www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-04T06:13:58+00:00 www.secnews.physaphae.fr Graham Cluley - Blog Security Smashing Security #020: Phishing for Donald Trump Smashing Security #020: Phishing Donald TrumpGizmodo's attempt to reveal Donald Trump's administration ineptitude when it comes to cybersecurity fails to impress. Mac users are warned that the HandBrake DVD-ripping app has been compromised by malware. And will the US Army insist IT security professionals spend months ironing their bedsheets..? Computer security veterans Graham Cluley and Carole Theriault are joined on the podcast this week by special guest Paul Ducklin. ]]> 2017-05-11T00:23:47+00:00 https://www.grahamcluley.com/smashing-security-020-phishing-donald-trump/ www.secnews.physaphae.fr/article.php?IdArticle=364028 False None None None Graham Cluley - Blog Security How to clear the cache, cookies, and browsing data in Chrome How to clear the cache, cookies, and browsing data in ChromeDavid Bisson explains how Firefox users can clear their caches, browsing history, and cookies for better privacy. ]]> 2017-05-10T23:57:15+00:00 https://www.grahamcluley.com/how-to-clear-the-cache-cookies-and-browsing-data-in-chrome/ www.secnews.physaphae.fr/article.php?IdArticle=364029 True None None None Graham Cluley - Blog Security Gizmodo security test proves everyone (even Donald Trump\'s team) can get phished Gizmodo security test proves everyone (even Donald Trump's team) can get phishedGizmodo's controversial "security preparedness test" that targeted members of the Trump administration illustrates how everyone and anyone can fall for a phish. David Bisson reports. ]]> 2017-05-10T13:36:02+00:00 https://www.grahamcluley.com/gizmodo-security-test-proves-everyone-even-trump-team-can-get-phished/ www.secnews.physaphae.fr/article.php?IdArticle=364030 False None None None Graham Cluley - Blog Security Game of Thrones actress reveals cast forced to embrace two-step verification, and so should you Game of Thrones actress reveals cast forced to embrace two-step verification, and so should youTwo-step verification makes it much harder for hackers to break their way into email accounts. ]]> 2017-05-09T14:24:25+00:00 https://www.grahamcluley.com/game-of-thrones-two-step-verification/ www.secnews.physaphae.fr/article.php?IdArticle=363699 False None None None Graham Cluley - Blog Security Elementary vulnerability exposed sensitive medical records on healthcare data website Elementary vulnerability exposed sensitive medical records on healthcare data websiteA vulnerability allowed users of a healthcare data portal to access other users' medical records and thereby view their sensitive information. David Bisson reports. ]]> 2017-05-09T13:15:16+00:00 https://www.grahamcluley.com/vulnerability-exposed-sensitive-medical-records-on-healthcare-data-website/ www.secnews.physaphae.fr/article.php?IdArticle=363700 False None None None Graham Cluley - Blog Security Emergency patch released for critical security hole in Microsoft\'s malware scanner Emergency patch released for critical security hole in Microsoft's malware scannerYou know a security hole is serious if Microsoft issues a patch for it just hours before the company is scheduled to release its regular bundle of Patch Tuesday updates. Read more in my article on the Hot for Security blog. ]]> 2017-05-09T09:41:31+00:00 https://hotforsecurity.bitdefender.com/blog/emergency-patch-released-for-critical-security-hole-in-microsofts-malware-scanner-18013.html#new_tab www.secnews.physaphae.fr/article.php?IdArticle=363450 False None None None Graham Cluley - Blog Security FCC blames DDoS, not net neutrality comedy sketch, for website downtime FCC blames DDoS, not net neutrality comedy sketch, for website downtimeNet neutrality. The only two words that promise more boredom in the English language are... 'Featuring Sting' ]]> 2017-05-08T21:39:13+00:00 https://www.grahamcluley.com/fcc-blames-ddos-not-net-neutrality-comedy-sketch-website-downtime/ www.secnews.physaphae.fr/article.php?IdArticle=363156 False None None None Graham Cluley - Blog Security Online daters at Guardian Soulmates targeted with sexually explicit spam after data left exposed Online daters at Guardian Soulmates targeted with sexually explicit spam after data left exposedIt's the perfect place for the left-leaning urban intellectual to meet the quinoa quiche-eating, open-toed sandal-wearing partner of their dreams. But now Guardian Soulmates has suffered a security breach. ]]> 2017-05-08T20:47:53+00:00 https://www.grahamcluley.com/guardian-soulmates-data-breach/ www.secnews.physaphae.fr/article.php?IdArticle=363157 False None None None Graham Cluley - Blog Security A \'great security tool\' that encrypts files? Think again! It\'s ransomware A 'great security tool' that encrypts files? Think again! It's ransomwareThe authors of FrozrLock, a new ransomware-as-a-service (RaaS), are marketing their platform on the dark web as a "great security tool." David Bisson reports. ]]> 2017-05-08T19:22:34+00:00 https://www.grahamcluley.com/frozrlock-ransomware/ www.secnews.physaphae.fr/article.php?IdArticle=363158 False None None None Graham Cluley - Blog Security Debenhams warns flower-buying customers after website hacked for over six weeks Debenhams warns flower-buying customers after website hackedBritish high street retailer Debenhams has warned that its flower delivery website has been hacked, potentially exposing the passwords and payment card details of 26,000 customers. ]]> 2017-05-05T21:55:59+00:00 https://www.grahamcluley.com/debenhams-warns-flower-buying-customers-website-hacked-six-weeks/ www.secnews.physaphae.fr/article.php?IdArticle=362723 False None None None Graham Cluley - Blog Security No stalking spyware vendor, HackerOne won\'t run your bug bounty program No stalking spyware vendor, HackerOne won't run your bug bounty programHackerOne has refused to host a bug bounty program for spyware seller FlexiSPY on the grounds that the organization is operating illegally and unethically. David Bisson reports. ]]> 2017-05-05T21:22:21+00:00 https://www.grahamcluley.com/no-stalking-spyware-vendor-hackerone-wont-run-bug-bounty-program/ www.secnews.physaphae.fr/article.php?IdArticle=362724 False None None None Graham Cluley - Blog Security Bank robbers exploited SS7 weaknesses to drain 2SV-protected accounts Bank robbers exploited SS7 weaknesses to drain 2SV-protected accountsA group of thieves exploited weaknesses in Signaling System 7 (SS7) to drain users' bank accounts, including those protected by two-step verification (2SV). David Bisson reports. ]]> 2017-05-05T00:19:27+00:00 https://www.grahamcluley.com/bank-robbers-exploited-ss7-weaknesses-drain-2sv-protected-accounts/ www.secnews.physaphae.fr/article.php?IdArticle=362160 False None None None Graham Cluley - Blog Security \'Google Docs\' worm ransacks Gmail users\' contact lists – what you need to know 'Google Docs' worm ransacks Gmail users' contact lists – what you need to knowYou may well be one of the millions of internet users who received a dangerous email offering to share a Google Docs file with you. Read more in my article on the Tripwire State of Security blog. ]]> 2017-05-04T10:15:07+00:00 