www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-02T23:17:54+00:00 www.secnews.physaphae.fr Graham Cluley - Blog Security Free buyer\'s guide to evaluating fraud detection & prevention tools Buyer's Guide to Evaluating Fraud Detection & Prevention Tools (White Paper by OneSpan)Graham Cluley Security News is sponsored this week by the folks at OneSpan. Thanks to the great team there for their support! More than 10,000 customers in 100 countries rely on OneSpan to secure access, manage identities, verify transactions, simplify document signing and protect high value assets and systems. The fraud detection and prevention market offers a wide range of tools with a wide range of capabilities, but fraud is an ever-evolving threat. Not every tool can keep up with the new fraud schemes in play today. Download this guide from OneSpan to gain expert insight on the essential capabilities you need in a fraud detection tool. From machine learning and an advanced rule engine to dynamic authentication flows, learn the nine key requirements to look for when comparing fraud solutions. Inside, you'll discover: The nine capabilities you need to combat today's fraud schemes The value of a layered, context-aware online security approach to fraud detection Why analyzing the mobile device itself is so crucial How to explore the full potential of your data How OneSpan's Risk Analytics solution meets these requirements Download OneSpan's “Buyer's Guide to Evaluating Fraud Detection & Prevention Tools”.
If you're interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here. ]]>
2018-10-01T08:43:00+00:00 https://www.grahamcluley.com/feed-sponsor-onespan-3/ www.secnews.physaphae.fr/article.php?IdArticle=826280 False Tool None None
Graham Cluley - Blog Security Zuckerberg\'s Facebook page? I\'ll livestream its deletion, says hacker Zuckerberg's Facebook page? I'll livestream its deletion, says hackerA Taiwanese bug hunter says that he will livestream his attempt to delete Mark Zuckerberg's Facebook page this weekend. Read more in my article on the Hot for Security blog. ]]> 2018-09-28T14:27:00+00:00 https://hotforsecurity.bitdefender.com/blog/zuckerbergs-facebook-page-ill-livestream-its-deletion-says-hacker-20384.html#new_tab www.secnews.physaphae.fr/article.php?IdArticle=825982 False None None None Graham Cluley - Blog Security Australian teen who hacked into Apple and stole 90 GB of files avoids jail Australian teen who hacked into Apple and stole 90 GB of files avoids jailAn Australian teenager who hacked into Apple's network on multiple occasions over several months and stole sensitive files has been told that he will not be imprisoned. Read more in my article on the Tripwire State of Security blog. ]]> 2018-09-28T13:21:00+00:00 https://www.tripwire.com/state-of-security/featured/australian-teen-who-hacked-into-apple-and-stole-90-gb-of-files-avoids-jail/#new_tab www.secnews.physaphae.fr/article.php?IdArticle=825983 False None None None Graham Cluley - Blog Security Come to the National Information Security Conference (NISC), 10-12 October 2018 Come to the National Information Security Conference (NISC), 10-12 October 2018Graham Cluley will be chairing the 19th National Information Security Conference (NISC) in Glasgow, Scotland, between 10th-12th October. Register for your ticket now. ]]> 2018-09-28T10:06:03+00:00 https://www.grahamcluley.com/nisc-2018/ www.secnews.physaphae.fr/article.php?IdArticle=825984 False None None None Graham Cluley - Blog Security Smashing Security #097: Dash cam surveillance, robocall plague, and Zoho woe Smashing Security #097: Dash cam surveillance, robocall plague, and Zoho woeWhy was Zoho's website taken offline by its own domain registrar? How are dash cams making you less secure? And why are robocalls on the rise in the United States? All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by The Cyberwire's Dave Bittner. ]]> 2018-09-27T08:29:01+00:00 https://www.grahamcluley.com/smashing-security-097-dash-cam-surveillance-robocall-plague-and-zoho-woe/ www.secnews.physaphae.fr/article.php?IdArticle=825985 False None None None Graham Cluley - Blog Security Malware steals passwords from SHEIN, 6.4 million customers impacted Malware steals passwords from 6.4 million SHEIN customersWomen's fashion retailer SHEIN has suffered a major security breach that has exposed the personal information and passwords of over six million customers. Read more in my article on the Hot for Security blog. ]]> 2018-09-26T08:41:04+00:00 https://hotforsecurity.bitdefender.com/blog/malware-steals-passwords-from-6-4-million-shein-customers-20375.html#new_tab www.secnews.physaphae.fr/article.php?IdArticle=824674 False Malware None None Graham Cluley - Blog Security 14 years prison for man who helped hackers evade detection by anti-virus software 14 years prison for man who helped hackers evade detection by anti-virus softwareA US court has sentenced the creator of a notorious service that helped malware authors avoid detection by anti-virus software to 14 years in prison. Read more in my article on the Hot for Security blog. ]]> 2018-09-25T10:03:00+00:00 https://hotforsecurity.bitdefender.com/blog/14-years-prison-for-man-who-helped-hackers-evade-detection-by-anti-virus-software-20363.html#new_tab www.secnews.physaphae.fr/article.php?IdArticle=823381 False Malware None None Graham Cluley - Blog Security NewsNow suffers security breach - passwords should be considered compromised NewsNow suffers security breach - passwords should be considered compromisedOnline news aggregation service NewsNow has admitted that it has suffered a security breach, potentially exposing users' passwords. ]]> 2018-09-25T09:53:04+00:00 https://www.grahamcluley.com/newsnow-suffers-security-breach-passwords-should-be-considered-compromised/ www.secnews.physaphae.fr/article.php?IdArticle=823283 False None None None Graham Cluley - Blog Security Take this short survey to assess your organization\'s threat intelligence maturity Recorded Future. Take this short survey to assess your organization's threat intelligence maturity.Graham Cluley Security News is sponsored this week by the folks at Recorded Future. Thanks to the great team there for their support! Recorded Future believes that every security team can benefit from threat intelligence. That's why it has launched its new Threat Intelligence Grader - so you can quickly assess your organization's threat intelligence maturity and get best practices for improving it. Recorded Future delivers the only complete threat intelligence solution powered by patented machine learning to lower risk. It empowers organizations to reveal unknown threats before they impact business, and enables teams to respond to alerts 10 times faster. To supercharge the efforts of security teams, Recorded Future's technology automatically collects and analyzes intelligence from technical, open web, and dark web sources and aggregates customer-proprietary data. Recorded Future delivers more context than threat feeds, updates in real time so intelligence stays relevant, and centralizes information ready for human analysis, collaboration, and integration with security technologies. 91 percent of the Fortune 100 use Recorded Future. Try out Recorded Future's Threat Intelligence Grader for yourself now!
