video camera and microphone. Citizen Lab reported last month that the target of the attacks was award-winning human rights activist Ahmed Mansoor, the so-called "million dollar dissident". It was when Mansoor received two suspicious SMS messages last month he didn't click on the links - but instead forwarded them to security researchers for investigation. Sure enough, brand new sophisticated mobile spyware was lurking at the other end. And that's why Apple rolled out emergency security updates. Because it's not just Mansoor who is at risk from attacks exploiting vulnerabilities in OS X, Safari and iOS. Everyone who uses these products is put at risk while vulnerabilities like this exist. If you've ever wondered what it might be like to be the victim of state-sponsored espionage, if you care a jot about privacy and how encryption can save lives, you should check out Patrick Howell O'Neill's interview with Ahmed Mansoor on the Daily Dot's Layer 8 podcast. Recommended. ]]> 2016-09-05T11:37:04+00:00 https://www.grahamcluley.com/2016/09/podcast-ahmed-mansoor-worlds-spied-man/ www.secnews.physaphae.fr/article.php?IdArticle=17435 False None None None Graham Cluley - Blog Security It\'s 2016, and anti-virus products still goof up like this... It's 2016, and anti-virus products still goof up like this...Sophos false alarms on Winlogon.exe, causing chaos for some users. ]]> 2016-09-04T21:12:10+00:00 https://www.grahamcluley.com/2016/09/2016-anti-virus-products-goof-like/ www.secnews.physaphae.fr/article.php?IdArticle=16298 False None None None Graham Cluley - Blog Security Phishing and data theft await users due to target="_blank" vulnerability Phishing and data theft await users due to target=Websites that sloppily implement the target="_blank" attribute on links are leaving visitors open to data theft and phishing attacks. David Bisson reports. ]]> 2016-09-04T15:02:12+00:00 https://www.grahamcluley.com/2016/09/phishing-data-theft-await-users-target_blank-vulnerability/ www.secnews.physaphae.fr/article.php?IdArticle=15813 False None None None Graham Cluley - Blog Security Mac users vulnerable to state-sponsored Trident attack, fixed in iOS last week. Patch now Apple patched in iOS last week after a human rights activist had his iPhone targeted in a seemingly state-sponsored attack? Ahmed Mansoor received two suspicious SMS messages on his iPhone, directing him to websites containing a zero-day iOS exploit. Researchers connected the attack to Israeli-based firm NSO Group, and dubbed the vulnerabilities "Trident". Well, Apple has now quietly rolled-out a further security update revealing that the zero-day flaws are also present in Apple's OS X desktop operating system, as well as the desktop version of their OS X Safari browser. My advice to Apple users? Make sure that your Macs, MacBooks, iPhones and iPads are up-to-date. On OS X the easiest way to update your computer is to open the App Store app on your Mac, then click Updates in the toolbar. If updates are available, click the Update buttons to download and install them. On iOS go to Settings > General > Software Update. You may not be a human rights activist, but the fact that it took Apple *days* to issue a fix for OS X users after patching the same vulnerabilities in iOS has opened an opportunity for others to potentially exploit them against desktop users. In an ideal world, Apple would have patched its mobile and desktop operating systems at the same time. What we don't know is whether Apple didn't know the vulnerability was also present in OS X when it issued the iOS fixes, or whether it made the difficult decision to urgently update iOS even though its equivalent OS X fixes weren't yet ready. ]]> 2016-09-02T08:19:26+00:00 https://www.grahamcluley.com/2016/09/mac-users-vulnerable-state-sponsored-trident-attack-fixed-ios-week-patch/ www.secnews.physaphae.fr/article.php?IdArticle=10327 False None None None Graham Cluley - Blog Security DressCode? More like code for an Android botnet... DressCode? More like code for Android botnet...Google is working to remove malicious apps that enlist infected Android devices into a botnet from its Play Store. David Bisson reports. ]]> 2016-09-01T16:49:48+00:00 https://www.grahamcluley.com/2016/09/dresscode-android-botnet/ www.secnews.physaphae.fr/article.php?IdArticle=10328 False None None None Graham Cluley - Blog Security \'Identity and access management solution without compromise\' is compromised describes itself as the "identity and access management (IAM) solution without compromise." Which means it must be OneLogin's very worst nightmare to discover that it has itself been compromised. It appears that a hacker was able to view "Secure Notes" updated by OneLogin users between 25 July and 25 August 2016, because of a bug that was exploited after a hacker gained access to the company's systems after stealing a OneLogin employee's password. Security staff at the identity management firm say no other systems have been affected. OneLogin says that the issue has impacted a "small subset" of its customers, but that's really beside the point. Damage has been done to the company's reputation, and when a company has actively promoted itself for so long as a solution for securing enterprise data it will take a long time before clients and prospective customers forget about their security snafu. More details can be found in OneLogin's blog post. ]]> 2016-09-01T14:41:07+00:00 https://www.grahamcluley.com/2016/09/onelogin-compromised/ www.secnews.physaphae.fr/article.php?IdArticle=10329 False None None None Graham Cluley - Blog Security OS X malware spread via signed Transmission app... again Transmission app thumbFor the second time this year, the Transmission BitTorrent client has been compromised. David Bisson reports. ]]> 2016-09-01T09:26:10+00:00 https://www.grahamcluley.com/2016/09/signed-sealed-delivered-malware-spread-signed-transmission-app/ www.secnews.physaphae.fr/article.php?IdArticle=10331 False None None None Graham Cluley - Blog Security Millions of Dropbox users are being advised to change their passwords Millions of Dropbox users are being advised to change their