https://www.tripwire.com/state-of-security/security-data-protection/google-docs-worm-ransacks-gmail-users-need-know/#new_tab www.secnews.physaphae.fr/article.php?IdArticle=361952 False None None None Graham Cluley - Blog Security Smashing Security #019: The Love Bug virus Ss episode 19 thumbOn May 4th 2000, the Love Bug virus (also known as ILOVEYOU or LoveLetter) rapidly spread around the world, clogging up email systems. Computer security veterans Graham Cluley and Carole Theriault are joined on the podcast this week by special guest John Hawes for a trip down memory lane. ]]> 2017-05-03T23:05:49+00:00 https://www.grahamcluley.com/smashing-security-019-love-bug-virus/ www.secnews.physaphae.fr/article.php?IdArticle=361664 False None None None Graham Cluley - Blog Security Travel tech company Sabre confirms breach affected reservations system Travel tech company confirms breach affected reservations systemSabre, a global travel technology company, has confirmed a breach has affected at least some of the many bookings that passed through its reservations system. David Bisson reports. ]]> 2017-05-03T22:47:14+00:00 https://www.grahamcluley.com/travel-tech-company-sabre-confirms-breach-affected-reservations-system/ www.secnews.physaphae.fr/article.php?IdArticle=361665 False None None None Graham Cluley - Blog Security Critical Android security patches released - but will your phone ever see them? Critical Android security patches released - but will your phone ever see them?The most critical of the patched vulnerabilities address security flaws in Android's troubled Mediaserver component, that could be exploited by a malicious hacker to execute code remotely on targeted devices. Read more in my article on the Hot for Security blog. ]]> 2017-05-03T12:49:55+00:00 https://hotforsecurity.bitdefender.com/blog/critical-android-security-patche%20s-released-but-will-your-phone-ever-see-them-17979.html#new_tab www.secnews.physaphae.fr/article.php?IdArticle=361489 False None None None Graham Cluley - Blog Security Intel patches remote hijack bug that hid in chips for seven years Intel patches remote hijack bug that hid in chips for seven yearsIntel has patched a privileged escalation bug in its chips' remote management feature that could be exploited by an attacker to breach networks. David Bisson reports. ]]> 2017-05-03T08:09:00+00:00 https://www.grahamcluley.com/intel-patches-remote-hijack-bug-hid-chips-seven-years/ www.secnews.physaphae.fr/article.php?IdArticle=361317 False None None None Graham Cluley - Blog Security Email hackers cost couple their new home Email hackers cost couple their new homeA group of email hackers set off a chain of events that cost a couple the contract on their new home. David Bisson reports. ]]> 2017-05-02T14:46:19+00:00 https://www.grahamcluley.com/email-hackers-cost-couple-new-home/ www.secnews.physaphae.fr/article.php?IdArticle=361194 False None None None Graham Cluley - Blog Security IBM has been shipping malware-infected USB sticks IBM has been shipping malware-infected USB sticksWe tend to trust companies like IBM to take greater care over what they ship to their customers and assume it to be uncompromised and squeaky-clean. Clearly that trust is sometimes misplaced. ]]> 2017-05-02T12:56:37+00:00 https://www.grahamcluley.com/ibm-shipping-malware-infected-usb-sticks/ www.secnews.physaphae.fr/article.php?IdArticle=361012 False None None None Graham Cluley - Blog Security Ciphr blames rival company for partial data dump of its users Ciphr blames rival company for partial data dump of its usersCiphr, a company which offers encryption services for smartphone users, claims that a rival firm are behind a data dump of its customers' email addresses and IMEI numbers. David Bisson reports. ]]> 2017-05-02T11:18:46+00:00 https://www.grahamcluley.com/ciphr-blames-rival-company-partial-data-dump-users/ www.secnews.physaphae.fr/article.php?IdArticle=361013 False None None None Graham Cluley - Blog Security The phishing swindle that conned $100 million out of Google and Facebook The phishing swindle that conned $100 million out of Google and FacebookA 48-year-old man allegedly managed to trick Facebook and Google into wiring him over $100 million, after impersonating a genuine Taiwanese electronics manufacturer. Read more in my article on the Hot for Security blog. ]]> 2017-05-02T08:50:00+00:00 https://hotforsecurity.bitdefender.com/blog/the-phishing-swindle-that-conned-100-million-out-of-google-and-facebook-17957.html#new_tab www.secnews.physaphae.fr/article.php?IdArticle=360826 False None None None Graham Cluley - Blog Security Sonia disowns Rahul video virus? It\'s a hoax Sonia disowns Rahul video virus? It's a hoaxEarlier today my wife received a message warning of a virus that supposedly "formats your mobile" by accepting a video called "Sonia disowns Rahul". It's amazing what some people believe... ]]> 2017-04-28T13:02:13+00:00 https://www.grahamcluley.com/sonia-disowns-rahul-video-virus-hoax/ www.secnews.physaphae.fr/article.php?IdArticle=360201 False None None None Graham Cluley - Blog Security Amazon Echo Look: Super or Scary? Echo look thumbMy reaction when I heard that Amazon had added a camera to the next generation of its Alexa-powered Echo device was a mixture of revulsion and head-shaking inevitability. But what do you think? Take our poll and share your thoughts. ]]> 2017-04-28T11:41:34+00:00 https://www.grahamcluley.com/amazon-echo-look-super-scary/ www.secnews.physaphae.fr/article.php?IdArticle=360202 False None None None Graham Cluley - Blog Security ISP brought down by warring malware families ISP brought down by warring malware familiesA battle between two rival families of malware is being blamed for the downtime that a Californian ISP suffered earlier this month. Read more in my article on the Tripwire State of Security blog. ]]> 2017-04-27T13:32:46+00:00 https://www.tripwire.com/state-of-security/featured/isp-brought-warring-malware-families/#new_tab www.secnews.physaphae.fr/article.php?IdArticle=359972 True None None None Graham Cluley - Blog Security Nomx? No thank you Nomx? No thank youNomx describes itself as "the only secure email communications device compatible with legacy email systems." But security researcher Scott Helme is less than impressed. ]]> 2017-04-27T09:05:01+00:00 https://www.grahamcluley.com/nomx-no-thank/ www.secnews.physaphae.fr/article.php?IdArticle=359717 False None None None Graham Cluley - Blog Security Smashing Security #018: Windows is a virus. True or False? Smashing Security #018: Windows is a virus. True or False?Security firm Webroot drops a clanger when it declared Windows was malicious and borked customers' PCs, millennials are streaming a lot of movies illegally, and blackmailers are targeting members of the Ashley Madison cheating site again. All this and more is discussed in the latest edition of the "Smashing Security" podcast. ]]> 2017-04-27T08:14:43+00:00 https://www.grahamcluley.com/smashing-security-018-windows-is-a-virus-true-or-false/ www.secnews.physaphae.fr/article.php?IdArticle=359719 False None None None Graham Cluley - Blog Security Almost two million Androids infected by FalseGuide malware, masquerading as game guides Almost