www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-02T17:20:46+00:00 www.secnews.physaphae.fr Graham Cluley - Blog Security 132 Android apps found in the Google Play Store exploiting malicious iFrames 132 Android apps found exploiting malicious iFrames in the Google Play StoreMore than one hundred Android apps on Google's Play Store have been found to exploit hidden iFrames in an attempt to pull code from malicious domains. David Bisson reports. ]]> 2017-03-03T09:07:06+00:00 https://www.grahamcluley.com/132-android-apps/ www.secnews.physaphae.fr/article.php?IdArticle=327410 False None None None Graham Cluley - Blog Security Smashing Security #010: The dolls must be destroyed Smashing Security #010: Destroy all the dollsA creepy teddybear leaks two million voicemail messages, Windows 10 pushes you into only installing vetted apps, and Boeing warns 36,000 employees their personal information could have been exposed after a worker sends a spreadsheet to his wife. All this and more is discussed in the latest podcast by computer security veterans Graham Cluley, Vanja Svajcer and Carole Theriault. Give it a listen. ]]> 2017-03-02T11:20:56+00:00 https://www.grahamcluley.com/smashing-security-010-dolls-must-destroyed/ www.secnews.physaphae.fr/article.php?IdArticle=326789 False None None None Graham Cluley - Blog Security Slack only took five hours to fix bug that could have allowed hackers to hijack your account Slack only took five hours to fix bug that could have allowed hackers to hijack your accountA researcher uncovered a serious vulnerability that could have helped hackers to seize control of users' Slack accounts. The good news is that Slack fixed the issue impressively quickly and clearly. ]]> 2017-03-02T01:45:51+00:00 https://www.grahamcluley.com/slack-took-five-hours-fix-bug-allowed-hackers-hijack-account/ www.secnews.physaphae.fr/article.php?IdArticle=325731 False None None None Graham Cluley - Blog Security Yahoo CEO Marissa Mayer will miss out on cash bonus after security breaches Yahoo CEO Marissa Mayer will miss out on cash bonus after security breachesAlso it is revealed that hackers accessed 32 million Yahoo user accounts in the last two years using forged cookies. ]]> 2017-03-02T00:46:06+00:00 https://www.grahamcluley.com/yahoo-ceo-marissa-mayer-will-miss-cash-bonus-security-breaches/ www.secnews.physaphae.fr/article.php?IdArticle=325732 False None Yahoo None Graham Cluley - Blog Security Come see me speaking about security at The Shard in London Come see me speaking about security at The Shard in LondonIf you're in London on Thursday 9 March, there's an opportunity to attend an event where I will be giving a keynote speech about the state of computer security, and the serious threats that businesses are facing. ]]> 2017-03-01T23:48:57+00:00 https://www.grahamcluley.com/come-see-speaking-security-shard-london/ www.secnews.physaphae.fr/article.php?IdArticle=325733 False None None None Graham Cluley - Blog Security How to recover from the FileCoder ransomware on your Mac Happy filecoder thumbBuggy ransomware didn't offer a method of recovery even if you paid the extortionists. Until now. ]]> 2017-03-01T09:27:20+00:00 https://www.grahamcluley.com/recover-filecoder-ransomware-mac/ www.secnews.physaphae.fr/article.php?IdArticle=325064 False None None None Graham Cluley - Blog Security Gatekeeper-like feature for Windows 10 only allows apps to be installed from the Microsoft Store Gatekeeper-like feature for Windows 10 allows app installations only from Microsoft StoreA new feature could see Windows 10 behaving like Apple's Gatekeeper by blocking app installations that occur outside the Microsoft Store. David Bisson reports. ]]> 2017-03-01T08:13:48+00:00 https://www.grahamcluley.com/gatekeeper-like-feature-for-windows-10-allows-app-installations-only-from-microsoft-store/ www.secnews.physaphae.fr/article.php?IdArticle=325065 False None None None Graham Cluley - Blog Security Over 800,000 user account details stolen from vulnerable forums running vBulletin Over 800,000 user account details stolen from vulnerable forums running vBulletinIf you're a member of an online forum, there's a good chance that the site is running a piece of software called vBulletin. And, depending on how well it has been patched, that may not be good news. Read more in my article on the Hot for Security blog. ]]> 2017-02-28T12:57:37+00:00 