passwordsYes, hackers did manage to steal millions of account credentials back in 2012. Make sure you have protected your account, and enabled two-step verification. ]]> 2016-08-31T11:50:48+00:00 https://www.grahamcluley.com/2016/08/millions-dropbox-users-advised-change-passwords/ www.secnews.physaphae.fr/article.php?IdArticle=9691 False None None None Graham Cluley - Blog Security I went on holiday. Hackers didn\'t. I went on holiday. Hackers didn't.Here are some of the security stories I didn't write about... ]]> 2016-08-31T09:47:34+00:00 https://www.grahamcluley.com/2016/08/went-holiday-hackers-didnt/ www.secnews.physaphae.fr/article.php?IdArticle=9673 False None None None Graham Cluley - Blog Security Practical steps for strengthening your company\'s password rules Practical steps for strengthening your company's password rulesIf we can build better rules for acceptable passwords, we can do a better job of protecting users' privacy and confidential company databases. Read more in my article on the Bitdefender Business Insights blog. ]]> 2016-08-25T09:15:48+00:00 http://businessinsights.bitdefender.com/steps-strengthening-company-password-rules www.secnews.physaphae.fr/article.php?IdArticle=8710 False None None None Graham Cluley - Blog Security DetoxCrypto ransomware-as-a-service rears its ugly head Ransom thumbPokémon-friendly ransomware has monstrous intentions. David Bisson reports. ]]> 2016-08-23T01:25:22+00:00 https://www.grahamcluley.com/2016/08/detoxcrypto-ransomware-new-raas-affiliate-program-works/ www.secnews.physaphae.fr/article.php?IdArticle=8498 False None None None Graham Cluley - Blog Security Wikipedia\'s Jimmy Wales didn\'t die this weekend, despite what his hacked Twitter account said Wikipedia's Jimmy Wales didn't die this weekend, despite what his hacked Twitter account saidNo, Jimmy Wales, founder of Wikipedia, isn't dead. But his Twitter *did* get hacked. Read more in my article on the Hot for Security blog. ]]> 2016-08-22T13:33:29+00:00 https://www.hotforsecurity.com/blog/wikipedias-jimmy-wales-didnt-die-this-weekend-despite-what-his-hacked-twitter-account-said-16463.html www.secnews.physaphae.fr/article.php?IdArticle=8269 False None None None Graham Cluley - Blog Security Smart IoT socket suffers from dumb security vulnerabilities Smart IoT socket suffers from dumb security vulnerabilitiesResearchers have come across flaws in an internet-enabled power socket as part of their ongoing efforts to raise awareness about IoT security. David Bisson reports. ]]> 2016-08-22T12:00:34+00:00 https://www.grahamcluley.com/2016/08/smart-iot-socket-suffers-dumb-security-vulnerabilities/ www.secnews.physaphae.fr/article.php?IdArticle=10338 False None None None Graham Cluley - Blog Security Now WikiLeaks is distributing malware discovered that there are thousands of samples of malware available for download from the WikiLeaks website. The malware found by Bontchev is found in a large tranche of emails leaked from AKP, a Turkish political party. Bontchev writes: Since many of the AKP members have been recipients of malware sent by e-mail (most likely random spam but could have also been targeted attacks), the received malware in the e-mails is also present in the dump. As a result, the Wikileaks site is hosting malware. For the record, I consider this to be extremely irresponsible from the part of Wikileaks. Malware distribution is not "journalism" by any definition of the term. Bontchev found 3277 malicious files on the WikiLeaks site, accessible to anyone on the internet via a single click. Of course, it's perfectly possible that the true number of malware samples published on the WikiLeaks site is much larger than this. Bontchev's focus so far has been on one particular email dump, and used the VirusTotal service to determine if a file was identified as malicious or not. Furthermore, one cannot discount the possibility that some of the email dumps published by WikiLeaks contain targeted attacks that are not presently detected by any anti-virus product. WikiLeaks has been criticised before for its unwillingness to curate the leaked information that it leaks - by, amongst others, no less than Edward Snowden. Anti-virus industry old-timers like me and Bontchev are left with our heads in our hands when we hear that WikiLeaks is apparently making no efforts whatsoever to prevent its readers from encountering malware samples. ]]> 2016-08-22T11:56:23+00:00 https://www.grahamcluley.com/2016/08/wikileaks-distributing-malware/ www.secnews.physaphae.fr/article.php?IdArticle=10339 False None None None Graham Cluley - Blog Security New firmware update? No, it\'s the devious Marcher Android trojan up to no good Macher thumbThe Marcher trojan has come up with a new way to infect Android users: pose as a fake firmware update. David Bisson reports. ]]> 2016-08-19T14:19:47+00:00 https://www.grahamcluley.com/2016/08/new-firmware-update-marcher-malware/ www.secnews.physaphae.fr/article.php?IdArticle=8187 False None None None Graham Cluley - Blog Security Following data breach, Sage employee arrested at Heathrow airport arrested a 32-year-old woman at Heathrow airport yesterday on "suspicion of conspiracy to defraud". According to police, the arrested woman is a current employee of Sage. Sage made the headlines earlier this week after the online accounting and payroll company announced it had suffered a data breach, putting the details of approximately 280 UK and Irish companies at risk. Sage described this as a "small number" of their customers. And it is a small percentage, considering over half a million British businesses are thought to be using Sage's payroll software. But, of course, that's little consolation if you're one of the customers whose data was put at risk by the breach. And the number alone doesn't tell us anything about the size of the companies affected, or how many employees of those companies could also potentially have had their identities and financial details put in danger. Police say that the woman arrested at Heathrow airport has been released on bail. Sage said that an internal login had been used to access the sensitive information. It's