two million Androids infected by FalseGuide malware, masquerading as game guidesA malware family known as FalseGuide masqueraded as game guides on Google Play to infect nearly two million Android devices. David Bisson reports. ]]> 2017-04-26T21:44:02+00:00 https://www.grahamcluley.com/falseguide-malware-masqueraded-as-game-guides-to-infect-2m-android-devices/ www.secnews.physaphae.fr/article.php?IdArticle=359591 False None None None Graham Cluley - Blog Security Stealth Bomber maker admits hackers stole workers\' W-2 tax forms Stealth Bomber maker admits hackers stole workers' W-2 tax formsUS military contractor Northrop Grumman has admitted that hackers managed to infiltrate its systems, and gained access to sensitive employee records. Read more in my article on the Hot for Security blog. ]]> 2017-04-26T17:53:21+00:00 https://hotforsecurity.bitdefender.com/blog/stealth-bomber-maker-admits-hackers-stole-workers-w-2-tax-forms-17952.html#new_tab www.secnews.physaphae.fr/article.php?IdArticle=359592 False None None None Graham Cluley - Blog Security Flawed Hyundai app could have helped hackers break into cars Flawed Hyundai app could have helped hackers break into carsHyundai tells customers to update their Blue Link smartphone app to protect against hackers targeting their cars. David Bisson reports. ]]> 2017-04-26T13:59:42+00:00 https://www.grahamcluley.com/flawed-hyundai-app-could-have-helped-hackers-break-into-cars/ www.secnews.physaphae.fr/article.php?IdArticle=359593 False None None None Graham Cluley - Blog Security Webroot causes massive headaches after falsely flagging Windows files as malicious Webroot causes massive headaches after falsely flagging Windows files as maliciousIt's 2017, and anti-virus products still goof up like this... David Bisson reports. ]]> 2017-04-25T14:49:37+00:00 https://www.grahamcluley.com/webroot-causes-massive-headaches-after-falsely-flagging-windows-files-as-malicious/ www.secnews.physaphae.fr/article.php?IdArticle=359132 False None None None Graham Cluley - Blog Security Ashley Madison blackmailers threaten to create Cheater\'s Gallery exposing members who don\'t pay up Ashley Madison blackmailers threaten to create Cheater's Gallery exposing members who don't pay upBlackmailers are once again trying to make money out of the notorious Ashley Madison hack. Read more in my article on the Hot for Security blog. ]]> 2017-04-25T13:22:02+00:00 https://hotforsecurity.bitdefender.com/blog/ashley-madison-blackmailers-threaten-to-create-cheaters-gallery-exposing-members-who-dont-pay-up-17942.html#new_tab www.secnews.physaphae.fr/article.php?IdArticle=359133 False None None None Graham Cluley - Blog Security Strong customer authentication and risk analysis under PSD2: how to comply? Download VASCO\'s white paper Strong customer authentication and risk analysis under PSD2: how to comply? Download VASCO's white paperGraham Cluley Security News is sponsored this week by the folks at VASCO. Thanks to the great team there for their support! More than 10,000 customers in 100 countries rely on VASCO to secure access, manage identities, verify transactions, simplify document signing and protect high value assets and systems. On Thursday February 23rd, the European Banking Authority (EBA) published its long-awaited final draft Regulatory Technical Standards (RTS) on Strong Customer Authentication (SCA) and Common and Secure Communication (CSC) under the revised Payment Services Directive (PSD2). In this VASCO white paper on Strong Customer Authentication and Risk Analysis under PSD2 you will discover: Background information about the history of the final draft RTS Common authentication solutions that are used by many online banking and mobile banking applications today The most important requirements from the final draft RTS Which authentication solutions are most likely to meet the requirements of the final draft RTS Interested in learning more? Download VASCO's white paper: Strong customer authentication and risk analysis under PSD2: how to comply?
If you're interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here. ]]>
2017-04-25T13:05:11+00:00 https://www.grahamcluley.com/vasco-feed-sponsor-13/ www.secnews.physaphae.fr/article.php?IdArticle=359134 True None None None
Graham Cluley - Blog Security Got one of these 20+ models of Linksys Smart Wi-Fi routers? Bad news. 10 security holesdiscovered Got one of these Linksys Smart Wi-Fi routers? Bad news. 10 security vulnerabilities discoveredLinksys is working on a firmware update for 10 security vulnerabilities affecting its "Smart" Wi-Fi series of routers. David Bisson reports. ]]> 2017-04-24T19:55:25+00:00 https://www.grahamcluley.com/got-one-20-linksys-smart-wi-fi-routers-bad-news-10-security-vulnerabilities-discovered/ www.secnews.physaphae.fr/article.php?IdArticle=359135 False None None None Graham Cluley - Blog Security Businesses falling short when it comes to cybersecurity, says Government report Businesses falling short when it comes to cybersecurity, says Government reportA "sizable proportion" of businesses have still not put in place basic protection and policies to protect themselves from attack. Is that true of your company? Read more in my article on the Bitdefender Business Insights blog. ]]> 2017-04-24T15:36:18+00:00 https://businessinsights.bitdefender.com/uk-businesses-cybersecurity-government-report#new_tab www.secnews.physaphae.fr/article.php?IdArticle=359136 False None None None Graham Cluley - Blog Security How to clear the cache, cookies, and browsing history in Firefox How to clear the cache, cookies, and browsing history in FirefoxDavid Bisson explains how Firefox users can clear their caches, browsing history, and cookies for better privacy. ]]> 2017-04-24T13:40:46+00:00 https://www.grahamcluley.com/clear-cache-cookies-browsing-history-firefox/ www.secnews.physaphae.fr/article.php?IdArticle=359137 False None None None Graham Cluley - Blog Security MilkyDoor malware turns Androids into backdoors to attack enterprise networks MilkyDoor malware turns Androids into backdoors to attack enterprise networksA new Android malware family is able to blend in with normal network traffic and avoid detection by encrypting its payloads, in order to access internal networks. David Bisson reports. ]]> 2017-04-22T10:26:03+00:00 https://www.grahamcluley.com/milkydoor-malware-turns-androids-backdoors-attack-enterprise-networks/ www.secnews.physaphae.fr/article.php?IdArticle=359139 False None None None Graham Cluley - Blog Security Want to watch HSBC\'s security awareness videos? You\'d best have Flash installed... Hsbc flash thumbIf you don't give your customers a different way to consume your content, they're going to feel forced to (shudder...) install Adobe Flash. ]]> 2017-04-21T14:58:17+00:00 https://www.grahamcluley.com/want-watch-hsbcs-security-videos-youd-best-flash-installed/ www.secnews.physaphae.fr/article.php?IdArticle=359140 False None None None Graham Cluley - Blog Security Donald Trump\'s review of America\'s cybersecurity misses its deadline Donald Trump's review of America's cybersecurity misses its deadlineA planned review of America's cybersecurity efforts has failed to materialise. Good job there's no hacking going