https://hotforsecurity.bitdefender.com/blog/over-800000-user-account-details-stolen-from-vulnerable-forums-running-vbulletin-17745.html#new_tab www.secnews.physaphae.fr/article.php?IdArticle=324577 False None None None Graham Cluley - Blog Security 1500 companies in over 100 countries hit by malicious Adwind backdoor RAT Adwind thumbMalware-as-a-service platform mooches off infected computers to steal confidential business data. David Bisson reports. ]]> 2017-02-28T09:24:22+00:00 https://www.grahamcluley.com/1500-companies-in-over-100-countries-targeted-by-adwind-backdoor/ www.secnews.physaphae.fr/article.php?IdArticle=324261 False None None None Graham Cluley - Blog Security Google tells world how to crash Microsoft Internet Explorer and Edge browsers Google tells world how to crash Microsoft Internet Explorer and Edge browsersGoogle's Project Zero vulnerability research team has published details of a flaw in the Microsoft Windows 10 Edge and Internet Explorer 11 browsers that allow them to be remotely crashed - without waiting for a fix to be released. ]]> 2017-02-27T16:35:42+00:00 https://www.grahamcluley.com/google-tells-world-crash-microsoft-internet-explorer-edge-browsers/ www.secnews.physaphae.fr/article.php?IdArticle=323985 False None None 3.0000000000000000 Graham Cluley - Blog Security Movie night? Nope. It\'s a fake iTunes receipt from phishers targeting Apple users Movie night? Nope. It's a fake iTunes receipt from phishers targeting Apple usersBeware fake iTunes receipts for movies you haven't purchased. When you try to dispute the purchase, you might find you're handing online criminals your personal information. David Bisson reports. ]]> 2017-02-26T18:08:53+00:00 https://www.grahamcluley.com/itunes-movie-phishing/ www.secnews.physaphae.fr/article.php?IdArticle=322799 False None None None Graham Cluley - Blog Security It\'s raining. It\'s pouring. This fake weather app is stealing your credentials It's raining. It's pouring. This fake weather app is stealing your credentialsA new Android banking trojan posed as a legitimate weather forecast app in an effort to steal users' banking credentials. David Bisson reports. ]]> 2017-02-24T13:44:06+00:00 https://www.grahamcluley.com/raining-pouring-fake-weather-app-stealing-credentials/ www.secnews.physaphae.fr/article.php?IdArticle=322369 False None None None Graham Cluley - Blog Security Barely 1% of Android users are running Nougat, as Apple shows how to update devices properly Barely 1% of Android users are running Nougat, as Apple shows how to update devices properlyIn a world where we are increasingly using our smartphones to do business, make purchases and communicate with our friends and family it's important to recognise that sensible security doesn't start and end on your desk - it begins in your pocket. Read more in my article on the Hot for Security blog. ]]> 2017-02-23T16:19:45+00:00 https://hotforsecurity.bitdefender.com/blog/barely-1-of-android-users-are-running-nougat-as-apple-shows-how-to-properly-update-devices-17729.html www.secnews.physaphae.fr/article.php?IdArticle=321851 False None None None Graham Cluley - Blog Security Smashing Security #009: False flags and hacker clues Smashing Security #009: Fake flags and hacker cluesThe Lazarus malware attempts to trick you into believing it was written by Russians, second-hand connected cars may be easier to steal, and is your child a malicious hacker? All this and more is discussed in the latest podcast by computer security veterans Graham Cluley, Vanja Svajcer and Carole Theriault. Oh, and Carole gets Graham and Vanja to apologise for mistakes of their past... ]]> 2017-02-23T14:30:47+00:00 https://www.grahamcluley.com/smashing-security-009-false-flags-hacker-clues/ www.secnews.physaphae.fr/article.php?IdArticle=321852 False None APT 38 None Graham Cluley - Blog Security \'Zombie script\' deluges Internet Explorer 11 with pop-up alerts until user closes tab 'Zombie script' deluges Internet Explorer with pop-up alerts until user closes tabA 'zombie script' could allow attackers to deluge Internet Explorer 11 users with pop-up alerts until they close the tab. David Bisson reports. ]]> 2017-02-23T10:14:31+00:00 https://www.grahamcluley.com/zombie-internet-explorer-pop-up/ www.secnews.physaphae.fr/article.php?IdArticle=321189 False None None None Graham Cluley - Blog Security Gordon Ramsay\'s father-in-law charged with hacking celebrity chef\'s email Gordon Ramsay's