worth underlining that the woman arrested has not been charged with any offence, let alone convicted... but this might be a timely reminder for all businesses to not focus solely on external attackers over the internet but recognise that there can also be considerable dangers posed by insiders if your workforce turns rogue. ]]> 2016-08-18T15:49:36+00:00 https://www.grahamcluley.com/2016/08/following-data-breach-sage-employee-arrested-heathrow-airport/ www.secnews.physaphae.fr/article.php?IdArticle=10341 False None None None Graham Cluley - Blog Security Why do we ignore up to 90% of computer security alerts? Because we\'re terrible at multi-tasking… Why do we ignore up to 90% of computer security alerts? Because we're terrible at multi-tasking…Interrupting security pop-ups are ineffective, researchers claim after studying brain activity. Read more in my article on the State of Security blog. ]]> 2016-08-18T14:53:08+00:00 http://www.tripwire.com/state-of-security/featured/security-alerts-multitasking/ www.secnews.physaphae.fr/article.php?IdArticle=10342 False None None None Graham Cluley - Blog Security Bitcoin website suspects it will be targeted by state-sponsored hackers, warns users Bitcoin website suspects it will be targeted by state-sponsored hackers, warns usersBitcoin users are once again being spooked by security fears. Read more in my article on the Hot for Security blog. ]]> 2016-08-18T12:47:36+00:00 https://www.hotforsecurity.com/blog/bitcoin-website-suspects-it-will-be-targeted-by-state-sponsored-hackers-warns-users-16405.html www.secnews.physaphae.fr/article.php?IdArticle=8130 False None None None Graham Cluley - Blog Security A new low! SMS scammers prey on parents\' fears to make a few bucks A new low! SMS scammers prey on parents' fears to make a few bucksFraudsters are sending fake SMS messages to parents, purporting to be about a terrible car accident involving their children. David Bisson reports. ]]> 2016-08-18T10:51:48+00:00 https://www.grahamcluley.com/2016/08/new-low-sms-scammers-prey-parents-fears-make-bucks/ www.secnews.physaphae.fr/article.php?IdArticle=10344 False None None None Graham Cluley - Blog Security Beware bogus blue verified checkmark scams on Twitter Beware bogus blue verified checkmark scams on TwitterScammers are exploiting Twitter users' desire to get their accounts "verified" - take care what you click on! Read more in my article on the Hot for Security blog. ]]> 2016-08-17T12:19:53+00:00 https://www.hotforsecurity.com/blog/beware-bogus-blue-verified-checkmark-scams-on-twitter-16373.html www.secnews.physaphae.fr/article.php?IdArticle=8075 False None None None Graham Cluley - Blog Security Pokémon Go for Windows? Beware ransomware! Pokémon Go for Windows? Beware ransomware!Ransomware disguises itself as a version of Pokémon Go for Windows in an attempt to lure unsuspecting game players. David Bisson reports. ]]> 2016-08-16T14:41:38+00:00 https://www.grahamcluley.com/2016/08/pokemon-windows-beware-ransomware/ www.secnews.physaphae.fr/article.php?IdArticle=8040 False None None None Graham Cluley - Blog Security A simple way to kill off Twitter trolls writes on his blog: Simply put. If Jim is blocked by John, Jim can no longer even utter Johns handle/twittername in a tweet. If he attempts to the tweet simply doesn't process or gets sinkholed. Period. The end. Forever, or until John unblocks him. This approach would not infringe on Jim's 'freedom of speech', he can still say whatever he likes, but he can't include John. This approach would be self-policing essentially allowing users to decide if they are being abused or harassed and allowing them to take immediate actions without relying on Twitter to minimize the problem effectively. This approach would not be an overhead on Twitters current infrastructure and would require NOTHING by way of extra storage capacity. Trolls are the ugly side of Twitter, but @th3j35t3r's proposal seems very elegant to me. So how about it Twitter? Find out more, and check out his amusing flowchart, by reading @th3j35t3r's blog post. ]]> 2016-08-16T08:16:39+00:00 https://www.grahamcluley.com/2016/08/simple-way-kill-twitter-trolls/ www.secnews.physaphae.fr/article.php?IdArticle=8020 False None None None Graham Cluley - Blog Security Someone seems to be trying to spy on VeraCrypt\'s security audit announced that it had agreed a plan to get the open source disk encryption tool VeraCrypt independently audited. The audit, which would look for security holes and weaknesses in VeraCrypt's code, would be done in co-ordination with vulnerability researchers from QuarksLab. So far, so good. Especially as you may remember that VeraCrypt's predecessor, TrueCrypt, was mysteriously discontinued a couple of years back leading to all manner of conspiracy theories. Now, the bad news... OSTIF says that its confidential PGP-encrypted communications with QuarkLabs about the VeraCrypt security audit may be being mysteriously intercepted: We have now had a total of four email messages disappear without a trace, stemming from multiple independent senders. Not only have the emails not arrived, but there is no trace of the emails in our “sent” folders. In the case of OSTIF, this is the Google Apps business version of Gmail where these sent emails have disappeared. This suggests that outside actors are attempting to listen in on and/or interfere with the audit process. We are setting up alternate means of encrypted communications in order to move forward with the audit project. If nation-states are interested in what we are doing we must be doing something right. Right? Let the speculation begin... ]]> 2016-08-15T12:23:59+00:00 https://www.grahamcluley.com/2016/08/trying-spy-veracrypts-security-audit/ www.secnews.physaphae.fr/article.php?IdArticle=7992 False Guideline None 5.0000000000000000 Graham Cluley - Blog Security How to protect yourself from mobile ID theft Mobile fraudp thumbAn emerging form of ID theft has recently surfaced over in the United States - involving your mobile phones. Yasin Soliman reports. ]]> 2016-08-12T14:21:06+00:00 https://www.grahamcluley.com/2016/08/protect-mobile-theft/ www.secnews.physaphae.fr/article.php?IdArticle=7954 False None None None Graham Cluley - Blog Security Hacked Instagram accounts seducing users with adult dating spam Hacked Instagram accounts seducing users with adult dating spamYour Instagram account could have been spiced up by spammers.David Bisson reports.]]