If you're interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here. ]]>
2018-09-24T07:00:01+00:00 https://www.grahamcluley.com/recorded-future-feed-sponsor-33/ www.secnews.physaphae.fr/article.php?IdArticle=821681 False Threat None None
Graham Cluley - Blog Security Smashing Security #096: Bribing Amazon staff, and blinking deepfakes Ss episode 96 thumbAmazon staff are being bribed to delete negative reviews and leak data, deepfakes are getting more dangerous, an update on John McAfee's bitcoin bet, and our guest gets a shock… All this and more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week (for a while at least) by David Bisson. ]]> 2018-09-19T23:35:00+00:00 https://www.grahamcluley.com/smashing-security-096-bribing-amazon-staff-and-blinking-deepfakes/ www.secnews.physaphae.fr/article.php?IdArticle=816416 False None None None Graham Cluley - Blog Security \'Peekaboo\' zero-day lets hackers view and alter surveillance camera footage Hundreds of thousands of security cameras are believed to be vulnerable to a zero-day vulnerability that could allow hackers to spy on feeds and even tamper with video surveillance recordings. Read more in my article on the Bitdefender BOX blog. ]]> 2018-09-19T12:12:04+00:00 https://www.bitdefender.com/box/blog/iot-news/peekaboo-zero-day-lets-hackers-view-alter-surveillance-camera-footage/#new_tab www.secnews.physaphae.fr/article.php?IdArticle=815347 False Vulnerability None None Graham Cluley - Blog Security The makers of the Mirai IoT-hijacking botnet are sentenced The makers of the Mirai IoT-hijacking botnet are sentencedThree men who operated and controlled the notorious Mirai botnet in October 2016 have been sentenced to five years of probation. Read more in my article on the Tripwire State of Security blog. ]]> 2018-09-19T12:04:04+00:00 https://www.tripwire.com/state-of-security/featured/mirai-iot-hijacking-botnet-sentenced/#new_tab www.secnews.physaphae.fr/article.php?IdArticle=815348 False None None None Graham Cluley - Blog Security Your business should be more afraid of phishing than malware Your business should be more afraid of phishing than malwareIf you were to make a list of the most common causes of security breaches, it is phishing attacks that would surely dominate. Read more in my article on the Bitdefender Business Insights blog. ]]> 2018-09-19T07:33:01+00:00 https://businessinsights.bitdefender.com/your-business-should-be-more-afraid-of-phishing-than-malware#new_tab www.secnews.physaphae.fr/article.php?IdArticle=814977 False Malware None None Graham Cluley - Blog Security US Dept of State says attack on email system exposed employees\' personal data US Dept of State says data breach exposed employees' personal dataThe US Department of State has confirmed that it has suffered a data breach which exposed the personally identifiable information of some employees. ]]> 2018-09-18T23:34:05+00:00 https://www.grahamcluley.com/us-dept-of-state-says-attack-on-email-system-exposed-employees-personal-data/ www.secnews.physaphae.fr/article.php?IdArticle=814790 False Data Breach None None Graham Cluley - Blog Security Another wave of sextortion emails Another wave of sextortion emailsDuring the last few months, many of us will have received emails that try to extract a ransom via an anonymous cryptocurrency. But as email blackmailers make big winnings, others are trying to cash in on the craze. ]]> 2018-09-17T15:01:03+00:00 https://www.grahamcluley.com/another-wave-of-sextortion-emails/ www.secnews.physaphae.fr/article.php?IdArticle=812309 False None None None Graham Cluley - Blog Security Bristol Airport says it did not pay any ransom to recover from cyber attack Bristol Airport says it did not pay any ransom to recover from cyber attackOfficials at Bristol Airport in the UK declined to pay a ransom demand from extortionists who attacked its computer systems late last week, forcing them to resort to whiteboards and public address systems to communicate with travellers. ]]> 2018-09-17T13:43:02+00:00 https://www.grahamcluley.com/bristol-airport-says-it-did-not-pay-any-ransom-to-recover-from-cyber-attack/ www.secnews.physaphae.fr/article.php?IdArticle=812232 False None None None Graham Cluley - Blog Security 8 Industry Best Practices for a Successful Mobile First Strategy (eBook by OneSpan) 8 Industry Best Practices for a Successful Mobile First Strategy (eBook by OneSpan)Graham Cluley Security News is sponsored this week by the folks at OneSpan. Thanks to the great team there for their support! More than 10,000 customers in 100 countries rely on OneSpan to secure access, manage identities, verify transactions, simplify document signing and protect high value assets and systems. And you can now download OneSpan's free eBook: “8 Industry Best Practices for a Successful Mobile First Strategy”. Financial institutions strategically aim for customers to do more with mobile while minimizing fraud exposure tied to untrusted, high-risk devices. To enable growth in the mobile channel, financial institutions need to provide fast, convenient and frictionless high-value services delivered as securely and fraud-proof as possible. Building trust between the bank and the customer is priority one in achieving this goal. Inside OneSpan's eBook, you'll discover how to: Provide a frictionless experience Measure risk on each mobile device Combat social engineering and other threats Simplify document signing Login quickly and securely Adopt an Omni-channel approach Be ready for regulation Download now: “8 Industry Best Practices for a Successful Mobile First Strategy”.
If you're interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here. ]]>
2018-09-17T12:53:01+00:00 https://www.grahamcluley.com/feed-sponsor-onespan-2/ www.secnews.physaphae.fr/article.php?IdArticle=812137 False None None None
Graham Cluley - Blog Security How to crash and restart an iPhone with a CSS-based web attack How to crash and restart an iPhone with a CSS-based web attackA security researcher has revealed a method of crashing and restarting iPhones and iPads, with just a few lines of code that could be added to any webpage. Read more in my article on the Hot for Security blog. ]]> 2018-09-17T07:49:02+00:00 https://hotforsecurity.bitdefender.com/blog/how-to-crash-and-restart-an-iphone-with-a-css-based-web-attack-20333.html#new_tab www.secnews.physaphae.fr/article.php?IdArticle=811630 False None None 3.0000000000000000 Graham Cluley - Blog Security Amazon staff said to be taking bribes to leak data Amazon staff said to be taking bribes to leak dataOften the biggest problem is not the threat of external hackers, but rather internal staff to whom you have granted access to sensitive data and who might be tempted to exploit it for financial gain. ]]> 2018-09-17T00:57:03+00:00 https://www.grahamcluley.com/amazon-staff-said-to-be-taking-bribes-to-leak-data/ www.secnews.physaphae.fr/article.php?IdArticle=811302 False Threat None None Graham Cluley - Blog Security Prison for man who assisted scareware scheme that targeted newspaper website Prison for man who assisted scareware scheme that targeted newspaper websiteA man wanted for his part in a lucrative criminal operation that spread scareware via the Minnesota Star Tribune website, who spent years on the run from the FBI, has finally been sent to prison. Read more in my article on the Tripwire State of Security blog. ]]> 2018-09-13T13:13:05+00:00 https://www.tripwire.com/state-of-security/security-data-protection/prison-for-man-who-assisted-scareware-scheme-that-targeted-newspaper-website/#new_tab www.secnews.physaphae.fr/article.php?IdArticle=806270 False None None None Graham Cluley - Blog Security Smashing Security #095: British Airways hack, Mac apps steal browser history, and one person has 285,000 texts leaked Smashing Security #095: British Airways hack, Mac apps steal browser history, and one person has 285,000 texts leakedMalicious script is being blamed for the British Airways hack, Trend Micro's apps are booted out of the Mac App Store for snaffling private data, and Paul Manafort's daughter wants Twitter to remove a link. All this and more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by David Emm of Kaspersky Lab. ]]> 2018-09-13T00:57:03+00:00 https://www.grahamcluley.com/smashing-security-095-british-airways-hack-mac-apps-steal-browser-history-and-one-person-has-285000-texts-leaked/ www.secnews.physaphae.fr/article.php?IdArticle=805529 False None None None Graham Cluley - Blog Security TV License website said it was secure. It wasn\'t TV License website said it was secure. It wasn'tThe official UK TV licensing website was allowing license purchasers to submit their personal identifiable information and bank details in unsafe, unencrypted plaintext. ]]> 2018-09-12T14:53:02+00:00 https://www.grahamcluley.com/tv-license-website/ www.secnews.physaphae.fr/article.php?IdArticle=804736 False None None None Graham Cluley - Blog Security Trend Micro apologises after Mac apps found scooping up users\' browser history Trend Micro apologises after Mac apps found scooping up users' browser historyTrend Micro has confirmed reports that some of its Mac consumer products were silently sending users' browser history to its servers, and apologised to customers for any “concern they might have felt.” But apparently it's the users' fault anyway for not reading the EULA. ]]> 2018-09-11T11:09:03+00:00 https://www.grahamcluley.com/trend-micro-apologises-after-mac-apps-found-scooping-up-users-browser-history/ www.secnews.physaphae.fr/article.php?IdArticle=802918 False None None None Graham Cluley - Blog Security Law firm launches £500 million group action over British Airways hack Law firm launches £500 million group action over British Airways hackWithin hours of British Airways admitting that it had suffered a serious security breach, with hackers accessing customer data and the full details of 380,000 payment cards, a British law firm announced that it was launching a £500m group action against the airline. ]]> 2018-09-10T20:11:03+00:00 https://www.grahamcluley.com/law-firm-launches-500-million-group-action-over-british-airways-hack/ www.secnews.physaphae.fr/article.php?IdArticle=802057 False Hack None None Graham Cluley - Blog Security Apps that steal users\' browser histories kicked out of the Mac App store Apps that steal users' browser histories kicked out of the Mac App storeApple has removed “Adware Doctor” from the macOS App Store amid claims that the program was uploading browser histories to China. And it turns out that wasn't the only popular app stealing users' private information. Read more in my article on the Tripwire State of Security blog. ]]> 2018-09-10T13:47:02+00:00 https://www.tripwire.com/state-of-security/featured/apps-that-steal-users-browser-histories-kicked-out-of-the-mac-app-store/#new_tab www.secnews.physaphae.fr/article.php?IdArticle=801582 False None None None Graham Cluley - Blog Security Cyber as a Business Enabler: Operationalizing Cyber Risk Analytics. Download free ebook sneak peek today Cyber as a Business Enabler: Operationalizing Cyber Risk Analytics. Download free ebook sneak peek todayGraham Cluley Security News is sponsored this week by the folks at Nehemiah Security. Thanks to the great team there for their support! Coming this fall, Nehemiah is releasing their newest ebook, “Cyber as a Business Enabler: Operationalizing Cyber Risk Analytics”. This introductory guide arms the modern day cybersecurity leader to put cyber risk into motion and transform cybersecurity operations into a business enabler. Topics covered in this book include: The end goal of cyber risk analytics Where to gather the right data Key stakeholders involved What it takes to quantify cyber risks financially Follow this link for a sneak peek into the content and to reserve your copy when the full book is released!