father-in-law charged with hacking celebrity chef's emailPotty-mouthed celebrity chef's father-in-law and children charged with conspiracy to hack computer. ]]> 2017-02-22T16:45:55+00:00 https://www.grahamcluley.com/gordon-ramsays-father-law-charged-hacking-celebrity-chefs-email/ www.secnews.physaphae.fr/article.php?IdArticle=320958 False None None None Graham Cluley - Blog Security Good news and bad news on the Microsoft patch front Good news and bad news on the Microsoft patch frontMicrosoft belatedly patches some vulnerabilities in Adobe Flash Player, but some zero-days in other software remain untouched for now. ]]> 2017-02-22T16:15:56+00:00 https://www.grahamcluley.com/good-news-bad-news-microsoft-patch-front/ www.secnews.physaphae.fr/article.php?IdArticle=320959 False None None None Graham Cluley - Blog Security Operation BugDrop - hackers steal gigabytes of data from organisations, record conversations Binoculars thumbVictims of the secret surveillance operation have included a manufacturer of industrial control system monitoring equipment, a human rights institution, and a scientific research institute. David Bisson reports. ]]> 2017-02-22T15:13:50+00:00 https://www.grahamcluley.com/operation-bugdrop-has-stolen-gbs-of-data-from-at-least-70-organizations/ www.secnews.physaphae.fr/article.php?IdArticle=320960 False None None None Graham Cluley - Blog Security Smashing Security podcast: Macs and malware Smashing Security podcast: Macs and malwareCheck out the latest special "splinter" episode of the "Smashing Security" podcast - where Vanja Svajcer, Carole Theriault and I discuss Mac malware. Take a listen, and let me know what you think. ]]> 2017-02-22T00:26:56+00:00 https://www.grahamcluley.com/smashing-security-podcast-mac-malware/ www.secnews.physaphae.fr/article.php?IdArticle=320167 False None None None Graham Cluley - Blog Security Prison for former sysadmin who hacked industrial facility and caused a million dollars worth of damage Prison for former sysadmin who hacked industrial facility and caused a million dollars worth of damageAre you a sysadmin who left your last job under a cloud? My advice is don't try and seek revenge by hacking into the company that fired you. You might end up with a lengthy prison sentence. Read more in my article on the Hot for Security blog. ]]> 2017-02-21T14:37:51+00:00 https://hotforsecurity.bitdefender.com/blog/prison-for-former-sysadmin-who-hacked-industrial-facility-and-caused-a-million-dollars-worth-of-damage-17723.html www.secnews.physaphae.fr/article.php?IdArticle=320168 False None None None Graham Cluley - Blog Security How to protect your Microsoft account with two-step verification (2SV) How to protect your Microsoft account with two-step verification (2SV)Ensure that you have properly hardened your Microsoft account from hackers, by following David Bisson's advice. ]]> 2017-02-21T13:45:25+00:00 https://www.grahamcluley.com/how-to-protect-your-microsoft-account-with-two-step-verification-2sv/ www.secnews.physaphae.fr/article.php?IdArticle=319296 False None None None Graham Cluley - Blog Security Hacker defaces Donald Trump fundraising site via subdomain takeover attack Hacker defaces Donald Trump fundraising site via subdomain takeover attackA hacker defaced a presidential campaign fundraising website for Donald Trump with a little help from a DNS misconfiguration issue. David Bisson reports. ]]> 2017-02-20T18:18:06+00:00 https://www.grahamcluley.com/hacker-defaces-donald-trump-fundraising-site-via-subdomain-takeover-attack/ www.secnews.physaphae.fr/article.php?IdArticle=318933 False None None None Graham Cluley - Blog Security Google goes public about unpatched Windows vulnerability Google goes public about unpatched Windows vulnerabilityGoogle security engineers have once again made details of a vulnerability in Microsoft's software public, before Microsoft has been able to roll out a patch. ]]> 2017-02-20T02:22:43+00:00 https://www.grahamcluley.com/google-goes-public-unpatched-windows-vulnerability/ www.secnews.physaphae.fr/article.php?IdArticle=317981 False None None None Graham Cluley - Blog Security German parents urged to destroy data-collecting toy doll Cayla thumbA German privacy watchdog is urging parents to destroy My Friend Cayla, a doll which has a knack for collecting private information about its young owners. David Bisson reports. ]]> 2017-02-20T01:43:15+00:00 