on, eh? ]]> 2017-04-21T14:26:42+00:00 https://www.grahamcluley.com/donald-trumps-review-americas-cybersecurity-misses-deadline/ www.secnews.physaphae.fr/article.php?IdArticle=359141 False None None None Graham Cluley - Blog Security Fake Android system update *really* wants to know your location Fake Android system update *really* wants to know your locationAndroid spyware masqueraded as a fake system update on the Google Play store in an attempt to log unsuspecting users' location data. David Bisson reports. ]]> 2017-04-20T14:00:19+00:00 https://www.grahamcluley.com/fake-android-system-update-really-wants-to-know-your-location/ www.secnews.physaphae.fr/article.php?IdArticle=359142 False None None None Graham Cluley - Blog Security Smashing Security #017: Data breaches, zero day exploits, and toenail clippings Smashing Security #017: Data breaches, zero day exploits, and toenail clippingsHotel malware has been stealing guests' payment card details... again, should businesses relay delay rolling out vulnerability patches, and Burger King's Whopper TV ad campaign tries to take advantage of viewers' Google Home devices with predictable results. All this and more is discussed in the latest edition of the "Smashing Security" podcast. ]]> 2017-04-20T09:53:36+00:00 https://www.grahamcluley.com/smashing-security-017-data-breaches-zero-day-exploits-and-toenail-clippings/ www.secnews.physaphae.fr/article.php?IdArticle=359144 False None None None Graham Cluley - Blog Security The Hajime IoT worm fights the Mirai botnet for control of your devices The Hajime IoT worm fights the Mirai botnet for control of your devicesThe Hajime malware is worming its way through DVRs, CCTV systems, and other poorly-protected Internet of Things (IoT) devices. David Bisson reports. ]]> 2017-04-19T15:10:46+00:00 https://www.grahamcluley.com/hajime-iot-worm-fights-mirai-botnet-control-devices/ www.secnews.physaphae.fr/article.php?IdArticle=359145 False None None None Graham Cluley - Blog Security Been to one of these 1170 hotels? Your credit card details may have been stolen by malware Hotel thumbWhen a company starts a statement to customers with words describing how it "understands the important of protecting payment card data" you know that you're about to hear some bad news... Read more in my article on the Hot for Security blog. ]]> 2017-04-19T11:20:04+00:00 https://hotforsecurity.bitdefender.com/blog/been-to-one-of-these-1170-ihg-hotels-your-credit-card-details-may-have-been-stolen-by-malware-17910.html#new_tab www.secnews.physaphae.fr/article.php?IdArticle=359146 False None None None Graham Cluley - Blog Security Foodie social network Allrecipes warns that someone stole users\' email addresses and passwords Allrecipes thumbAllrecipes, the self-described "food-focused social network", has sent an email out to some of its users warning that their email addresses and passwords may have been intercepted by an unknown third-party. Yuck! ]]> 2017-04-19T09:11:29+00:00 https://www.grahamcluley.com/foodie-social-network-allrecipes-warns-someone-stole-users-email-addresses-passwords/ www.secnews.physaphae.fr/article.php?IdArticle=359147 False None None None Graham Cluley - Blog Security Beware bogus emails from LinkedIn asking for your CV! Beware bogus emails from LinkedIn asking for your CV!LinkedIn users are being warned to be on their guard following a rise in reports of attacks being distributed via email designed to trick job seekers into sharing their personal details. Read more in my article on the Hot for Security blog. ]]> 2017-04-18T16:26:52+00:00 https://hotforsecurity.bitdefender.com/blog/beware-bogus-emails-from-linkedin-asking-for-your-cv-17906.html#new_tab www.secnews.physaphae.fr/article.php?IdArticle=359149 False None None None Graham Cluley - Blog Security Tracking pixels can conduct surveillance for targeted attacks Tracking pixels can conduct surveillance for mass operations, targeted attacksMalicious hackers can use tracking pixels to help them gather intelligence for attack campaigns, both mass and targeted in scope say researchers. David Bisson reports. ]]> 2017-04-18T15:31:28+00:00 https://www.grahamcluley.com/tracking-pixels-can-conduct-surveillance-targeted-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=359150 False None None None Graham Cluley - Blog Security A computer security tip for those campaigning in the UK general election A computer security tip for those campaigning in the UK general electionThere are lessons that British politicians can learn from the security snafus of the US presidential election. ]]> 2017-04-18T11:56:05+00:00 https://www.grahamcluley.com/computer-security-tip-campaigning-uk-general-election/ www.secnews.physaphae.fr/article.php?IdArticle=359151 False None None None Graham Cluley - Blog Security Triada Android spyware evades anti-virus detection by using DroidPlugin sandbox Android spyware evades anti-virus detection by using DroidPlugin sandboxThe Triada family of Android spyware is using the DroidPlugin open-source sandbox to evade detection by anti-virus software installed on infected devices. David Bisson reports. ]]> 2017-04-06T16:24:36+00:00 https://www.grahamcluley.com/triada-android-spyware-evades-anti-virus-detection-using-droidplugin-sandbox/ www.secnews.physaphae.fr/article.php?IdArticle=355173 False None None None Graham Cluley - Blog Security Smashing Security #015: Bad vibrations Smashing Security #015: Bad vibrationsDon't let an internet-enabled sex toy make your most private moments oh-so-public. Samsung's wannabe-Android-killer is found lacking. And did you hear about the firm that is micro-chipping its employees? All this and more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by special guest John Hawes. ]]> 2017-04-06T01:02:40+00:00 https://www.grahamcluley.com/smashing-security-015-bad-vibrations/ www.secnews.physaphae.fr/article.php?IdArticle=353738 False None None None Graham Cluley - Blog Security Leave a bad review? This IoT garage door opener maker may brick your device Garage door thumbThe maker of an Internet of Things (IoT) garage door opener bricked a customer's device after they posted a negative review on the product's forum board. David Bisson reports. ]]> 2017-04-06T00:11:46+00:00 https://www.grahamcluley.com/leave-bad-review-iot-garage-door-opener-maker-may-brick-device/ www.secnews.physaphae.fr/article.php?IdArticle=353739 False None None None Graham Cluley - Blog Security Smart sex toy\'s security flaws fulfil every hacker\'s fantasy Smart sex toy's security flaws fulfil every hacker's fantasyA connectable dildo suffers from numerous vulnerabilities that make it trivial for attackers to steal users'... well, "private" data. David Bisson reports. ]]> 2017-04-04T15:26:16+00:00 https://www.grahamcluley.com/smart-dildos-security-vulnerabilities-fulfill-every-hackers-fantasy/ www.secnews.physaphae.fr/article.php?IdArticle=352908 False None None None Graham Cluley - Blog Security The free Nintendo Switch emulator you stumbled upon? Sorry, it\'s a fake! The free Nintendo Switch emulator you stumbled upon? Sorry, it's a fake!If you want to play a game available for Nintendo Switch, you should just buy a Nintendo Switch. You shouldn't go online looking