> 2016-08-12T07:59:29+00:00 https://www.grahamcluley.com/2016/08/hacked-instagram-accounts-seducing-users-adult-dating-spam/ www.secnews.physaphae.fr/article.php?IdArticle=7785 False None None None Graham Cluley - Blog Security Almost all cars sold by VW Group since 1995 at risk from unlock hack writes:Later this week at the Usenix security conference in Austin, a team of researchers from the University of Birmingham and the German engineering firm Kasper & Oswald plan to reveal two distinct vulnerabilities they say affect the keyless entry systems of an estimated nearly 100 million cars. One of the attacks would allow resourceful thieves to wirelessly unlock practically every vehicle the Volkswagen group has sold for the last two decades, including makes like Audi and Skoda. The second attack affects millions more vehicles, including Alfa Romeo, Citroen, Fiat, Ford, Mitsubishi, Nissan, Opel, and Peugeot.The researchers are led by University of Birmingham computer scientist Flavio Garcia, who was previously blocked by a British court, at the behest of Volkswagen, from giving a talk about weaknesses in car immobilisers.At the time Volkswagen argued that the research could "allow someone, especially a sophisticated criminal gang with the right tools, to break the security and steal a car." That researchers finally got to present their paper a year ago, detailing how the Megamos Crypto system – an RFID transponder that uses a Thales-developed algorithm to verify the identity of the ignition key used to start motors – could be subverted.The team's latest research doesn't detail a flaw that in itself could be exploited by car thieves to steal a vehicle, but does describe how criminals located within 300 feet of the targeted car might use cheap hardware to intercept radio signals that allow them to clone an owner's key fob.The researchers found that with some "tedious reverse engineering" of one component inside a Volkswagen's internal network, they were able to extract a single cryptographic key value shared among millions of Volkswagen vehicles. By then using their radio hardware to intercept another value that's unique to the target vehicle and included in the signal sent every time a driver presses the key fob's buttons, they can combine the two supposedly secret numbers to clone the key fob and access to the car. "You only need to eavesdrop once," says Birmingham researcher David Oswald. "From that point on you can make a clone of the original remote control that locks and unlocks a vehicle as many times as you want."Sounds to me like it's time to turn to the car manufacturers to ask what on earth they are going to do to fix the millions of potentially vulnerable vehicles they have sold in the last couple of decades.Read more, including the researcher's paper, on Wired.]]> 2016-08-11T07:25:40+00:00 https://www.grahamcluley.com/2016/08/cars-sold-group-1995-risk-unlock-hack/ www.secnews.physaphae.fr/article.php?IdArticle=7580 False None None None Graham Cluley - Blog Security Microsoft rushes to fix issue that unlocks devices protected by Secure Boot Secure boot golden key thumbMicrosoft is scrambling to fix an issue that unlocks Windows tablets, phones, and other devices protected by Secure Boot.David Bisson reports.]]> 2016-08-10T15:29:50+00:00 https://www.grahamcluley.com/2016/08/microsoft-rushes-fix-issue-unlocks-devices-protected-secure-boot/ www.secnews.physaphae.fr/article.php?IdArticle=7446 False None None None Graham Cluley - Blog Security Microsoft says patch your Windows PCs now against critical security vulnerabilities Microsoft says patch your Windows PCs now against critical security vulnerabilitiesDon't rest on your laurels. Critical security vulnerabilities have been discovered, so patch your vulnerable computer systems now.Read more in my article on the We Live Security blog.]]> 2016-08-10T09:54:54+00:00 http://www.welivesecurity.com/2016/08/10/microsoft-says-patch-windows-pcs-now-critical-security-vulnerabilities/ www.secnews.physaphae.fr/article.php?IdArticle=7380 False None None None Graham Cluley - Blog Security Project Sauron stands on the shoulders of past state-sponsored malware Sauron thumbAs government agencies, military organisations, telecom firms, and financial institutions are targeted, the obvious question to ask is - who is behind the attacks?]]> 2016-08-09T18:28:47+00:00 https://www.grahamcluley.com/2016/08/project-sauron-malware/ www.secnews.physaphae.fr/article.php?IdArticle=7227 False None None None Graham Cluley - Blog Security 19-year-old wins one million airmiles after finding United Airlines bugs 19-year-old wins one million airmiles after finding United Airlines bugsVulnerability researcher Olivier Beg from Amsterdam has been handsomely rewarded with one million airmiles by United Airlines, after finding some 20 security holes in the company's software.]]> 2016-08-08T22:33:29+00:00 https://www.grahamcluley.com/2016/08/19-year-old-wins-million-airmiles-finding-united-airlines-bugs/ www.secnews.physaphae.fr/article.php?IdArticle=7159 False None None 3.0000000000000000 Graham Cluley - Blog Security Almost a billion devices may be at risk from QuadRooter Android flaw warned of a security hole in the microchips used in almost a billion Android devices that - if exploited - could give hackers complete access:An attacker can exploit these vulnerabilities using a malicious app. Such an app would require no special permissions to take advantage of these vulnerabilities, alleviating any suspicion users may have when installing.The set of vulnerabilities, dubbed QuadRooter, disclosed during a session at Def Con in Las Vegas, and are present in Qualcomm chipsets used by many of the most popular Android devices, including:BlackBerry PrivBlackphone 1 and Blackphone 2Google Nexus 5X, Nexus 6 and Nexus 6PHTC One, HTC M9 and HTC 10LG G4, LG G5, and LG V10New Moto X by MotorolaOnePlus One, OnePlus 2 and OnePlus 3Samsung Galaxy S7 and Samsung S7 EdgeSony Xperia Z UltraIf left unpatched, the QuadRooter vulnerabilities could give attackers complete control of compromised devices, allow malicious hackers to access sensitive information, and plant malware.Check Point has released a free scanner app to help Android users know if their personal devices are at risk.In addition Check Point offers sensible advice in its blog post for Android users to apply the latest OS security updates (if they are made available, of course...), to be wary of installing apps from unknown sources, and to double-check that the permissions requested by Android apps are appropriate.]]