If you're interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here. ]]>
2018-09-10T09:17:02+00:00 https://www.grahamcluley.com/feed-sponsor-nehemiah-ebook/ www.secnews.physaphae.fr/article.php?IdArticle=801221 False Guideline None None
Graham Cluley - Blog Security Teenage hacker admits making hoax bomb threats against schools and airlines Teenage hacker admits making hoax bomb threats against schools and airlinesBritish police have announced that they have arrested a 19-year-old man in connection with a series of hoax bomb threats and distributed denial-of-service (DDoS) attacks. Read more in my article on the Hot for Security blog. ]]> 2018-09-07T10:36:01+00:00 https://hotforsecurity.bitdefender.com/blog/teenage-hacker-admits-making-hoax-bomb-threats-against-schools-and-airlines-20309.html#new_tab www.secnews.physaphae.fr/article.php?IdArticle=797007 False None None None Graham Cluley - Blog Security British Airways hacked - customer data and details of 380,000 card payments stolen British Airways hacked - customer data and details of 380,000 card payments stolenHackers have stolen the personal and payment card information of hundreds of thousands of British AIrways passengers from its website. ]]> 2018-09-06T19:02:00+00:00 https://www.grahamcluley.com/british-airways-hacked-customer-data-and-details-of-380000-card-payments-stolen/ www.secnews.physaphae.fr/article.php?IdArticle=795806 False None None None Graham Cluley - Blog Security How to manipulate Apple\'s podcast charts, and get yourself a top-rated show How to manipulate Apple's podcast chartsUnpopular podcasts are manipulating Apple Podcasts to artificially inflate their ranking, and get themselves a coveted place towards the top of the charts. ]]> 2018-09-06T12:49:05+00:00 https://www.grahamcluley.com/how-to-manipulate-apples-podcast-charts-and-get-yourself-a-top-rated-show/ www.secnews.physaphae.fr/article.php?IdArticle=795220 False None None None Graham Cluley - Blog Security Smashing Security #094: Rogue browser extensions, Twitter presence, and how to cheat in exams Smashing Security #094: Rogue browser extensions, Twitter presence, and how to cheat in examsWhat's the danger when browser extensions go bad? Is Twitter sharing your online status a boon for stalkers? And which of the show's hosts is going to admit to cheating in their exams? All this and much much more is discussed in the latest edition of the award-winning “Smashing Security” podcast hosted by computer security veterans Graham Cluley and Carole Theriault, joined this week by technology journalist David McClelland. ]]> 2018-09-06T06:14:00+00:00 https://www.grahamcluley.com/smashing-security-094-rogue-browser-extensions-twitter-presence-and-how-to-cheat-in-exams/ www.secnews.physaphae.fr/article.php?IdArticle=794745 False None None None Graham Cluley - Blog Security Ran Levi interviews Graham Cluley on the Malicious Life podcast Ran Levi interviews Graham Cluley on the Malicious Life podcastRan Levi of “Malicious Life” interviewed me about the early days of the anti-virus industry, how my career started, how cybercrime has changed, and why I've got a very good personal reason to abhor Facebook. ]]> 2018-09-05T16:14:01+00:00 https://www.grahamcluley.com/ran-levi-interviews-graham-cluley-on-the-malicious-life-podcast/ www.secnews.physaphae.fr/article.php?IdArticle=793920 False None None None Graham Cluley - Blog Security If an extension goes rogue, everything you do in your browser is compromised If an extension goes rogue, everything you do in your browser is compromisedThe official Chrome browser extension for Mega.nz was compromised with a malicious update, stealing passwords and private keys. Keep your browser extensions to a minimum, and always be wary if they ask for elevated permissions. ]]> 2018-09-05T11:12:04+00:00 https://www.grahamcluley.com/rogue-browser-extension/ www.secnews.physaphae.fr/article.php?IdArticle=793443 False None None None Graham Cluley - Blog Security Premera Blue Cross victims accuse insurer of deliberately destroying hacking evidence Premera Blue Cross victims accuse insurer of deliberately destroying hacking evidenceA class-action lawsuit against a hacked health insurer is claiming that a crucial computer was wilfully destroyed, erasing critical evidence that could prove the severity of the security breach. Read more in my article on the Hot for Security blog. ]]> 2018-09-05T09:11:01+00:00 https://www.grahamcluley.com/premera-blue-cross-victims-accuse-insurer-of-deliberately-destroying-hacking-evidence/ www.secnews.physaphae.fr/article.php?IdArticle=793310 False None None None Graham Cluley - Blog Security Cryptomininers killing cryptominers to squeeze more out of your CPU Cryptomining thumb30 years may have passed since the advent of the computer virus problem, but there is still malware fighting malware for control of your PC. ]]> 2018-09-03T23:29:00+00:00 https://www.grahamcluley.com/cryptomininers-killing-cryptominers-to-squeeze-more-out-of-your-cpu/ www.secnews.physaphae.fr/article.php?IdArticle=791247 False Malware None None Graham Cluley - Blog Security Twitter testing new feature that reveals when you\'re online Twitter testing new feature that reveals when you're onlineGood news for stalkers! Bad news for privacy. Twitter is working on a feature which will reveal when a user is currently online. ]]> 2018-09-03T12:29:00+00:00 https://www.grahamcluley.com/twitter-testing-new-feature-that-reveals-when-youre-online/ www.secnews.physaphae.fr/article.php?IdArticle=790666 False None None None Graham Cluley - Blog Security Read OneSpan\'s 8-page report on the top six e-Signature use cases in banking Read OneSpan's 8-page report on the top six e-Signature use cases in bankingGraham Cluley Security News is sponsored this week by the folks at OneSpan. Thanks to the great team there for their support! More than 10,000 customers in 100 countries rely on OneSpan to secure access, manage identities, verify transactions, simplify document signing and protect high value assets and systems. OneSpan has produced a free report on the top six e‑signature use cases in banking. With it you can learn the most common starting points for e‑signatures, plus the top targets for expanding across the enterprise. E-signatures are being used in all areas of the bank, from customer-facing transactions to B2B and internal processes. Some banks start by introducing e-signatures as part of a branch transformation initiative. Others begin in the online channel with high volume, self-serve transactions. As digitalization efforts mature, it is becoming common for organizations such as U.S. Bank, BMO (Bank of Montreal), RBC (Royal Bank of Canada) and even non-bank lenders like OneMain Financial to expand e-signature capability across all channels, lines of business, mobile apps and more. OneSpan's free paper offers guidance to banks of all sizes seeking to answer questions like: What are the common challenges in going digital? What are the latest e-signature adoption and technology trends in banking? Where to start, and what is the best way to expand? Download the OneSpan White Paper “Top e-Signature Use Cases in Banking” now.