https://www.grahamcluley.com/german-parents-urged-destroy-data-collecting-toy-doll/ www.secnews.physaphae.fr/article.php?IdArticle=317982 False None None None Graham Cluley - Blog Security Graham Cluley named most entertaining security blog Graham Cluley named most entertaining security blogGraham Cluley Security News was awarded the title of "Most Entertaining Security blog" against some tough competition. Thanks to everyone for your support! ]]> 2017-02-17T09:39:59+00:00 https://www.grahamcluley.com/graham-cluley-named-entertaining-security-blog/ www.secnews.physaphae.fr/article.php?IdArticle=317260 False None None None Graham Cluley - Blog Security Smashing Security podcast #008: \'I\'ll give you my Android when you pry it from my cold, dead paws\' Smashing Security podcast #008: 'I'll give you my Android when you pry it from my cold, dead pawsHandbags at dawn for CrowdStrike and NSS Labs! Donald Trump's insecure Android phone! File-less malware - is that so new? And StalkScan makes it easier to reveal what Facebook users have been carelessly sharing... Check out our latest "Smashing Security" podcast. ]]> 2017-02-16T17:16:42+00:00 https://www.grahamcluley.com/smashing-security-podcast-008-ill-give-android-pry-cold-dead-paws/ www.secnews.physaphae.fr/article.php?IdArticle=316929 False None None None Graham Cluley - Blog Security Magento stores targeted by self-healing malware that steals credit card details Magento stores targeted by self-healing malware that steals credit card detailsA newly discovered malware attack manages to restore itself in its ongoing campaign against Magento-powered online stores. David Bisson reports. ]]> 2017-02-16T15:34:42+00:00 https://www.grahamcluley.com/magento-stores-targeted-by-self-healing-malware/ www.secnews.physaphae.fr/article.php?IdArticle=316930 False None None None Graham Cluley - Blog Security Cerber ransomware takes special care not to encrypt security product files Cerber ransomware takes special care not to encrypt security product filesCerber's developers want to infect your computer with ransomware. But they also don't want to trigger a security alert that could interfere with their attempt to extort money from you. David Bisson reports. ]]> 2017-02-15T20:55:14+00:00 https://www.grahamcluley.com/cerber-ransomware-avoids-security/ www.secnews.physaphae.fr/article.php?IdArticle=316049 False None None None Graham Cluley - Blog Security Sage 2.0 ransomware wants to be just like Cerber when it grows up Sage 2.0 ransomware wants to be just like Cerber when it grows upThe Sage 2.0 ransomware has adopted several techniques employed by the notorious Cerber malware, so much so that you can't help but wonder if the two are somehow related. David Bisson reports. ]]> 2017-02-14T16:02:07+00:00 https://www.grahamcluley.com/sage-2-0-ransomware/ www.secnews.physaphae.fr/article.php?IdArticle=314541 False None None None Graham Cluley - Blog Security 65% of IT professionals feel Shadow IT is compromising cloud security 65% of IT professionals feel Shadow IT is compromising cloud securityRead more in my article on the Bitdefender Business Insights blog. ]]> 2017-02-14T15:38:31+00:00 https://businessinsights.bitdefender.com/shadow-it-cloud-security www.secnews.physaphae.fr/article.php?IdArticle=314542 False None None None Graham Cluley - Blog Security Google search results are falling foul of scammers spoofing well-known sites Google search results are falling foul of scammers spoofing well-known sitesOnline fraudsters managed to waltz past Google's vetting and successfully plant a rogue ad for the world's most searched for retail store: Amazon. Read my latest article on the Hot for Security blog. ]]> 2017-02-14T13:00:41+00:00 https://hotforsecurity.bitdefender.com/blog/google-search-results-are-falling-foul-of-scammers-spoofing-well-known-sites-17689.html www.secnews.physaphae.fr/article.php?IdArticle=313775 False None None None Graham Cluley - Blog Security Senators raise concerns over Donald Trump\'s smartphone security Senators raise concerns over Donald Trump's smartphone securityIs Donald Trump really using an insecure Android phone? If it that was true, it would probably be the most widely-prized device on the internet for hackers - and top of the target list for intelligence agencies around the world. ]]> 2017-02-14T08:12:54+00:00 https://www.grahamcluley.com/senators-donald-trump-smartphone-security/ www.secnews.physaphae.fr/article.php?IdArticle=313505 