> 2016-08-08T15:39:54+00:00 https://www.grahamcluley.com/2016/08/billion-devices-risk-quadrooter-android-flaw/ www.secnews.physaphae.fr/article.php?IdArticle=7130 False None None None Graham Cluley - Blog Security How to spear-phish Twitter users with greater success Twitter spear phishing thumbA new automated spear-phishing framework maintained a success rate of between 30 percent and 66 percent among its targets on Twitter.David Bisson reports.]]> 2016-08-08T09:18:02+00:00 https://www.grahamcluley.com/2016/08/automated-spear-phishing-tool-fools-66-targets-twitter/ www.secnews.physaphae.fr/article.php?IdArticle=7110 False None None None Graham Cluley - Blog Security iOS 9.3.4 released, fixing critical security hole. Update now iOS 9.3.4 released, fixing critical security hole. Update nowApple has released iOS 9.3.4, the latest versions of its mobile operating system for iPhone and iPad users, and owners of the devices are recommended to upgrade as soon as possible.Read more in my article on the Hot for Security blog.]]> 2016-08-05T12:26:09+00:00 https://www.hotforsecurity.com/blog/ios-9-3-4-released-fixing-critical-security-hole-update-now-16242.html www.secnews.physaphae.fr/article.php?IdArticle=6971 False None None None Graham Cluley - Blog Security Earn up to $200,000 as Apple *finally* launches a bug bounty writes:Apple is planning a new bug bounty program that will offer cash in exchange for undiscovered vulnerabilities in its products, the company announced onstage at the Black Hat conference today. Launching in September, the program will offer cash rewards for working exploits that target the latest version of iOS or the most recent generation of hardware. It's the first time Apple has explicitly offered cash in exchange for those vulnerabilities, although the company has long maintained a tip line for disclosing security issues.Ivan Krstic, Apple's head of security engineering and architecture, made the announcement during a presentation at Black Hat on Thursday.The top reward comes for finding flaws in vulnerabilities in Apple's "secure boot" process, which if broken could seriously compromise security.As Hacker News reports, for now Apple's bug bounty program is invite-only - meaning that the only people likely to be ushered in are those who have a track record in finding exploitable flaws in the company's code. Hopefully things will loosen up over time, and from the sound of things they are open to adding others who come forward after finding critical vulnerabilities in key areas.Frankly, an Apple bug bounty is long overdue.Apple was looking incongruous in not offering a reward for security researchers who uncovered critical vulnerabilities in its products. After all, if you were a vendor you would rather have those who find security vulnerabilities in your products work with you rather than selling off their exploits to a third-party, wouldn't you?With a bug bounty in place, serious exploitable vulnerabilities are more likely to be responsibly disclosed to Apple, and users are more likely to be protected in a timely fashion.Good.]]> 2016-08-05T08:46:25+00:00 https://www.grahamcluley.com/2016/08/earn-200000-apple-finally-launches-bug-bounty/ www.secnews.physaphae.fr/article.php?IdArticle=6879 False None None None Graham Cluley - Blog Security Israeli security firm hacks ISIS forum, discloses future targets Israeli security firm hacks ISIS forum, discloses future targetsAn Israeli security company hacked an ISIS forum and disclosed where members of the terrorist organization might be planning future attacks.David Bisson reports.]]> 2016-08-04T22:51:17+00:00 https://www.grahamcluley.com/2016/08/israeli-security-firm-hacks-isis-forum-discloses-future-targets/ www.secnews.physaphae.fr/article.php?IdArticle=6563 False None None None Graham Cluley - Blog Security Does dropping malicious USB sticks really work? Yes, worryingly well... Does dropping malicious USB sticks really work? Yes, worryingly well...Good samaritans and skinflints beware!Plugging in that USB stick you found lying around on the street outside your office could lead to a security breach.Read more in my article on the Tripwire State of Security blog.]]> 2016-08-04T10:23:47+00:00 http://www.tripwire.com/state-of-security/featured/does-dropping-malicious-usb-sticks-really-work-yes-worryingly-well/ www.secnews.physaphae.fr/article.php?IdArticle=6216 False Guideline None None Graham Cluley - Blog Security Password changes for the sake of it don't improve security, says FTC technologist Password changes for the sake of it don't improve security, says FTC technologistA technologist with the Federal Trade Commission (FTC) argues frequent mandatory password changes don't actually improve security.David Bisson reports.]]> 2016-08-03T16:14:05+00:00 https://www.grahamcluley.com/2016/08/password-changes-dont-improve-security-says-ftc-technologist/ www.secnews.physaphae.fr/article.php?IdArticle=5703 False None None None Graham Cluley - Blog Security Apple's lack of 2SV for Find My Phone nearly costs student his digital life Apple's lack of 2SV for Find My Phone nearly costs student his digital lifeA computer science graduate student who almost had his iPhone and Mac wiped by online criminals feels that Apple should do more to protect accounts.David Bisson reports.]]