If you're interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here. ]]>
2018-09-03T10:15:04+00:00 https://www.grahamcluley.com/feed-sponsor-onespan-esignature/ www.secnews.physaphae.fr/article.php?IdArticle=790516 False None None None
Graham Cluley - Blog Security Air Canada admits app data breach included customers\' passport details Air Canada admits app data breach included customers' passport detailsAll 1.7 million users of Air Canada's mobile app have had their passwords reset by the company following a security breach which saw hackers compromise up to 20,000 accounts last week. Read more in my article on the Hot for Security blog. ]]> 2018-08-31T14:00:03+00:00 https://hotforsecurity.bitdefender.com/blog/air-canada-admits-app-data-breach-included-customers-passport-details-20300.html#new_tab www.secnews.physaphae.fr/article.php?IdArticle=787123 False Data Breach None None Graham Cluley - Blog Security Smashing Security #093: Abandoned domains and dating app dangers Smashing Security #093: Abandoned domains and dating app dangersHow do fraudsters exploit abandoned domains to steal your company's secrets? How can you better protect your privacy when looking for love online? And who has the longest arms in the animal kingdom? All this and more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault. ]]> 2018-08-29T23:02:03+00:00 https://www.grahamcluley.com/smashing-security-093-abandoned-domains-and-dating-app-dangers/ www.secnews.physaphae.fr/article.php?IdArticle=785295 False None None None Graham Cluley - Blog Security Instagram finally supports third-party 2FA apps for greater account security Instagram finally supports third-party 2FA apps for greater account securityInstagram has entered the 21st century, and finally added support for third-party 2FA apps like Google Authenticator, Duo Mobile, and Authy. Please turn it on. ]]> 2018-08-28T23:52:03+00:00 https://www.grahamcluley.com/instagram-finally-supports-third-party-2fa-apps-for-greater-account-security/ www.secnews.physaphae.fr/article.php?IdArticle=783405 False None None None Graham Cluley - Blog Security OCR software firm ABBYY leaks 203,000 customer documents in MongoDB server snafu OCR software firm ABBYY leaks 203,000 customer documents in MongoDB server snafuABBYY, the developer of optical character recognition and text-scanning software, left a server containing 142GB of a customer's scanned documents exposed for anyone on the internet to access, no password required. Read more in my article on the Tripwire State of Security blog. ]]> 2018-08-28T17:27:04+00:00 https://www.tripwire.com/state-of-security/security-data-protection/ocr-abbyy-leaks-customer-mongodb-server-snafu/#new_tab www.secnews.physaphae.fr/article.php?IdArticle=783066 False None None None Graham Cluley - Blog Security Fortnite fury over how Google handled its security hole Fortnite fury over how Google handled its huge security holeEpic Games isn't happy about how Google handled the disclosure of the serious security vulnerability in Fortnite. ]]> 2018-08-27T13:32:03+00:00 https://www.grahamcluley.com/fortnite-fury-over-how-google-handled-its-huge-security-hole/ www.secnews.physaphae.fr/article.php?IdArticle=783006 False Vulnerability None None Graham Cluley - Blog Security Hackers have stolen details of two million T-Mobile US customers Hackers have stolen details of two million T-Mobile customersTelecoms provider T-Mobile has admitted that hackers gained access to some of its customer data this week. No social security numbers, payment card data, or passwords included in the haul, but that doesn't mean you have nothing to worry about. ]]> 2018-08-24T10:32:02+00:00 https://www.grahamcluley.com/hackers-t-mobile-data/ www.secnews.physaphae.fr/article.php?IdArticle=783008 False None None None Graham Cluley - Blog Security Facebook pulls its VPN from the iOS App Store after data-harvesting accusations Facebook pulls its VPN from the iOS App Store after data-harvesting accusationsFacebook has withdrawn its Onavo Protect VPN app from the iOS App Store after Apple determined that it was breaking data-collection policies. Read more in my article on the Hot for Security blog. ]]> 2018-08-23T15:31:04+00:00 https://hotforsecurity.bitdefender.com/blog/facebook-pulls-its-vpn-from-the-ios-app-store-after-data-harvesting-accusations-20268.html#new_tab www.secnews.physaphae.fr/article.php?IdArticle=783009 False None None None Graham Cluley - Blog Security Google warns businesses of government-backed phishing attacks Google warns businesses of government-backed phishing attacksIf a government-backed hacking gang cannot extract the information it wants from a single person's Gmail account, they might instead target an organisation they work for or with whom they are affiliated. Read more in my article on the Bitdefender BOX blog. ]]> 2018-08-23T14:51:02+00:00 https://businessinsights.bitdefender.com/google-warns-businesses-government-backed-phishing-attacks#new_tab www.secnews.physaphae.fr/article.php?IdArticle=783010 False None None None Graham Cluley - Blog Security Smashing Security #092: Hacky sack hack hack Smashing Security #092: Hacky sack hack hackIs your used car still connected to its old owner? Just how did Apple manage to identify the teenager hacker who stole 90GB of the firm's files? And why on earth would a firm of lawyers start producing pornographic videos? You'll be surprised by the answers! All this and much much more is discussed in the latest edition of the award-winning “Smashing Security” podcast hosted by computer security veterans Graham Cluley and Carole Theriault, joined this week by Paul Ducklin. ]]> 2018-08-23T11:08:02+00:00 https://www.grahamcluley.com/smashing-security-092-hacky-sack-hack-hack/ www.secnews.physaphae.fr/article.php?IdArticle=783011 False Hack None None Graham Cluley - Blog Security Unencrypted laptop exposes personal details of 37,000 Eir customers, faulty security update blamed Unencrypted laptop exposes personal details of 37,000 Eir customers, faulty security update blamedIrish telecoms operator Eir is blaming a “faulty security update” for leaving unencrypted a staff member's laptop which was subsequently stolen outside of one of its offices. Read more in my article on the Tripwire State of Security blog. ]]> 2018-08-23T10:43:02+00:00 https://www.tripwire.com/state-of-security/featured/unencrypted-laptop-exposes-personal-details-of-37000-eir-customers-faulty-security-update-blamed/#new_tab www.secnews.physaphae.fr/article.php?IdArticle=783012 False None None None Graham Cluley - Blog Security MadIoT: How an IoT botnet could launch a major attack on the power grid MadIoT: How an IoT botnet could launch a major attack on the power gridAcademic researchers claim that hackers could exploit high wattage IoT appliances such as air conditioners, heaters, and cookers, to perform attacks on the power grid. Read more in my article on the Bitdefender BOX blog. ]]> 2018-08-21T13:02:02+00:00 https://www.bitdefender.com/box/blog/iot-news/madiot-iot-botnet-launch-major-attack-power-grid/#new_tab www.secnews.physaphae.fr/article.php?IdArticle=783013 False None None None Graham Cluley - Blog Security Cybercrime isn\'t going away, but hacking prosecutions are falling Cybercrime isn't going away, but hacking prosecutions are fallingThe number of hacking prosecutions has fallen again, but that's no cause for celebration. PC Plod can't catch criminals if they don't have the resources. ]]> 2018-08-20T14:12:02+00:00 https://www.grahamcluley.com/cybercrime-isnt-going-away-but-hacking-prosecutions-are-falling/ www.secnews.physaphae.fr/article.php?IdArticle=782312 False None None None Graham Cluley - Blog Security Rotten EGGs spread ransomware in South Korea Rotten EGGs spread ransomware in South KoreaResearchers report that online criminals are spamming out ransomware to potential victims in South Korea disguised as.… .EGGs. ]]> 2018-08-20T13:06:05+00:00 https://www.grahamcluley.com/rotten-egg-ransomware-south-korea/ www.secnews.physaphae.fr/article.php?IdArticle=782193 False Ransomware None None Graham Cluley - Blog Security Discover the State of Authentication and the Evolving Threat Landscape in this White Paper by OneSpan. Get your copy! Discover the State of Authentication and the Evolving Threat Landscape in this White Paper by OneSpan. Get your copy!Graham Cluley Security News is sponsored this week by the folks at OneSpan. Thanks to the great team there for their support! Banks and financial institutions find themselves trying to satisfy competing priorities. Fraud continues to grow at an alarming pace and in sophistication year-over-year. Meanwhile, the consumer's patience for additional layers of unnecessary security dwindles. Banks are forced to decide between alienating their customers and leaving them vulnerable to attack. Intelligent adaptive authentication is a new approach to combatting fraud that solves this problem and achieves the twin goals of reducing fraud and delighting the customer. Read this free white paper from OneSpan to learn: How to equip your bank to better combat fraud through real-time risk analytics Top solution requirements to look for, including open architecture, AI/machine learning, and advanced rule sets The importance of authentication orchestration, risk analytics and mobile app security in achieving a fully optimized digital banking experience Download the free “Superior User Experience and Growth Through Intelligent Security” white paper now.