for free workarounds or substitutes. David Bisson reports. ]]> 2017-04-01T13:27:25+00:00 https://www.grahamcluley.com/stumbled-across-a-free-nintendo-switch-emulator-yeah-its-a-fake/ www.secnews.physaphae.fr/article.php?IdArticle=351056 False None None None Graham Cluley - Blog Security LastPass has a secret major vulnerability - and, as yet, there\'s no fix LastPass has a secret major vulnerability - and, as yet, there's no fixThe popular password management firm LastPass is working to fix major vulnerability in its software, responsibly disclosed to it by a security researcher. David Bisson reports. ]]> 2017-03-30T13:28:40+00:00 https://www.grahamcluley.com/lastpass-working-to-fix-major-vulnerability-responsibly-disclosed-by-security-researcher/ www.secnews.physaphae.fr/article.php?IdArticle=350092 False None LastPass None Graham Cluley - Blog Security Five scams that won\'t make you laugh on April Fool\'s Day Five scams that won't make you laugh on April Fool's DayIf there's one day of the year when everyone has their guard up, it's April Fool's Day. After all, who can put their hand up and say that they have never been duped by an April Fool's trick? Read more in my article on the Tripwire State of Security blog. ]]> 2017-03-30T11:09:30+00:00 https://www.tripwire.com/state-of-security/featured/five-scams-wont-make-laugh-april-fools-day/#new_tab www.secnews.physaphae.fr/article.php?IdArticle=349635 False None None None Graham Cluley - Blog Security Smashing Security #014: Protecting webmail Smashing Security #014: Protecting webmailWhat can you do to better protect your online email accounts? In this special edition of the "Smashing Security" podcast, regular hosts Graham Cluley and Carole Theriault, joined by special guest Paul Ducklin, share tips on how to better defend your Gmail/Yahoo/Hotmail/Outlook/etc account. ]]> 2017-03-30T09:24:51+00:00 https://www.grahamcluley.com/smashing-security-014-protecting-webmail/ www.secnews.physaphae.fr/article.php?IdArticle=349389 False None Yahoo None Graham Cluley - Blog Security Phishers target World of Warcraft users with fake in-game pet offer Phishers targeting World of Warcraft users with fake in-game pet offerPlay World of Warcraft and keen to get your paws on an in-game pet? Be careful not to fall for their phishing attack. David Bisson reports. ]]> 2017-03-29T13:15:51+00:00 https://www.grahamcluley.com/phishers-target-world-warcraft-users-fake-game-pet-offer/ www.secnews.physaphae.fr/article.php?IdArticle=349170 False None None None Graham Cluley - Blog Security Scareware scammers lock iOS Safari to extort ransom from users Scareware scammers lock iOS Safari to extort ransom from usersExtortionists have locked iPhone users' browsers with infinite pop-ups in an attempt to scare users into paying up. David Bisson reports. ]]> 2017-03-29T11:26:09+00:00 https://www.grahamcluley.com/scareware-scammers-lock-ios-safari-to-extort-ransom-from-users/ www.secnews.physaphae.fr/article.php?IdArticle=348840 False None None None Graham Cluley - Blog Security Users leak sensitive data via Microsoft document-sharing site Users leak sensitive data via Microsoft document-sharing siteIf you feel you must use a cloud-based service to store your confidential data, then please be careful to think before you click. Read more in my article on the Hot for Security blog. ]]> 2017-03-27T20:35:47+00:00 https://hotforsecurity.bitdefender.com/blog/users-leak-sensitive-data-via-microsoft-document-sharing-site-17850.html#new_tab www.secnews.physaphae.fr/article.php?IdArticle=347591 False None None None Graham Cluley - Blog Security GiftGhostBot - the malicious bot attempting to compromise gift cards across 1,000 websites Malicious bot attempting to compromise gift cards across 1,000 websitesA malicious bot called GiftGhostBot is seeking to compromise gift cards purchased and activated by consumers across nearly 1,000 websites. David Bisson reports. ]]> 2017-03-27T14:23:31+00:00 https://www.grahamcluley.com/giftghostbot-malicious-bot-attempting-compromise-gift-cards-across-1000-websites/ www.secnews.physaphae.fr/article.php?IdArticle=347592 False None None None Graham Cluley - Blog Security Why it\'s a good idea to clear your browser history and cookies Why it's a good idea to clear your browser history and cookiesDavid Bisson explains why you might want to consider deleting and clearing your browsing history and cookies every now and then. ]]> 2017-03-27T13:40:33+00:00 https://www.grahamcluley.com/good-idea-clear-browser-history-cookies/ www.secnews.physaphae.fr/article.php?IdArticle=347593 False None None None Graham Cluley - Blog Security Encryption is a good thing Encryption is a good thingI use the internet. You use the internet. Just about all of us use the internet. Including bad guys... ]]> 2017-03-27T11:09:27+00:00 https://www.grahamcluley.com/encryption-is-a-good-thing/ www.secnews.physaphae.fr/article.php?IdArticle=346690 False None None None Graham Cluley - Blog Security 87 fake Minecraft mods exposed Android users to scammy websites, aggressive ads 87 fake Minecraft mods exposed Android users to scammy websites, aggressive adsGoogle has removed 87 fake Minecraft mods from its Play Store that exposed Android users to scammy websites and aggressive ads. David Bisson reports. ]]> 2017-03-27T09:26:01+00:00 https://www.grahamcluley.com/minecraft-mods-android/ www.secnews.physaphae.fr/article.php?IdArticle=346429 False None None None Graham Cluley - Blog Security Apple: If hackers have our customers passwords, they didn\'t steal them from us Apple: If hackers have our customers passwords, they didn't steal them from usApple reassures worried customers that it has not suffered a security breach, as hackers threaten to remotely wipe users' devices. Read more in my article on the Hot for Security blog. ]]> 2017-03-23T15:03:56+00:00 https://hotforsecurity.bitdefender.com/blog/apple-if-hackers-have-our-customers-passwords-they-didnt-steal-them-from-us-17844.html#new_tab www.secnews.physaphae.fr/article.php?IdArticle=345267 False None None None Graham Cluley - Blog Security Android adware abusing plugin frameworks to promote potentially malicious apps Android adware abusing plugin frameworks to promote potentially malicious appsAndroid adware has embraced an innovative way to promote potentially malicious apps: abuse Android plugin frameworks. David Bisson reports. ]]> 2017-03-23T14:57:52+00:00 https://www.grahamcluley.com/android-adware-abusing-plugin-frameworks-promote-potentially-malicious-apps/ www.secnews.physaphae.fr/article.php?IdArticle=345268 False None None None Graham Cluley - Blog Security Smashing Security 013: Assaulted with a deadly tweet Smashing Security 013: Assault with a deadly tweetGraham is embarrassed by a Twitter security snafu. How an animated GIF could prove deadly. Social engineering threats against your workforce. And will you be able to do any work on your laptop next time you catch an airplane? Take a listen to the latest Smashing Security podcast, with Graham Cluley, Carole Theriault and special guest Alex Eckelberry. ]]> 2017-03-23T10:16:49+00:00 https://www.grahamcluley.com/smashing-security-013-assaulted-deadly-tweet/ www.secnews.physaphae.fr/article.php?IdArticle=344155 