False None None None Graham Cluley - Blog Security Smashing Security podcast: Using public Wi-Fi Smashing Security podcast: Using public Wi-FiDo you trust that Wi-Fi hotspot? What steps can you take to better protect yourself when you connect to the net away from your office or home? The Smashing Security podcast team tackle the tricky problem of public Wi-Fi, and have some tips for you. Listen in and tell us what you think. ]]> 2017-02-13T21:20:35+00:00 https://www.grahamcluley.com/smashing-security-podcast-using-public-wi-fi/ www.secnews.physaphae.fr/article.php?IdArticle=313178 False None None None Graham Cluley - Blog Security Lazarus mob possibly behind malware attacks against Polish banks Lazarus mob possibly behind malware attacks against Polish banksA hacking gang known as the Lazarus Group might be responsible for malware attacks that have targeted Polish banks and other financial organizations. David Bisson reports. ]]> 2017-02-13T20:39:54+00:00 https://www.grahamcluley.com/lazarus-gang-possibly-behind-malware-attacks-polish-banks/ www.secnews.physaphae.fr/article.php?IdArticle=313179 False Medical APT 38 None Graham Cluley - Blog Security How to better protect your WhatsApp account with two-step verification (2SV) How to enable 2-step verification (2SV) on your WhatsApp accountIf you're a WhatsApp user you should enable its new 2-step verification security feature. David Bisson explains why and how. ]]> 2017-02-10T16:20:47+00:00 https://www.grahamcluley.com/how-to-enable-2-step-verification-2sv-on-your-whatsapp-account/ www.secnews.physaphae.fr/article.php?IdArticle=311837 False None None None Graham Cluley - Blog Security Apple iCloud didn\'t wipe \'deleted\' browser histories for over a year Apple iCloud didn't wipe 'deleted' browser histories for over a yearResearchers discovered it was possible to extract users' Safari browsing history over a year after the user believed that they had deleted their browsing history. Read more in my article on the Hot for Security blog. ]]> 2017-02-10T14:42:17+00:00 https://hotforsecurity.bitdefender.com/blog/apple-icloud-didnt-wipe-deleted-%20browser-histories-for-over-a-year-17677.html www.secnews.physaphae.fr/article.php?IdArticle=311838 False None None None Graham Cluley - Blog Security Crossing border security? Here\'s how you protect your data Crossing border security? Here's how you protect your dataiOS security expert Jonathan Zdziarski has put together a timely guide to help people protect their devices and privacy when they pass through border controls. ]]> 2017-02-10T12:49:40+00:00 https://www.grahamcluley.com/crossing-border-security-heres-protect-data/ www.secnews.physaphae.fr/article.php?IdArticle=311479 False None None None Graham Cluley - Blog Security Smashing Security podcast #007: \'ASCII art attack\' Smashing Security podcast #007: 'ASCII art attack'Printers start churning out ASCII art after a vigilante hacker hijacks 160,000 devices, a researcher reveals how you can get Donald Trump to tweet an embarrassing spoof video of himself, and has your smart TV been snooping on you? Check out our latest "Smashing Security" podcast. ]]> 2017-02-09T17:04:26+00:00 https://www.grahamcluley.com/smashing-security-podcast-007-ascii-art-attack/ www.secnews.physaphae.fr/article.php?IdArticle=311052 False None None None Graham Cluley - Blog Security Tried-and-true Triada supplants Hummingbad as top mobile malware Traida thumbHummingbad is no longer the web's "most wanted mobile malware." That dubious honor goes to Triada according to a new report issued by security researchers. David Bisson reports. ]]> 2017-02-09T16:10:38+00:00 https://www.grahamcluley.com/tried-and-true-triada-supplants-hummingbad-as-top-mobile-malware/ www.secnews.physaphae.fr/article.php?IdArticle=311053 False None None None Graham Cluley - Blog Security How to create a robust data backup plan (and make sure it works) How to create a robust data backup plan (and make sure it works)With ransomware running amok, backups have never been more important. David Bisson describes a strategy for safely backing up your data, and testing that your backup works. ]]> 2017-02-09T13:41:32+00:00 https://www.grahamcluley.com/create-robust-data-backup-plan-make-sure-works/ www.secnews.physaphae.fr/article.php?IdArticle=310205 False None None None Graham Cluley - Blog Security Pony credential stealer trampling users via Microsoft Publisher documents