If you're interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here. ]]>
2018-08-20T12:03:00+00:00 https://www.grahamcluley.com/feed-sponsor-onespan/ www.secnews.physaphae.fr/article.php?IdArticle=782105 False Threat None None
Graham Cluley - Blog Security SuperProf private tutor site massively fails password test, makes accounts super easy to hack Dunce thumbSuperprof, which claims to be “the world's largest tutoring network”, has made its newest members' passwords utterly predictable… leaving them wide open to hackers. ]]> 2018-08-17T13:06:01+00:00 https://www.grahamcluley.com/superprof-private-tutor-site-massively-fails-password-test-makes-accounts-super-easy-to-hack/ www.secnews.physaphae.fr/article.php?IdArticle=779794 False Hack None 4.0000000000000000 Graham Cluley - Blog Security Apple hacked by 16-year-old who “dreamed” of working for firm Apple hacked by 16-year-old who An Australian teenager has admitted hacking into Apple's internal network and stealing 90 GB worth of files. The 16-year-old has pleaded guilty to breaking into Apple's systems on multiple occasions over the course of a year, from his parent's home in Melbourne's suburbs. Read more in my article on the Hot for Security blog. ]]> 2018-08-17T11:21:04+00:00 https://hotforsecurity.bitdefender.com/blog/apple-hacked-by-16-year-old-who-dreamed-of-working-for-firm-20254.html#new_tab www.secnews.physaphae.fr/article.php?IdArticle=779795 False Guideline None 3.0000000000000000 Graham Cluley - Blog Security Sex extortion emails now quoting part of their victim\'s phone number Extortion email thumbSome computer users are reporting that they have received a new type of extortion email in their inbox, which - in an attempt to scare them into giving in to demands for money - quotes part of their phone number. But where are the blackmailers getting the phone number from? ]]> 2018-08-15T13:11:04+00:00 https://www.grahamcluley.com/sex-extortion-emails-now-quoting-part-of-their-victims-phone-number/ www.secnews.physaphae.fr/article.php?IdArticle=779798 False None None 4.0000000000000000 Graham Cluley - Blog Security Bad news conspiracy theorists. QAnon codes are just a guy mashing his keyboard Bad news conspiracy theorists. QAnon's codes are just a guy mashing his keyboardThe codes in Q's posts aren't actual codes, but instead “just random typing by someone who might play an instrument and uses a qwerty keyboard,” says password expert. ]]> 2018-08-14T20:30:04+00:00 https://www.grahamcluley.com/bad-news-conspiracy-theorists-qanons-codes-are-just-a-guy-mashing-his-keyboard/ www.secnews.physaphae.fr/article.php?IdArticle=779799 False None None 2.0000000000000000 Graham Cluley - Blog Security Pausing \'Location history\' doesn\'t stop Google tracking your location. Here\'s how to stop it Pausing Google 'Location history' doesn't stop your location data from being collected and storedYou would think that telling Google that you didn't want your location be tracked by disabling an option called “Location History” would stop the internet giant from errr.. storing data about your location. Think again. ]]> 2018-08-14T10:20:05+00:00 https://www.grahamcluley.com/pausing-google-location-history-doesnt-stop-your-location-data-from-being-collected-and-stored/ www.secnews.physaphae.fr/article.php?IdArticle=779800 False None None None Graham Cluley - Blog Security Security breach in the White House\'s Situation Room Security breach in the White House's Situation RoomA former reality TV star was able to sneak in her smartphone and record secret conversations in the Situation Room, supposedly the most secure place in the White House. ]]> 2018-08-13T11:40:05+00:00 https://www.grahamcluley.com/security-breach-in-the-white-houses-situation-room/ www.secnews.physaphae.fr/article.php?IdArticle=779801 False None None None Graham Cluley - Blog Security Hackers phish Butlin\'s holiday camp chain, access customers\' personal data Hackers phish Butlin's holiday camp chain, access customers' personal dataFabled British holiday camp chain Bultin's has admitted that it has suffered a data breach that may have exposed details of 34,000 guests. Read more in my article on the Hot for Security blog. ]]> 2018-08-10T15:35:05+00:00 https://hotforsecurity.bitdefender.com/blog/hackers-phish-butlins-holiday-camp-chain-access-customers-personal-data-20235.html#new_tab www.secnews.physaphae.fr/article.php?IdArticle=775272 False Data Breach None None Graham Cluley - Blog Security 26.5 million Comcast Xfinity customers had their partial home addresses and SSNs exposed by sloppy security 26.5 million Comcast Xfinity customers had their partial home addresses and SSNs exposed by sloppy securityPoor security measures have reportedly put the personal details of over 26.5 million Comcast Xfinity customers at risk, a researcher has revealed. Read more in my article on the Tripwire State of Security blog. ]]> 2018-08-09T11:17:05+00:00 https://www.tripwire.com/state-of-security/featured/comcast-xfinity-customers-home-addresses-ssns-exposed/#new_tab www.secnews.physaphae.fr/article.php?IdArticle=772981 False None None None Graham Cluley - Blog Security Smashing Security #090: Fortnite for Android, and the FCC\'s DDoS BS Smashing Security #090: Fortnite for Android, and the FCC's DDoS BSFortnite players are told they'll have to disable a security setting on Android, the FCC finally admits that it wasn't hit by a DDoS attack, and Verizon's VPN smallprint raises privacy concerns. All this and much much more is discussed in the latest edition of the award-winning “Smashing Security” podcast hosted by computer security veterans Graham Cluley and Carole Theriault, joined this week by David Bisson. ]]> 2018-08-08T23:17:05+00:00 https://www.grahamcluley.com/smashing-security-090-fortnite-for-android-and-the-fccs-ddos-bs/ www.secnews.physaphae.fr/article.php?IdArticle=771980 False None None None Graham Cluley - Blog Security Snapchat\'s source code leaked out, and was published on GitHub Snapchat's source code leaked out, and was published on GitHubSnap, the parent company of SnapChat, has revealed that an update earlier this year to the social media app accidentally exposed some of its source code. Read more in my article on the Hot for Security blog. ]]> 2018-08-08T13:44:01+00:00 https://hotforsecurity.bitdefender.com/blog/snapchats-source-code-leaked-out-and-was-published-on-github-20209.html#new_tab www.secnews.physaphae.fr/article.php?IdArticle=771157 False None None None Graham Cluley - Blog Security Twitter CEO says they\'re taking no action against InfoWars and Alex Jones Twitter CEO says they're taking no action against InfoWars and Alex JonesIt's the same content that Facebook, YouTube, Spotify, and Apple banned. But Twitter isn't doing anything. ]]> 2018-08-08T11:01:03+00:00 https://www.grahamcluley.com/twitter-ceo-infowars-alex-jones/ www.secnews.physaphae.fr/article.php?IdArticle=770883 False None None None Graham Cluley - Blog Security No, Michael J Fox isn\'t dead No, Michael J Fox isn't deadCalm down. Michael J Fox isn't dead. A rumour spread across social media that the star of sitcom “Family Ties” and the “Back to the Future” movie trilogy had carked it at the age of 57. ]]> 2018-08-07T10:33:04+00:00 https://www.grahamcluley.com/no-michael-j-fox-isnt-dead/ www.secnews.physaphae.fr/article.php?IdArticle=769317 False None None None Graham Cluley - Blog Security Making millions out of prisoners\' email Making millions out of prisoners' emailBig business turns a blind eye to the human cost of exploiting US prisoners and their loved ones. ]]> 2018-08-06T14:20:04+00:00 https://www.grahamcluley.com/making-millions-out-of-prisoners-email/ www.secnews.physaphae.fr/article.php?IdArticle=768128 False None None None Graham Cluley - Blog Security Free eBook: If your friend was put in charge of a cyber budget, what advice would you give them? Free ebook: If your friend was put in charge of a cyber budget, what advice would you give them?Graham Cluley Security News is sponsored this week by the folks at Nehemiah Security. Thanks to the great team there for their support! If your friend was put in charge of measuring cyber risk at a large company, what advice would you give them? Nehemiah Security created this guide to advance the risk management conversation amongst cyber professionals. Many would claim they are able to pinpoint technical cyber risks. But few would profess a high level of confidence that they always deploy their resources to the biggest risks facing the company. Fewer still would say they effectively communicate this to their board. This eBook will change the way you approach and frame cyber risk conversations within your business. Download the eBook today!