False None None None Graham Cluley - Blog Security Smut surfers infected with Ramnit trojan as malvertising campaign deploys pop-under ads Malvertising campaign uses pop-under ads to infect smut viewers with Ramnit trojanThis isn't the kind of thing you want to pop up when you're surfing a porn site. David Bisson reports. ]]> 2017-03-22T14:38:53+00:00 https://www.grahamcluley.com/smut-surfers-infected-ramnit-trojan-malvertising-campaign-deploys-pop-ads/ www.secnews.physaphae.fr/article.php?IdArticle=343908 False None None None Graham Cluley - Blog Security Victims\' real details helping hackers trick victims into installing banking malware Victims' real details helping hackers trick victims into installing banking malwareRemember to always be wary of opening unsolicited email attachments and clicking on unknown links. Clicking before you think could lead to your downfall. David Bisson reports. ]]> 2017-03-22T10:40:36+00:00 https://www.grahamcluley.com/victims-real-details-helping-hackers-trick-victims-installing-banking-malware/ www.secnews.physaphae.fr/article.php?IdArticle=343118 False Guideline None None Graham Cluley - Blog Security Hackers claim they will wipe iPhones and iCloud accounts unless Apple pays ransom Hackers claim they will wipe iPhones and iCloud accounts unless Apple pays ransomA group of hackers are allegedly threatening to remotely wipe millions of iPhones and iCloud accounts, unless Apple agrees to pay a ransom by April 7th. Read more in my article on the Hot for Security blog. ]]> 2017-03-21T13:56:42+00:00 https://hotforsecurity.bitdefender.com/blog/hackers-claim-they-will-wipe-iphones-and-icloud-accounts-unless-apple-pays-ransom-17829.html#new_tab www.secnews.physaphae.fr/article.php?IdArticle=341804 False None None None Graham Cluley - Blog Security Three\'s website exposes mobile phone customers\' details to strangers Three's website exposes mobile phone customers' details to strangersThree appears to have made a blunder, after customers logging into the British mobile phone company's website found themselves looking at other customers' accounts - including the names, addresses, call histories and data usage of complete strangers. ]]> 2017-03-21T13:07:46+00:00 https://www.grahamcluley.com/threes-website-exposes-mobile-phone-customers-details-strangers/ www.secnews.physaphae.fr/article.php?IdArticle=341805 False None None None Graham Cluley - Blog Security Laptops, tablets and other gadgets banned from cabin on some US-bound flights Laptops, tablets and other gadgets banned from cabin on some US-bound flightsThinking of bringing your laptops, tablet, camera, or DVD players into the airplane cabin? ]]> 2017-03-21T10:47:34+00:00 https://www.grahamcluley.com/laptops-tablets-gadgets-banned-cabin-us-bound-flights/ www.secnews.physaphae.fr/article.php?IdArticle=341806 False None None None Graham Cluley - Blog Security Malicious hackers discovered way to deliver malware through unloved Ask Toolbar Malicious hackers discovered way to deliver malware through unloved Ask ToolbarFor years people have been opening their browser and asking, "how the heck did that Ask Toolbar get installed?" Enough is enough. Remove it. ]]> 2017-03-21T10:07:40+00:00 https://www.grahamcluley.com/malicious-hackers-discovered-way-deliver-malware-unloved-ask-toolbar/ www.secnews.physaphae.fr/article.php?IdArticle=341565 False None None None Graham Cluley - Blog Security Stop shifting the blame onto third parties. That breach is still your firm\'s responsibility Stop shifting the blame onto third parties. That breach is still your firm's responsibilityIf it's data that your customers gave you that's breached, it's your responsibility. Read more in my article on the Bitdefender Business Insights blog. ]]> 2017-03-20T16:36:24+00:00 https://businessinsights.bitdefender.com/breach-firm-responsibility#new_tab www.secnews.physaphae.fr/article.php?IdArticle=341351 False None None None Graham Cluley - Blog Security Scammers target tax preparers with last-minute phishing attacks Scammers target tax preparers with last-minute phishing attacksScammers are sending last-minute phishing attacks to tax preparers in the hopes of making off with taxpayers' refunds. It seems nothing is certain, except scams, death, and taxes. David Bisson reports. ]]> 2017-03-20T13:37:41+00:00 https://www.grahamcluley.com/scammers-targeting-tax-preparers-with-last-minute-phishing-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=340909 False None None None Graham Cluley - Blog Security Surprise! WikiLeaks won\'t just hand over details of zero-day vulnerabilities to tech firms Surprise! WikiLeaks won't just hand over details of zero-day vulnerabilities to tech firmsWikiLeaks' Julian Assange may be making unreasonable demands about how he will share details of the alleged zero-day vulnerabilities that have been leaked from the CIA ]]> 2017-03-18T02:00:00+00:00 https://www.grahamcluley.com/surprise-wikileaks-wont-just-hand-details-zero-day-vulnerabilities-tech-firms/ www.secnews.physaphae.fr/article.php?IdArticle=340383 False None None None Graham Cluley - Blog Security Graham Cluley named Best IT Security blog at SysAdmin blog awards Graham Cluley named Best IT Security blog at SysAdmin blog awardsWe have been named "Best IT Security blog" at the 2017 SysAdmin Blog Awards. Huzzah! ]]> 2017-03-17T16:20:53+00:00 https://www.grahamcluley.com/graham-cluley-named-best-security-blog-sysadmin-blog-awards/ www.secnews.physaphae.fr/article.php?IdArticle=340384 False None None None Graham Cluley - Blog Security Kirk ransomware sports Star Trek-themed decryptor and little-known crypto-currency Kirk ransomware sports Star Trek-themed decryptor and little-known crypto-currency"It's ransomware, Jim, but not as we know it!" David Bisson reports. ]]> 2017-03-17T15:53:11+00:00 https://www.grahamcluley.com/kirk-ransomware-sports-star-trek-themed-decryptor-little-known-crypto-currency/ www.secnews.physaphae.fr/article.php?IdArticle=340385 False None None None Graham Cluley - Blog Security New cloud-based keylogger gaining momentum among criminals Nexuslogger thumbCloud-based NexusLogger's user-friendly web portal makes it simple for non-skilled criminals to configure the malware however they want. David Bisson reports. ]]> 2017-03-16T14:15:08+00:00 https://www.grahamcluley.com/new-cloud-based-keylogger-gaining-momentum-among-criminals/ www.secnews.physaphae.fr/article.php?IdArticle=339604 False None None None Graham Cluley - Blog Security Smashing Security #012: Eau de Eugene Kaspersky Smashing Security #012: Eau de Eugene KasperskyAndroids pre-installed with malware - can the supply chain be trusted? Will WikiLeaks help vendors get zero-days fixed? And what on earth has the Kaspersky marketing department dreamt up this time? All this and more is discussed in the latest podcast by computer security veterans Graham Cluley, Carole Theriault and special guest Nick FitzGerald. Give it a listen. ]]> 2017-03-16T11:17:26+00:00 https://www.grahamcluley.com/smashing-security-012-eau-de-eugene-kaspersky/ www.secnews.physaphae.fr/article.php?IdArticle=339196 False None None None Graham Cluley - Blog Security Bye bye, botnet! Kibosh put on Chamois Android fraud network