Pony credential stealer trampling users via Microsoft Publisher documentsThe credential-stealing Pony malware is masquerading as Microsoft Publisher documents in an effort to infect unsuspecting users. David Bisson reports. ]]> 2017-02-08T21:23:36+00:00 https://www.grahamcluley.com/pony-credential-stealer-trampling-users-via-microsoft-publisher-documents/ www.secnews.physaphae.fr/article.php?IdArticle=309827 False None None None Graham Cluley - Blog Security Smashing Security podcast: Email attachment malware Smashing Security podcast: Email attachment malwareEmail attachment malware is the thorny topic tackled by computer security veterans Graham Cluley, Carole Theriault and Vanja Svajcer in this special "splinter" episode from the Smashing Security podcast team. ]]> 2017-02-08T17:05:57+00:00 https://www.grahamcluley.com/smashing-security-podcast-email-attachment-malware/ www.secnews.physaphae.fr/article.php?IdArticle=309828 False None None None Graham Cluley - Blog Security Ex-FireEye intern escapes prison sentence after creating and selling Dendroid malware Culbertson thumbMorgan Culbertson, the ex-FireEye intern who created and sold Android spyware, says he's very sorry. ]]> 2017-02-08T12:26:53+00:00 https://www.grahamcluley.com/ex-fireeye-intern-escapes-prison-sentence-creating-selling-dendroid-malware/ www.secnews.physaphae.fr/article.php?IdArticle=308957 False None None None Graham Cluley - Blog Security Smashing Security podcast: Passwords Smashing Security podcast: PasswordsThe Smashing Security team tackle the thorny topic of passwords and offer some advice and tips for computer users. Take a listen and let us know what you think. ]]> 2017-02-08T01:34:15+00:00 https://www.grahamcluley.com/smashing-security-podcast-passwords/ www.secnews.physaphae.fr/article.php?IdArticle=308584 False None None None Graham Cluley - Blog Security Polish banks hit by malware seemingly spread by government website Polish banks hit by malware seemingly spread by government websiteSeveral Polish financial institutions came down with a case of undocumented malware after their employees visited the website of the government's regulatory authority. David Bisson reports. ]]> 2017-02-07T16:58:36+00:00 https://www.grahamcluley.com/polish-banks-hit-malware-seemingly-spread-government-website/ www.secnews.physaphae.fr/article.php?IdArticle=308586 False None None None Graham Cluley - Blog Security 76 popular iPhone apps found wide open to data interception attacks 76 popular iPhone apps found wide open to data interception attacksNew research has discovered scores of buggy iOS apps that do a lousy job of securing users' information, opening opportunities for man-in-the-middle attacks. Read more in my article on the Hot for Security blog. ]]> 2017-02-07T13:20:05+00:00 https://hotforsecurity.bitdefender.com/blog/76-popular-iphone-apps-found-wide-open-to-data-interception-attacks-17656.html www.secnews.physaphae.fr/article.php?IdArticle=308199 False None None None Graham Cluley - Blog Security Anonymous hacker took down 10,000+ dark web sites, including child abuse content Anonymous hacker took down 10,000+ dark web child abuse sitesAn Anonymous hacker claims they took down more than 10,000 dark web sites because they were hosting child abuse material and other harmful content. David Bisson reports. ]]> 2017-02-06T15:39:48+00:00 https://www.grahamcluley.com/anonymous-hacker-took-10000-dark-web-child-abuse-sites/ www.secnews.physaphae.fr/article.php?IdArticle=307726 False None None None Graham Cluley - Blog Security Hacker blackmails David Beckham following email leak Hacker blackmails David Beckham following email leakDavid Beckham has reportedly refused to pay an extortionist £1 million after a cache of private messages were stolen from his publicist's email system. ]]> 2017-02-06T15:21:04+00:00 https://www.grahamcluley.com/hacker-blackmails-david-beckham-following-email-leak/ www.secnews.physaphae.fr/article.php?IdArticle=307727 False None None None Graham Cluley - Blog Security Security firms need to stop exaggerating hacker\'s abilities to hype their products Security firms need to stop exaggerating hacker's abilities to hype their productsDr Ian Levy, technical director of the UK's National Cyber Security Centre, has criticised security companies for "massively" exaggerating hackers' abilities in order to scare businesses. ]]> 2017-02-06T13:40:08+00:00 