If you're interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here. ]]>
2018-08-05T18:00:03+00:00 https://www.grahamcluley.com/feed-sponsor-nehemiah-2/ www.secnews.physaphae.fr/article.php?IdArticle=767164 False None None None
Graham Cluley - Blog Security Reddit hacked - but don\'t give up on 2FA just yet Reddit hacked - but don't give up on 2FA just yetYes, SMS-based 2FA can be intercepted by someone determined to hack into your account. But it's also better than not having any multi-factor authentication in place at all. Read more in my article on the Hot for Security blog. ]]> 2018-08-02T14:19:00+00:00 https://hotforsecurity.bitdefender.com/blog/reddit-hacked-but-dont-give-up-o%20n-2fa-just-yet-20184.html#new_tab www.secnews.physaphae.fr/article.php?IdArticle=763696 False Hack None None Graham Cluley - Blog Security Smashing Security #089: Data breaches, ransomware, Bitcoin robberies, and typewriters Smashing Security #089: Data breaches, ransomware, Bitcoin robberies, and typewritersRansomware rears its head again, Dixons Carphone reveals its data breach was almost 1000% worse than they previously thought, a man is accused of stealing five million dollars worth of cryptocurrency through hijacking mobile phones, and a Canadian guy called Norman is rushing to get the typewriters out of storage. All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by journalist Geoff White. ]]> 2018-08-02T10:14:02+00:00 https://www.grahamcluley.com/smashing-security-089-data-breaches-ransomware-bitcoin-robberies-and-typewriters/ www.secnews.physaphae.fr/article.php?IdArticle=763330 False Data Breach None None Graham Cluley - Blog Security Android apps infected with umm… *Windows* malware Android apps infected with umm... *Windows* malwareSecurity researchers at Palo Alto Networks recently discovered 145 apps in the official Google Play Android store that were “infected by malicious Microsoft Windows executable files.” Yes, you read that correctly. Android apps carrying malicious Windows executables. ]]> 2018-08-01T14:09:05+00:00 https://www.grahamcluley.com/android-apps-infected-windows-malware/ www.secnews.physaphae.fr/article.php?IdArticle=761959 False Malware None None Graham Cluley - Blog Security Phone scam exploits Russian hacking fears Putin phone thumbGuest contributor Bob Covello describes an unexpected phone call he received out of the blue. ]]> 2018-08-01T13:10:05+00:00 https://www.grahamcluley.com/phone-scam-exploits-russian-hacking-fears/ www.secnews.physaphae.fr/article.php?IdArticle=761803 False None None None Graham Cluley - Blog Security Steam game Abstractism pulled after cryptomining accusations Steam game Abstractism pulled after cryptomining accusationsValve has pulled a game from its online Steam store after allegations were made that it was exploiting players' computer resources to mine for cryptocurrency. Read more in my article on the Hot for Security blog. ]]> 2018-07-31T11:10:04+00:00 https://hotforsecurity.bitdefender.com/blog/steam-game-abstractism-pulled-after-cryptomining-accusations-20171.html#new_tab www.secnews.physaphae.fr/article.php?IdArticle=760307 False None None None Graham Cluley - Blog Security Dixons Carphone admits hack far bigger than originally thought Dixons thumbCompany now says approximately 10 million personal records could have been accessed in security breach. ]]> 2018-07-31T08:54:02+00:00 https://www.grahamcluley.com/dixons-carphone-admits-hack-far-bigger-than-originally-thought/ www.secnews.physaphae.fr/article.php?IdArticle=760013 False Hack None None Graham Cluley - Blog Security New York Times profiles one of its own security experts Don't just write about how hackers breach companies, protect your ownLast week, the New York Times published a brief profile of privacy and security researcher Runa Sandvik. Well known in the security community, Sandvik has been working at the New York Times since March 2016, boosting the security and privacy of journalists, anonymous sources, and indeed subscribers. ]]> 2018-07-30T15:05:04+00:00 https://www.grahamcluley.com/new-york-times-profile-runa-sandvik/ www.secnews.physaphae.fr/article.php?IdArticle=759018 False None None None Graham Cluley - Blog Security Prison inmates hacked tablets to earn $225,000 in credits Prison tablet thumb364 inmates in five of Idaho's state prisons have exploited vulnerabilities in the JPay tablets they use to read email and access video games in order to boost their credit balances. Read more in my article on the Hot for Security blog. ]]> 2018-07-30T14:45:02+00:00 https://hotforsecurity.bitdefender.com/blog/prison-inmates-hacked-tablets-to-earn-225000-in-credits-20164.html#new_tab www.secnews.physaphae.fr/article.php?IdArticle=758909 False None None None Graham Cluley - Blog Security 1.4 million online fashion shoppers exposed after data breach at UK ecommerce provider 1.4 million online fashion shoppers exposed after data breach at ecommerce providerUp to 1.4 million customers of a number of UK clothing and accessories websites have had their personal information exposed following a security breach at an IT services provider that they were sharing. ]]> 2018-07-30T12:34:03+00:00 https://www.grahamcluley.com/online-fashion-shoppers-exposed-ecommerce-breach/ www.secnews.physaphae.fr/article.php?IdArticle=758707 False Data Breach None None Graham Cluley - Blog Security Senator calls on US Government to start killing Flash now Senator calls on US Government to start killing Flash nowFor some companies eradicating Adobe Flash Player is going to be a significant job. And it may be an even bigger challenge for very large organisations, such as the US Government. Read more in my article on the Tripwire State of Security blog. ]]> 2018-07-26T12:47:01+00:00 https://www.tripwire.com/state-of-security/featured/senator-government-killing-flash/#new_tab www.secnews.physaphae.fr/article.php?IdArticle=754579 False None None None Graham Cluley - Blog Security Smashing Security #088: PayPal\'s Venmo app even makes your drug purchases public Smashing Security #088: PayPal's Venmo app even makes your drug purchases publicWebsites still using HTTP are marked as “not secure” by Chrome, 85,000 Google employees haven't been phished for a year, and if you're buying drugs via PayPal's Venom app you should say goodbye to privacy. All this and much much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Scott Helme. ]]> 2018-07-25T23:17:05+00:00 https://www.grahamcluley.com/smashing-security-088-paypals-venmo-app-even-makes-your-drug-purchases-public/ www.secnews.physaphae.fr/article.php?IdArticle=753834 False None None 2.0000000000000000 Graham Cluley - Blog Security Mind your company\'s old Twitter accounts, rather than allowing them to be hijacked by hackers Mind your company's old Twitter accounts, rather than allowing them to be hijacked by hackersThere were only 13 episodes of the science fiction TV show “Almost Human” aired before it was pulled from the schedules in 2014. But its Twitter account lives on, under the control of cryptocurrency giveaway scammers. ]]> 2018-07-25T14:18:04+00:00 https://www.grahamcluley.com/mind-your-companys-old-twitter-accounts-rather-than-allowing-them-to-be-hijacked-by-hackers/ www.secnews.physaphae.fr/article.php?IdArticle=753116 False None None None Graham Cluley - Blog Security Here\'s why Twitter will lock your account