> 2016-08-03T11:36:40+00:00 https://www.grahamcluley.com/2016/08/apples-lack-2sv-phone-nearly-costs-student-digital-life/ www.secnews.physaphae.fr/article.php?IdArticle=5602 False None None None Graham Cluley - Blog Security Car hacking at speed - where vulnerabilities turn from critical to fatal Car hacking at speed - where vulnerabilities turn from critical to fatalWhat car hacking researchers Charlie Miller and Chris Valasek have discovered is worrying enough. But it sends a shudder down the spine to even contemplate how much worse things could be. Read more in my article on the We Live Security blog.]]> 2016-08-02T11:47:27+00:00 http://www.welivesecurity.com/2016/08/02/car-hacking-speed-vulnerabilities-turn-critical-fatal/ www.secnews.physaphae.fr/article.php?IdArticle=5203 True None None None Graham Cluley - Blog Security Advertisers could be tracking you via your battery status writes Lukasz Olejnik:The information provided by the Battery Status API is not always changing fast. In other words, they are static for a period of time; it may give rise to a short-lived identifier. At the same time, users sometimes clear standard web identifiers (such as cookies). But a web script could analyze identifiers provided by Battery Status API, which could then possibly even lead to recreation of other identifiers. A simple sketch follows.An example web script continuously monitors the status of identifiers and the information obtained from Battery API. At some point, the user clears (e.g.) all the identifying cookies. The monitoring web script suddenly sees a new user - with no cookie - so it sets new ones. But battery level analysis could provide hints that this new user is - in fact - not a new user, but the previously known one. The script's operator could then conclude and reason that those this is a single user, and resume with tracking. This is an example scenario of identifier recreation, also known as respawning.A recent study [PDF] reported that battery status is being monitored by some tracking scripts.It sounds like it would be a positive step if browsers stopped accessing such detailed information about our battery.Aside from tracking, there are other ways that battery information could be exploited.Uber, for instance, says that it knows customers are more likely to accept a much higher price to hire a cab when their battery is running low.]]> 2016-08-02T07:55:29+00:00 https://www.grahamcluley.com/2016/08/advertisers-tracking-battery-status/ www.secnews.physaphae.fr/article.php?IdArticle=5177 False Guideline Uber None Graham Cluley - Blog Security The AdGholas malvertising network was using steganography, researchers reveal The AdGholas malvertising network was using steganography, researchers revealThe AdGholas malvertising network planted malicious ads on popular sites including The New York Times and The Verge.David Bisson reports.]]> 2016-08-02T00:06:47+00:00 https://www.grahamcluley.com/2016/08/adgholas-use-steganography-drive-malware-campaign/ www.secnews.physaphae.fr/article.php?IdArticle=5126 False None None None Graham Cluley - Blog Security Secure email service GhostMail shutting down, in fear of being abused announced that it is closing down:GhostMail in its current form will be closed down as per 1. of September 2016.Since we started our project, the world has changed for the worse and we do not want to take the risk of supplying our extremely secure service to the wrong people – it's simply not worth the risk.In general, we believe strongly in the right to privacy, but we have taken a strategic decision to only supply our platform and services to the enterprise segment.We hope you understand this decision and we refer to other free services available, as an alternative to our platform i.e. Protonmail.PRO users will be refunded and contacted directly.If we take GhostMail's statement at face value, one assumes that GhostMail is concerned that criminals and terrorists might abuse its services to hide their communications. As GhostMail has no way of perusing its customers' encrypted conversations it wouldn't know who would be up to no good, and who wouldn't.So, bad news for regular folks who were using GhostMail for their secure, private webmail (switching to alternatives like Protonmail, Neomailbox or Runbox sounds like a natural next step) but potentially the company might be able to offer a more focused offering for enterprise customers.If you are a GhostMail user make sure to download any messages from its servers that you wish to keep before 1st September.]]> 2016-08-01T13:59:16+00:00 https://www.grahamcluley.com/2016/08/secure-email-service-ghostmail-shutting-fear-abused/ www.secnews.physaphae.fr/article.php?IdArticle=5050 False None None None Graham Cluley - Blog Security Would you risk running a VPN in the United Arab Emirates? writes:A royal edict from the president of the United Arab Emirates (UAE) may have effectively made it illegal for anyone in the country to use a VPN or secure proxy service.Those caught could face jail time and fines of between 500,000 and 2,000,000 UAE dirham (US$136,130 and $544,521).The wording is ambiguous and technologically illiterate. Essentially, it seems, you are not allowed to use systems that hide the fact that you're committing a crime or covering one up. If you're routing your network traffic through a secure VPN or proxy server, you could be evading the eyes of the state while breaking a law, and that's now a big no-no.You could claim you were using the VPN or proxy for legit reasons, and that no criminal activity was being committed or concealed, but since your packets were encrypted, you may have a hard time proving your innocence.That certainly does sound like a bit of a pickle for businesses and individuals who want to use the internet safely while in the United Arab Emirates.You want to run VPN software to secure your communications, and keep your confidential information out of the hands of hackers sniffing data out of the air at public Wi-Fi hotspots, and beyond the grasp of over-reaching intelligence agencies. There are also plenty of people who have legitimate excuses for using the internet anonymously, and concealing their true identity.But let's take a closer look at the wording of this new legislation:Whoever