https://www.grahamcluley.com/security-firms-need-stop-exaggerating-hackers-abilities-hype-products/ www.secnews.physaphae.fr/article.php?IdArticle=306891 False None None None Graham Cluley - Blog Security Scammers target firms with W-2 phishing/CEO fraud blend Scammers target firms with W-2 phishing/CEO fraud blendThe IRS is warning organizations to be on the lookout for scammers that blend CEO fraud with W-2 phishing. David Bisson reports. ]]> 2017-02-03T16:47:37+00:00 https://www.grahamcluley.com/scammers-targeting-organizations-with-ceo-fraudw-2-phishing-blend/ www.secnews.physaphae.fr/article.php?IdArticle=306557 False None None None Graham Cluley - Blog Security Critical Cisco security hole could lead to hackers seizing control of thousands of home routers Critical Cisco security hole could lead to hackers seizing control of thousands of home routersIf you are a company running Cisco Prime Home to control your customers' devices – update it now. Read more in my article on the Bitdefender Box blog. ]]> 2017-02-03T13:54:38+00:00 https://www.bitdefender.com/box/blog/smart-home/critical-cisco-security-hole-lead-hackers-seizing-control-thousands-home-routers/ www.secnews.physaphae.fr/article.php?IdArticle=306206 False Guideline None None Graham Cluley - Blog Security Smashing Security podcast #006: \'A romantic ransomware hotel break\' Smashing Security podcast #006: 'A romantic ransomware hotel break'Join me and fellow computer security industry veterans Vanja Svajcer and Carole Theriault as we have another casual chat about whatever is on our minds. Were hotel guests really trapped in their rooms by ransomware? Does anti-virus increase your attack surface so much that it's not worth running at all? And 11% of people on the internet are running ad blockers, says company which blocks ad blockers. Oh, and we have a new theme tune... ]]> 2017-02-03T02:03:54+00:00 https://www.grahamcluley.com/smashing-security-podcast-006-romantic-ransomware-hotel-break/ www.secnews.physaphae.fr/article.php?IdArticle=305767 True None None None Graham Cluley - Blog Security Buggy Pentagon systems a dream come true to attackers, says researcher Buggy Pentagon systems a dream come true to attackers, says researcherVulnerable servers owned by the Department of Defense could allow hackers to launch digital attacks via the Pentagon's systems, says a researcher. David Bisson reports. ]]> 2017-02-03T01:46:02+00:00 https://www.grahamcluley.com/buggy-pentagon-systems-a-dream-come-true-to-attackers-says-researcher/ www.secnews.physaphae.fr/article.php?IdArticle=305768 False None None None Graham Cluley - Blog Security Cerber eclipsed all other ransomware over holiday season, says Microsoft Cerber eclipsed all other ransomware over holiday season, says MicrosoftMicrosoft detected more enterprise PCs infected by Cerber than any other ransomware family over the 2016-17 holiday season. David Bisson reports. ]]> 2017-02-01T21:15:41+00:00 https://www.grahamcluley.com/cerber-eclipsed-ransomware-holiday-season-says-microsoft/ www.secnews.physaphae.fr/article.php?IdArticle=304446 False None None None Graham Cluley - Blog Security GitLab down after it deletes wrong directory and backups stumble GitLab down after it deletes wrong directory and backups stumbleGitLab, which provides a source code version control repository for software developers, has come a cropper after an employee accidentally deleted a directory on the wrong server. ]]> 2017-02-01T02:04:47+00:00 https://www.grahamcluley.com/gitlab-deletes-wrong-directory-backups-stumble/ www.secnews.physaphae.fr/article.php?IdArticle=304447 False None None None Graham Cluley - Blog Security Telemarketing firm leaks 17,000 recorded calls, many containing credit card details Telemarketing firm leaks 17,000 recorded calls, many containing credit card detailsAudio recordings of telemarketing calls include customers' names, physical addresses, phone number, credit card number, CV numbers, and more. David Bisson reports. ]]> 2017-01-31T15:05:55+00:00 https://www.grahamcluley.com/telemarketing-firm-leaks-17000-recorded-calls-many-containing-credit-card-details/ www.secnews.physaphae.fr/article.php?IdArticle=303601 False None None None Graham Cluley - Blog Security Ransomware attack impacted 70% of Washington DC police surveillance cameras Ransomware attack impacted 70% of Washington D.C. police surveillance camerasOfficials found 123 of 187 network video recorders capturing