if you change your display name to Elon Musk Here's why Twitter will lock your account if you change your display name to Elon MuskThere's bad news if your name really is “Elon Musk”. You're going to have to jump over some additional hurdles to convince Twitter that you should be allowed to change your display name to the one you share with the boss of Tesla and SpaceX. Read more in my article on the Hot for Security blog. ]]> 2018-07-25T10:34:04+00:00 https://hotforsecurity.bitdefender.com/blog/heres-why-twitter-will-lock-your-account-if-you-change-your-display-name-to-elon-musk-20138.html#new_tab www.secnews.physaphae.fr/article.php?IdArticle=752735 False None Tesla None Graham Cluley - Blog Security UK university domains spoofed in massive fraud campaign targeting suppliers UK university domains spoofed in massive fraud campaign targeting suppliersBe on your guard if your company has received an order which appears to come from a UK university email address. That's the advice of Action Fraud, the UK's national reporting service for fraud and financially-motivated cybercrime, after it saw a marked rise in the number of domains being registered that look very similar to genuine universities. Read more in my article on the Hot for Security blog. ]]> 2018-07-24T11:09:05+00:00 https://hotforsecurity.bitdefender.com/blog/uk-university-domains-spoofed-in-massive-fraud-campaign-targeting-suppliers-20123.html#new_tab www.secnews.physaphae.fr/article.php?IdArticle=751042 False None None 5.0000000000000000 Graham Cluley - Blog Security Google Chrome users met with \'Not secure\' warnings from Tuesday Not secure thumbIf you're still running a website that is using insecure HTTP then it's probably too late. Some of your website's visitors are going to be greeted with a message that tells them that they can't trust your website to be secure. ]]> 2018-07-23T18:42:00+00:00 https://www.grahamcluley.com/google-chrome-website-not-secure/ www.secnews.physaphae.fr/article.php?IdArticle=749917 False None None None Graham Cluley - Blog Security Robotics supplier\'s sloppy security leaks ten years\' worth of data from major car manufacturers Robotics supplier's sloppy security leaks data of major car manufacturersSecurity researchers have discovered 157 gigabytes of sensitive data from over 100 manufacturing companies left exposed online for anyone to access. ]]> 2018-07-23T13:23:02+00:00 https://www.grahamcluley.com/robotics-suppliers-sloppy-security-leaks-ten-years-worth-of-data-from-major-car-manufacturers/ www.secnews.physaphae.fr/article.php?IdArticle=749389 False None None None Graham Cluley - Blog Security Hackers automate the laundering of money via Clash of Clans Hackers automate the laundering of money via Clash of ClansPopular smartphone games such as “Clash of Clans” are being used to launder hundreds of thousands of dollars on behalf of credit card thieves. Read more in my article on the Tripwire State of Security blog. ]]> 2018-07-19T15:15:00+00:00 https://www.tripwire.com/state-of-security/featured/hackers-automate-the-laundering-of-money-via-clash-of-clans/#new_tab www.secnews.physaphae.fr/article.php?IdArticle=747626 False None None 5.0000000000000000 Graham Cluley - Blog Security Smashing Security #087: How Russia hacked the US election Smashing Security #087: How Russia hacked the US electionRegardless of whether Donald Trump believes Russia hacked the Democrats in the run-up to the US Presidential election or not, we explain how they did it. And Carole explores some of the creepier things being done in the name of surveillance. All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault. ]]> 2018-07-19T09:10:04+00:00 https://www.grahamcluley.com/smashing-security-087-how-russia-hacked-the-us-election/ www.secnews.physaphae.fr/article.php?IdArticle=747628 False None None None Graham Cluley - Blog Security £200,000 fine for exposing possible child abuse victims in classic Cc/Bcc email blunder £200,000 fine for exposing possible child abuse victims in classic Cc/Bcc email blunderThe Independent Inquiry into Child Sexual Abuse (IICSA) has been fined £200,000 for revealing identities of abuse victims in a mass email. ]]> 2018-07-18T12:56:03+00:00 https://www.grahamcluley.com/200000-fine-for-exposing-possible-child-abuse-victims-in-classic-cc-bcc-email-blunder/ www.secnews.physaphae.fr/article.php?IdArticle=747629 False None None None Graham Cluley - Blog Security Elon Musk retracts vile Twitter accusation against cave rescuer Elon Musk retracts vile Twitter accusation against cave rescuerTesla chief Elon Musk retracts his unfounded allegations against man who helped boys escape from a Thai cave, but scammers are given another opportunity to strike. ]]> 2018-07-18T11:49:03+00:00 https://www.grahamcluley.com/elon-musk-retracts-vile-twitter-accusation-against-cave-rescuer/ www.secnews.physaphae.fr/article.php?IdArticle=747630 False None Tesla None Graham Cluley - Blog Security Business email compromise scams have netted $12.5 billion, says FBI Business email compromise scams have netted $12.5 billion, says FBIThe FBI is warning businesses of the serious dangers posed by business email compromise (BEC) scams, saying that losses globally have risen by 136% since December 2016. Read more in my article on the Bitdefender Business Insights blog. ]]> 2018-07-18T08:25:02+00:00 https://businessinsights.bitdefender.com/business-email-compromise-scams-netted-12.5-billion-fbi#new_tab www.secnews.physaphae.fr/article.php?IdArticle=747631 False None None None Graham Cluley - Blog Security 21-year-old woman charged with hacking Selena Gomez 21-year-old woman charged with hacking Selena GomezPopstar Selena Gomez's alleged hacker has been charged. Are your secret password reset questions easy to answer with public information? ]]> 2018-07-16T23:30:02+00:00 https://www.grahamcluley.com/21-year-old-woman-charged-with-hacking-selena-gomez/ www.secnews.physaphae.fr/article.php?IdArticle=747632 False None None None Graham Cluley - Blog Security IoT search engine exposes passwords of over 30,000 vulnerable DVRs IoT search engine exposes passwords of over 30,000 vulnerable DVRsA researcher has discovered that it's easier than ever before to hack at least one brand of internet-enabled DVR, as an IoT search engine has cached their passwords within search results. Read more in my article on the Bitdefender BOX blog. ]]> 2018-07-16T15:54:01+00:00 https://www.bitdefender.com/box/blog/smart-home/iot-search-engine-exposes-passwords-30000-vulnerable-dvrs/#new_tab www.secnews.physaphae.fr/article.php?IdArticle=747633 False Hack None None Graham Cluley - Blog Security Timehop data breach is worse than they initially said Timehop data breach is worse than they initially said'Time capsule' app Timehop has revealed that it made a boo-boo when it initially shared details over the weekend of a data breach involving millions of users' names, email addresses, and phone numbers. ]]> 2018-07-12T15:06:04+00:00 https://www.grahamcluley.com/timehop-data-breach-is-worse-than-they-initially-said/ www.secnews.physaphae.fr/article.php?IdArticle=742087 False Data Breach None None Graham Cluley - Blog Security Average cost of a data breach exceeds $3.8 million, claims report Average cost of a data breach exceeds $3.8 million, claims reportData breaches are getting more expensive. That's one of the findings of