Bye bye, botnet! Kibosh put on Chamois Android fraud networkGoogle has shut down an ad fraud network that was targeting Android users. David Bisson reports. ]]> 2017-03-16T08:29:59+00:00 https://www.grahamcluley.com/bye-bye-botnet-kibosh-put-chamois-android-fraud-network/ www.secnews.physaphae.fr/article.php?IdArticle=338946 False None None None Graham Cluley - Blog Security Sorry for the Nazi spam from my Twitter account Sorry for the Nazi spam from my Twitter accountIt happened to me (and many others). It could happen to you. ]]> 2017-03-15T10:06:54+00:00 https://www.grahamcluley.com/sorry-nazi-spam-twitter-account/ www.secnews.physaphae.fr/article.php?IdArticle=337626 False None None None Graham Cluley - Blog Security Proof-of-concept confirms Nintendo Switch videogame console vulnerable to WebKit exploit Nintendo switch thumbA researcher has published a proof-of-concept (POC) confirming that the Nintendo Switch system is vulnerable to an exploit that could allow the playing of pirated games and homebrew projects. David Bisson reports. ]]> 2017-03-14T22:12:42+00:00 https://www.grahamcluley.com/proof-concept-confirms-nintendo-switch-videogame-console-vulnerable-webkit-exploit/ www.secnews.physaphae.fr/article.php?IdArticle=337307 False None None None Graham Cluley - Blog Security Poorly-configured online backup leaks US Air Force documents Poorly-configured online backup leaks US Air Force documentsSensitive records related to the United States Air Force has been found exposed publicly on the internet, allowing anyone with a web connection to peruse them without authorisation and no need for a password. Read more in my article on the Bitdefender BOX blog. ]]> 2017-03-14T08:58:21+00:00 https://www.bitdefender.com/box/blog/iot-news/poorly-configured-online-backup-leaks-us-air-force-documents/#new_tab www.secnews.physaphae.fr/article.php?IdArticle=336296 False None None None Graham Cluley - Blog Security Malware found pre-installed on dozens of different Android devices Malware found pre-installed on dozens of different Android devicesMalware in the form of info-stealers, rough ad networks, and even ransomware came pre-installed on more than three dozen Android devices. Can the supply chain be trusted? David Bisson reports. ]]> 2017-03-13T15:25:28+00:00 https://www.grahamcluley.com/malware-found-pre-installed-dozens-different-android-devices/ www.secnews.physaphae.fr/article.php?IdArticle=336115 False None None None Graham Cluley - Blog Security Typo in IP address led to innocent father\'s arrest for paedophilia Brazil thumbOne extra digit added to an IP address led police in the wrong direction. ]]> 2017-03-13T11:26:08+00:00 https://www.grahamcluley.com/typo-ip-address/ www.secnews.physaphae.fr/article.php?IdArticle=335277 False None None None Graham Cluley - Blog Security WikiLeaks says it will work with software vendors to fix CIA zero-day exploits... but when? WikiLeaks says it will work with software vendors to fix CIA zero-day exploitsAfter the media hystericane, Julian Assange says he will help bugs get fixed. ]]> 2017-03-12T17:30:50+00:00 https://www.grahamcluley.com/wikileaks-says-will-work-software-vendors-fix-cia-zero-day-exploits/ www.secnews.physaphae.fr/article.php?IdArticle=334760 False None None None Graham Cluley - Blog Security New Linux malware hijacks one vendor\'s IoT devices by exploiting CGI bug Iot thumbA new form of Linux malware is hijacking Internet of Things (IoT) devices made by one Chinese vendor by exploiting a common gateway interface (CGI) vulnerability. David Bisson reports. ]]> 2017-03-10T23:41:28+00:00 https://www.grahamcluley.com/new-linux-malware-hijacks-one-vendors-iot-devices-by-exploiting-cgi-bug/ www.secnews.physaphae.fr/article.php?IdArticle=334761 False None None None Graham Cluley - Blog Security TeamViewer stopped working? Let me guess, your ISP is TalkTalk... TeamViewer stopped working? Let me guess, your ISP is TalkTalk...TeamViewer can be used for good. TeamViewer can be used for bad. UK ISP TalkTalk doesn't want you to use it at all. Read more in my article on the Hot for Security blog. ]]> 2017-03-10T13:33:56+00:00 https://hotforsecurity.bitdefender.com/blog/teamviewer-stopped-working-let-me-guess-your-isp-is-talktalk-17781.html#new_tab www.secnews.physaphae.fr/article.php?IdArticle=333803 False None None None Graham Cluley - Blog Security The perils of working from home with young children The perils of working from home with young childrenI work from home. I frequently do media interviews via Skype. I have a young child. It's a dangerous cocktail. ]]> 2017-03-10T12:48:55+00:00 https://www.grahamcluley.com/perils-working-home-young-children/ www.secnews.physaphae.fr/article.php?IdArticle=333804 False None None None Graham Cluley - Blog Security Android YouTube download apps flood devices with ads to secure high ratings for droppers Android adware floods devices with ads to secure high ratings for dropper appsThe adware, detected as Android/Hiddad.BZ, hid itself inside seven applications available for download from the official Google Play app store. David Bisson reports. ]]> 2017-03-10T08:25:45+00:00 https://www.grahamcluley.com/android-adware-floods-devices-with-ads-to-secure-high-ratings-for-dropper-apps/ www.secnews.physaphae.fr/article.php?IdArticle=333570 False None None None Graham Cluley - Blog Security Smashing Security #011: WikiLeaks and the CIA Smashing Security podcast: WikiLeaks and the CIAHas the CIA been using a Weeping Angel to spy on you via your Smart TV? Have WhatsApp, Telegram and Signal been compromised? What is the secret of the SATAN ransomware? And can you avoid having your data searched as you pass through border control? All this and more is discussed in the latest podcast by computer security veterans Graham Cluley, Carole Theriault and special guest Paul Ducklin. Give it a listen. ]]> 2017-03-09T11:56:39+00:00 https://www.grahamcluley.com/smashing-security-011-wikileaks-cia/ www.secnews.physaphae.fr/article.php?IdArticle=332914 False None None None Graham Cluley - Blog Security Buggy backups! Unplug your WD My Cloud until these flaws are fixed Buggy backups! Unplug your WD My Cloud until these flaws are fixedConsumers who use a Western Digital My Cloud for data backups should unplug their units for the time being due to a series of unpatched vulnerabilities. David Bisson reports. ]]> 2017-03-09T00:16:32+00:00 https://www.grahamcluley.com/buggy-backups-unplug-wd-cloud-flaws-fixed/ www.secnews.physaphae.fr/article.php?IdArticle=332265 False None None None Graham Cluley - Blog Security Lame comment spam campaign attempts to promote iPhone app Lame comment spam campaign attempts to promote iPhone appWho could possibly be behind a campaign of spam comments being left on my blog promoting an iPhone app? ]]> 2017-03-08T12:03:29+00:00 https://www.grahamcluley.com/lame-comment-spam-campaign-attempts-promote-iphone-app/ www.secnews.physaphae.fr/article.php?IdArticle=331408 False None None None Graham Cluley - Blog Security Is the CIA\'s Weeping Angel spying on TV viewers? Weeping angel thumbWikiLeaks has published thousands of pages of what appeared to be leaked internal CIA documents. The haul, which WikiLeaks has somewhat pretentiously