uses a fraudulent computer network protocol address (IP address) by using a false address or a third-party address by any other means for the purpose of committing a crime or preventing its discovery, shall be punished by temporary imprisonment and a fine of no less than Dh500,000 and not exceeding Dh2,000,000, or either of these two penalties.The key thing to emphasise in the above is, I would argue, the words "for the purpose of committing a crime or preventing its discovery".Hopefully the UAE is planning to use this legislation to crack down on illegal activities on the internet, rather than those who use a VPN and other secure proxy services legitimately.But if you were to find yourself *forced* to reveal what you had been doing (to prove it wasn't illegal) well, you've just flushed your privacy down the lavatory.I would worry that we could find ourselves slipping into a situation where the very use of a VPN and encrypted communications is considered itself inherently suspicious, rather than sensible.]]> 2016-07-29T12:01:32+00:00 https://www.grahamcluley.com/2016/07/vpn-united-arab-emirates/ www.secnews.physaphae.fr/article.php?IdArticle=4947 False None None None Graham Cluley - Blog Security Get Transcript IRS fraud lands married couple in prison Get Transcript IRS fraud lands married couple in prisonA married couple has received jail time for abusing the Internal Revenue Service's "Get Transcript" feature to commit fraud.David Bisson reports.]]> 2016-07-28T17:13:23+00:00 https://www.grahamcluley.com/2016/07/transcript-irs-fraud-lands-married-couple-prison/ www.secnews.physaphae.fr/article.php?IdArticle=4904 False None None None Graham Cluley - Blog Security How should businesses respond to the TechCrunch hack? How should businesses respond to the TechCrunch hack?The notorious OurMine hacking gang compromised the TechCrunch website. What lessons can other companies running WordPress learn from the security breach?Read more in my article on the Bitdefender Business Insights blog.]]> 2016-07-28T09:10:55+00:00 http://businessinsights.bitdefender.com/how-should-businesses-respond-to-the-techcrunch-hack www.secnews.physaphae.fr/article.php?IdArticle=4868 False None None None Graham Cluley - Blog Security Donald Trump asks for help from Russian hackers. Cher isn't happy Donald Trump asks for help from Russian hackers. Cher isn't happyCould this be Cybor Warfare? (sic)Donald Trump wonders out loud whether hackers might help him dig up some dirt on Hillary Clinton.]]> 2016-07-27T22:20:26+00:00 https://www.grahamcluley.com/2016/07/donald-trump-asks-help-russian-hackers-cher-isnt-happy/ www.secnews.physaphae.fr/article.php?IdArticle=4826 False None None None Graham Cluley - Blog Security LastPass security hole could have seen hackers steal your passwords writes:Stealing all your passwords by just visiting a webpage. Sounds too bad to be true? That's what I thought too before I decided to check out the security of the LastPass browser extension.In his article, Karlsson explains how he was able to trick LastPass into believing that it was on the real Twitter website, and cough up the users' credentials because of a bug in the LastPass password manager's autofill functionality.The same technique could have been used to steal passwords associated with other websites.Yeuch!The good news is that Karlsson believes in responsible disclosure, and so informed LastPass of the problem. In more good news LastPass fixed the issue in less than a day (and awarded Karlsson a $1,000 bug bounty for his efforts).Karlsson recommends that LastPass users disable the autofill functionality and enable multi-factor authentication for better security.Although his discovery is troubling, I agree with Karlsson when he points out that using a password manager is still better than reusing passwords on different websites.PS. Well-known vulnerability researcher Tavis Ormandy has also tweeted overnight that he has also found a flaw in LastPass. Details have not yet been made public, and LastPass is reportedly working with him on resolving the issue.PPS. Readers with good memories will recall that LastPass was acquired by LogMeIn last year to the concern of some. Overnight it has been announced that LogMeIn is itself being acquired by Citrix.]]> 2016-07-27T11:50:43+00:00 https://www.grahamcluley.com/2016/07/security-hole-fixed-lastpass/ www.secnews.physaphae.fr/article.php?IdArticle=4784 False None LastPass None Graham Cluley - Blog Security SentinelOne says if you get hit by ransomware, it will pay the ransom writes:We've created the first ever Ransomware Cyber Guarantee – a warranty for our product's performance. It'll give you the best protection from ransomware attacks – and if we miss something and you get infected – we'll pay the ransom. It's that simple. And it's how security is supposed to be. If you can block something – why not guarantee it? Would you buy a new shiny car without manufacturer warranty?In other words, self-proclaimed "next generation endpoint security solution" SentinelOne says it's entirely comfortable paying money to criminals.Of course it's a marketing stunt, but still one - I must admit - that leaves a nasty taste in my mouth.Couldn't SentinelOne have just offered to throw in a decent backup program? ]]> 2016-07-26T19:57:07+00:00 https://www.grahamcluley.com/2016/07/sentinelone-says-hit-ransomware-pay-ransom/ www.secnews.physaphae.fr/article.php?IdArticle=4736 False None None 4.0000000000000000 Graham Cluley - Blog Security Three men charged for international cell phone fraud scheme Three men charged for international cell phone fraud schemeA federal judge has charged three men for their alleged participation in a sophisticated international cell phone fraud scheme.David Bisson reports.]]