a new global study by the Ponemon Institute that examines the financial impact of a corporate data breach. Read more in my article on the Tripwire State of Security blog. ]]> 2018-07-12T14:46:03+00:00 https://www.tripwire.com/state-of-security/featured/average-cost-data-breach-exceeds-3-8-million-claims-report/#new_tab www.secnews.physaphae.fr/article.php?IdArticle=741953 False Data Breach None None Graham Cluley - Blog Security Smashing Security #086: Elon Musk submarine scams and 2FA bypass Smashing Security #086: Elon Musk submarine scams and 2FA bypassCrypto scamming Thai cave scoundrels! $25 million to make anti-fake news videos! TimeHop data breach! Phone number port out scams! All this and much much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by B J Mendelson. ]]> 2018-07-12T12:09:03+00:00 https://www.grahamcluley.com/smashing-security-086-elon-musk-submarine-scams-and-2fa-bypass/ www.secnews.physaphae.fr/article.php?IdArticle=741756 False None None None Graham Cluley - Blog Security Facebook doesn\'t want to eradicate fake news. If it did they\'d kick out InfoWars Facebook doesn't care about fake news. If it did they'd kick out InfoWarsFacebook would like you to believe that it's serious about ridding its platform of fake news. So how come InfoWars, one of the most notorious outlets of sick conspiracy theories, is allowed to maintain a page on the social network? ]]> 2018-07-12T11:28:00+00:00 https://www.grahamcluley.com/facebook-doesnt-want-to-eradicate-fake-news-if-it-did-theyd-kick-out-infowars/ www.secnews.physaphae.fr/article.php?IdArticle=741661 False None None None Graham Cluley - Blog Security Facebook fined a paltry £500,000 (8 minutes\' revenue) over Cambridge Analytica scandal Facebook fined a paltry £500,000 (8 minutes' revenue) over Cambridge Analytica scandalFacebook will be fined £500,000 - the maximum amount possible - for two breaches of the UK's Data Protection Act 1998 in connection with the Cambridge Analytica scandal. But under new European legislation, the fine could have been as high as £1.2 billion. ]]> 2018-07-11T13:28:05+00:00 https://www.grahamcluley.com/facebook-fined-a-paltry-500000-8-minutes-revenue-over-cambridge-analytica-scandal/ www.secnews.physaphae.fr/article.php?IdArticle=740275 False None None None Graham Cluley - Blog Security New iOS security feature can be defeated by a $39 adapter… sold by Apple New iOS security feature can be defeated by a $39 adapter… sold by AppleA one hour countdown timer can be reset simply by connecting the iPhone to an untrusted USB accessory - giving law enforcement plenty of opportunity to crack your passcode with specialist tools. ]]> 2018-07-10T14:04:03+00:00 https://hotforsecurity.bitdefender.com/blog/new-ios-security-feature-can-be-defeated-by-a-39-adapter-sold-by-apple-20090.html#new_tab www.secnews.physaphae.fr/article.php?IdArticle=738781 False None None 4.0000000000000000 Graham Cluley - Blog Security Crypto scammers on Twitter exploiting Thai Cave rescue Crypto scammers on Twitter exploiting Thai Cave rescueTime and time again, crypto scammers are creating accounts in the names of known Twitter users and using devious tricks to fool their followers into believing they are reading a genuine message from the likes of Elon Musk. ]]> 2018-07-10T11:20:05+00:00 https://www.grahamcluley.com/crypto-scammers-on-twitter-exploiting-thai-cave-rescue/ www.secnews.physaphae.fr/article.php?IdArticle=738506 False None None None Graham Cluley - Blog Security Poor security at Thomas Cook airlines leads to simple extraction of fliers\' personal data Poor security at Thomas Cook airlines leads to simple extraction of fliers' personal dataThousands of holidaymakers relying upon Thomas Cook Airlines to get them to their vacation may have had their personal information put at risk due to sloppy security. ]]> 2018-07-09T15:26:00+00:00 https://www.grahamcluley.com/thomas-cook-airlines-poor-security-breach/ www.secnews.physaphae.fr/article.php?IdArticle=737410 False Guideline None None Graham Cluley - Blog Security Looking for another great cyber podcast? CyberTangent is your new home with expert guests every episode Looking for another great cyber podcast? CyberTangent is your new home with expert guests every episodeGraham Cluley Security News is sponsored this week by the folks at Nehemiah Security. Thanks to the great team there for their support! Nehemiah Security's “CyberTangent” is a podcast focused on topics like Security Risk Management, Cyber Risk Analytics, Malware Hunting, and more. This specific episode of “CyberTangent” features our favorite guest, Graham Cluley himself! In this episode, we get to know Graham a little better, starting with how he got into the cybersecurity space and ending with his “love language.” Start listening now to “CyberTangent”!
If you're interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here. ]]>
2018-07-08T21:22:00+00:00 https://www.grahamcluley.com/looking-for-another-great-cyber-podcast-cybertangent-is-your-new-home-with-expert-guests-every-episode/ www.secnews.physaphae.fr/article.php?IdArticle=736297 False Malware None None
Graham Cluley - Blog Security The Pirate Bay is cryptomining for Monero with your CPU again The Pirate Bay is cryptomining with your CPU againThe Pirate Bay is in hot water again after being discovered running a cryptocurrency miner on its website. Make sure you always read the <small> print. ]]> 2018-07-06T14:42:01+00:00 https://www.grahamcluley.com/pirate-bay-cryptomining-monero/ www.secnews.physaphae.fr/article.php?IdArticle=733087 False None None None Graham Cluley - Blog Security Disgruntled programmer accused of trying to sell his firm\'s iPhone spyware for $50 million Nso spywareYour company doesn't have to work in the field of high-tech surveillance and spyware to find itself at risk from insiders. Read more in my article on the Tripwire State of Security blog. ]]> 2018-07-06T13:03:00+00:00 https://www.tripwire.com/state-of-security/featured/disgruntled-programmer-accused-of-trying-to-sell-his-firms-iphone-spyware-for-50-million/#new_tab www.secnews.physaphae.fr/article.php?IdArticle=732868 False None None None Graham Cluley - Blog Security Smashing Security #085: Doctor Who, Facebook patents, and Bob\'s Burgers Smashing Security #085: Doctor Who, Facebook patents, and Bob's BurgersDoctor Who's TARDIS has sprung a data leak, Facebook's creepy patents are unmasked, and an app to keep women safe on dates has surprising origins. All this and much much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Maria Varmazis. ]]> 2018-07-04T23:03:00+00:00 https://www.grahamcluley.com/smashing-security-085-doctor-who-facebook-patents-and-bobs-burgers/ www.secnews.physaphae.fr/article.php?IdArticle=731305 False None None None Graham Cluley - Blog Security Carole Cadwalladr takes us behind the scenes of the Cambridge Analytica investigation Carole Cadwalladr takes us behind the scenes of Cambridge AnalyticaCarole Cadwalladr, the investigative journalist who revealed how the personal data of millions of Facebook users was used to influence the US election, speaks about what went on behind the headlines. ]]> 2018-07-04T17:08:01+00:00 https://www.grahamcluley.com/carole-cadwalladr-takes-us-behind-the-scenes-of-the-cambridge-analytica-investigation/ www.secnews.physaphae.fr/article.php?IdArticle=731306 False None None None