dubbed "Vault 7", is claimed to be "the largest ever publication of confidential documents on the agency." ]]> 2017-03-08T02:55:32+00:00 https://www.grahamcluley.com/cias-weeping-angel-spying-tv-viewers/ www.secnews.physaphae.fr/article.php?IdArticle=330887 False None None None Graham Cluley - Blog Security Firefox 52 warns when you try to enter passwords on non-encrypted websites Firefox 52 warns when you try to enter passwords on non-encrypted websitesMozilla patches 28 security vulnerabilities and protects users from entering their sensitive information on insecure webpages. ]]> 2017-03-08T01:26:09+00:00 https://www.grahamcluley.com/firefox-52-warns-try-enter-passwords-non-encrypted-websites/ www.secnews.physaphae.fr/article.php?IdArticle=330888 False None None None Graham Cluley - Blog Security Hacking the hackers: Draft US bill would allow hacking victims to hack back Vigilante thumbA U.S. representative has proposed a bill that would allow hacking victims to hack back their attackers. But is that a good idea? David Bisson reports. ]]> 2017-03-08T00:01:00+00:00 https://www.grahamcluley.com/draft-bill-would-allow-hacking-victims-to-hack-back/ www.secnews.physaphae.fr/article.php?IdArticle=330889 False None None None Graham Cluley - Blog Security Hackers could bypass protective measures to gain access to locked Twitter accounts Hackers could bypass protective measures to gain access to locked Twitter accountsTwitter has patched an issue that allowed attackers to bypass protective measures for user accounts that have been locked. David Bisson reports. ]]> 2017-03-06T16:48:00+00:00 https://www.grahamcluley.com/hackers-bypass-twitter-locked-accounts/ www.secnews.physaphae.fr/article.php?IdArticle=329463 False None None None Graham Cluley - Blog Security Third party patch released for Microsoft zero-day that Google made public Third party patch released for Microsoft zero-day that Google made publicIn the absence of an official fix from Microsoft, a third-party security firm has produced its own temporary patch for a zero-day Windows vulnerability. Read more in my article on the Hot for Security blog. ]]> 2017-03-06T13:48:26+00:00 https://hotforsecurity.bitdefender.com/blog/third-party-patch-released-for-microsoft-zero-day-that-google-made-public-17767.html#new_tab www.secnews.physaphae.fr/article.php?IdArticle=328611 False None None None Graham Cluley - Blog Security Realistic crisis simulations are the backbone of cyber preparedness - ENISA plays a role in EU cyber preparedness Realistic crisis simulations are the backbone of cyber preparedness - ENISA plays a role in EU cyber preparednessGraham Cluley Security News is sponsored this week by the folks at ENISA. Thanks to the great team there for their support! Regular readers of this blog will be more than familiar with the myriad of cyber threat and vulnerabilities which internet users are unknowingly faced with on a daily basis. But recently, the topic of cybersecurity has been dominating the headlines of more than just tech-focused outlets. From concerns about the targeting of critical infrastructure, to increasingly-substantiated accusations around nation-state hacking of electoral systems, cybersecurity is no longer a niche topic, but a matter for far wider public concern. With this in mind, it is essential that Europe be as prepared as possible to mitigate ever-evolving cyber threats. They say there's no substitute for experience – but that doesn't mean learning on the job. Instead of waiting for the next cyber crisis to strike just so we can learn lessons, we prefer another motto: practice makes perfect. Realistic crisis simulations are the backbone of cyber preparedness efforts. With just enough unknown variables to keep participants on their toes, without actually jeopardising their operations, a cyber exercise allows security experts to test their capacity for problem-solving, troubleshooting and crisis management in a realistic timeframe but a non-hostile environment. We need the practice. Europe's economic welfare is increasingly rooted in its provision and exploitation of digital services. This provides massive opportunities for growth, job creation and social prosperity. But it also makes us a prime target for cyber criminals looking to perform industrial reconnaissance, tamper with customer data, manipulate stock markets, or even sabotage critical infrastructures. At the EU Agency for Network and Information Security (ENISA), we want as many people as possible to get this practice in. That's why, every two years, we organise the EU's largest and most comprehensive cybersecurity exercise, Cyber Europe. The latest edition of this event, held in October 2016, brought together over 300 organisations and 700 technical experts to test how ready they would be if a major cybersecurity incident were to strike. These included Members States' cybersecurity agencies, EU institutions and national ministries, and cybersecurity experts from internet, telecoms and cloud service providers. All were focused on securing Europe's digital defences within a fictional scenario which unfolded across six months and culminated in the largest, most realistic and most comprehensive such exercise to date. This time around, our scenario had all the hallmarks of a Hollywood blockbuster – the sudden disabling of Internet services continent-wide and a city-wide blackout, a spate of confidential data leaks and data centre fires, rumours of a shadowy organisation at]]> 2017-03-06T10:14:21+00:00 https://www.grahamcluley.com/realistic-crisis-simulations-backbone-cyber-preparedness-enisa-plays-role-eu-cyber-preparedness/ www.secnews.physaphae.fr/article.php?IdArticle=328332 False None None None Graham Cluley - Blog Security Is Obama planning a coup? Yes, says Google Home Is Obama planning a coup? Yes, says Google HomeTo err is human. Google proves once again that to really screw things up you need the internet of things. ]]> 2017-03-05T21:50:22+00:00 https://www.grahamcluley.com/obama-planning-coup-yes-says-google-home/ www.secnews.physaphae.fr/article.php?IdArticle=328106 False None None 3.0000000000000000 Graham Cluley - Blog Security Telegram lets scammers connect directly with potential victims by way of stored contacts Telegram lets scammers connect directly with potential victims by way of stored contactsScammers can use the Telegram mobile messaging app to connect with a potential victim if they already have their phone number in their contact list. David Bisson reports. ]]> 2017-03-04T23:12:50+00:00 https://www.grahamcluley.com/telegram-scammers-stored-contacts/ www.secnews.physaphae.fr/article.php?IdArticle=328107 False None None 3.0000000000000000 Graham Cluley - Blog Security Mike Pence used personal AOL account for government business as Indiana governor Mike Pence used personal AOL account for government business as Indiana governorWhile serving as Governor of Indiana, Mike Pence routinely used his personal AOL email account to conduct government business. Surprise! It was hacked. David Bisson reports. ]]> 2017-03-03T15:21:38+00:00 https://www.grahamcluley.com/mike-pence-aol-hacked/ www.secnews.physaphae.fr/article.php?IdArticle=328108 False None None 4.0000000000000000