> 2016-07-26T12:19:00+00:00 https://www.grahamcluley.com/2016/07/international-cell-phone-fraud-scheme/ www.secnews.physaphae.fr/article.php?IdArticle=4711 False None None None Graham Cluley - Blog Security Get FREE threat intelligence on hackers and exploits with the Recorded Future Cyber Daily Get trending info on hackers, exploits, and vulnerabilities every day for FREE with the Recorded Future Cyber Daily [Sponsor]Graham Cluley Security News is sponsored this week by the folks at Recorded Future. Thanks to the great team there for their support!Recorded Future provides deep, detailed insight into emerging threats by automatically collecting, analyzing, and organizing billions of data points from the Web.And now, with its FREE Cyber Daily email all IT security professionals can access information about the top trending threat indicators - helping you use threat intelligence to help make better decisions quickly and easily.Which means that you will be able to benefit from a daily update of the following:Information Security Headlines: Top trending news stories.Top Targeted Industries: Companies targeted by cyber attacks, grouped by their industries.Top Hackers: Organizations and people recognized as hackers by Recorded Future.Top Exploited Vulnerabilities: Identified vulnerabilities with language indicating malcode activity. These language indicators range from security research ("reverse engineering," "proof of concept") to malicious exploitation ("exploited in the wild," "weaponized").Top Vulnerabilities: Identified vulnerabilities that generated significant amounts of event reporting, useful for general vulnerability management.Infosec professionals agree that the Cyber Daily is an essential tool:"I look forward to the Cyber Daily update email every morning to start my day. It's timely and exact, with a quick overview of emerging threats and vulnerabilities. For organizations looking to strengthen their security program with threat intelligence, Recorded Future's Cyber Daily is the perfect first step that helps to prioritize security actions." - Tom Doyle, CIO at EBI Consulting.So, what are you waiting for?Sign up for the Cyber Daily today, and starting tomorrow you'll receive the top trending threat indicators.
If you're interested in exclusively sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.]]>
2016-07-26T09:15:30+00:00 https://www.grahamcluley.com/2016/07/recorded-future-feed-sponsor-26/ www.secnews.physaphae.fr/article.php?IdArticle=4701 False None None None
Graham Cluley - Blog Security Clash of Kings forum hacked, 1.6 million account details put at risk Clash of Kings forum hacked, 1.6 million account details put at riskVulnerable version of vBulletin thought to be responsible for data breach which could impact almost 1.6 million game players.Read more in my article on the We Live Security blog.]]> 2016-07-25T13:01:04+00:00 http://www.welivesecurity.com/2016/07/25/clash-kings-forum-hacked-1-6-million-account-details-put-risk/ www.secnews.physaphae.fr/article.php?IdArticle=4639 False None None None Graham Cluley - Blog Security Police 3D print murder victim's finger to unlock his phone reports:A man was murdered, and the police think there might be clues to who murdered him stored in his phone. But they can't get access to the phone without his fingerprint or passcode. So instead of asking the company that made the phone to grant them access, they're going another route: having the Jain lab create a 3D printed replica of the victim's fingers. With them, they hope to unlock the phone. The numerous media reports I've read about this case don't mention what type of smartphone the police are trying to break into, but my hunch is that it's an Android.There are some big differences between how iOS and Android devices implement fingerprint authentication, and some of the design decisions Apple made make the scenario described above highly unlikely.For instance, an iPhone or iPad will time out the fingerprint sensor every time the device is restarted or after 48 hours of inactivity, requiring you to enter your passcode instead. However, on Android 4.4 - 5.1.1 the fingerprint unlock *never* expires. Even with Android 6.0 Marshmallow, which adds an official fingerprint authentication API for the first time, I don't believe there are any set requirements for when the fingerprint unlock should expire.It seems to me that fingerprint security has been pretty sloppy generally on Android, with some smartphones even storing unencrypted images of users' fingerprints in a non-protected folder.]]> 2016-07-25T10:05:52+00:00 https://www.grahamcluley.com/2016/07/police-print-murder-victims-finger-unlock-phone/ www.secnews.physaphae.fr/article.php?IdArticle=4629 False None None None Graham Cluley - Blog Security SoakSoak using compromised websites to spread CryptXXX ransomware SoakSoak using compromised websites to spread CryptXXX ransomwareThe SoakSoak botnet is compromising business websites so that they redirect visitors to the Neutrino exploit kit and CryptXXX ransomware.David Bisson reports.]]> 2016-07-22T10:19:34+00:00 https://www.grahamcluley.com/2016/07/soaksoak-using-compromised-websites-spread-cryptxxx-ransomware/ www.secnews.physaphae.fr/article.php?IdArticle=4557 False None None None Graham Cluley - Blog Security Playstation chief Shuhei Yoshida has his Twitter hacked by OurMine Playstation chief Shuhei Yoshida has his Twitter hacked by OurMineShuhei Yoshida, the popular president of Sony Computer Entertainment's worldwide studios, appears to be the latest victim of the OurMine hacking gang, after his Twitter account was hijacked.Read more in my article on the Hot for Security blog.]]> 2016-07-21T12:55:12+00:00 https://www.hotforsecurity.com/blog/playstation-chief-shuhei-yoshida-has-his-twitter-hacked-by-ourmine-16083.html www.secnews.physaphae.fr/article.php?IdArticle=4499 False None None None Graham Cluley - Blog Security Drupalgeddon hits Warframe - nearly 800,000 gamers' account details being sold on the net Drupalgeddon hits Warframe - nearly 800,000 gamers' account details being sold on the net.Are you a fan of Warframe?Is so, Digital Extremes, the company behind the popular online game has some bad news for you.Read more in my article on the Tripwire State of Security blog.]]> 2016-07-21T09:29:43+00:00 http://www.tripwire.com/state-of-security/security-awareness/drupalgeddon-hits-warframe-nearly-800000-gamers-account-details-being-sold-on-the-net/ www.secnews.physaphae.fr/article.php?IdArticle=4485 False None None None