CCTV footage had fallen victim to two strains of ransomware. David Bisson reports. ]]> 2017-01-30T18:12:46+00:00 https://www.grahamcluley.com/ransomware-attack-impacted-70-washington-dc-police-surveillance-cameras/ www.secnews.physaphae.fr/article.php?IdArticle=302626 False None None None Graham Cluley - Blog Security How a single SMS can break your Samsung Galaxy Android phone How a single SMS can break your Samsung Galaxy Android phoneIt's hard to believe that it's 2017, and we're still talking about Android phones being compromised by boobytrapped SMS text messages. Read more in my article on the Hot for Security blog. ]]> 2017-01-30T16:04:59+00:00 https://hotforsecurity.bitdefender.com/blog/how-a-single-sms-can-break-your-samsung-galaxy-android-phone-17585.html www.secnews.physaphae.fr/article.php?IdArticle=302627 False None None None Graham Cluley - Blog Security Barclays warns customers of the risks of business email compromise Barclays warns customers of business email compromiseBusiness email compromise, also known as "whaling" or "CEO fraud", is one the biggest threats facing businesses today. So it's good to see banks like Barclays doing their bit to raise awareness. ]]> 2017-01-30T14:42:48+00:00 https://www.grahamcluley.com/barclays-warns-customers-of-business-email-compromise/ www.secnews.physaphae.fr/article.php?IdArticle=302628 False None None None Graham Cluley - Blog Security Hotel guests locked in their rooms by ransomware? It doesn\'t make sense Hotel guests locked in their rooms by ransomware? It doesn't make senseIt's a great story, but it's almost certainly not true. ]]> 2017-01-30T03:03:44+00:00 https://www.grahamcluley.com/hotel-guests-locked-rooms-ransomware-doesnt-make-sense/ www.secnews.physaphae.fr/article.php?IdArticle=301788 False None None None Graham Cluley - Blog Security LeakedSource data breach website goes offline following alleged police raid LeakedSource data breach website goes offline following alleged police raidThe data breach aggregator and lookup service LeakedSource has gone offline following what appears to have been a police raid. David Bisson reports. ]]> 2017-01-27T19:07:13+00:00 https://www.grahamcluley.com/leakedsource-data-breach-website-goes-offline-following-alleged-police-raid/ www.secnews.physaphae.fr/article.php?IdArticle=301789 False None None None Graham Cluley - Blog Security No, disabling your anti-virus software does not make security sense Off switch thumb"Antivirus software vendors are terrible; don't buy antivirus software, and uninstall it if you already have it." Seriously?? ]]> 2017-01-27T12:56:09+00:00 https://www.grahamcluley.com/no-disabling-anti-virus-software-not-make-security-sense/ www.secnews.physaphae.fr/article.php?IdArticle=301476 False None None None Graham Cluley - Blog Security The security of President Trump\'s Android smartphone The security of President Trump's Android smartphoneThe New York Times reports that US President Donald Trump is still using an old, poorly-secured Android smartphone. ]]> 2017-01-27T02:10:46+00:00 https://www.grahamcluley.com/security-president-trumps-android-smartphone/ www.secnews.physaphae.fr/article.php?IdArticle=300947 True None None None Graham Cluley - Blog Security Firefox flags Web of Trust add-on as suspicious, blocks by default Firefox flags Web of Trust add-on as suspicious, blocks by defaultFirefox blocks WOT completely, in an attempt to protect users against malicious activity. David Bisson reports. ]]> 2017-01-26T17:37:59+00:00 https://www.grahamcluley.com/firefox-flags-web-of-trust-add-on-as-suspicious-blocks-by-default/ www.secnews.physaphae.fr/article.php?IdArticle=300948 False None None None Graham Cluley - Blog Security Smashing Security #005: \'Upskirt insecurity\' Smashing Security #005: 'Upskirt insecurity'Join me and fellow computer security industry veterans Vanja Svajcer and Carole Theriault as we have another casual chat about whatever is on our minds. This week: An alleged hacker finds the downside to car rental, a New York Times Twitter account announces Vladimir Putin is planning to launch a missile attack against the United States, and an "upskirt" website leaks its user data. Oh, and Vanja forces Graham to share an embarrassing privacy-breaching lavatory anecdote. ]]> 2017-01-26T12:53:36+00:00 https://www.grahamcluley.com/smashing-security-005-upskirt-insecurity/ www.secnews.physaphae.fr/article.php?IdArticle=300516 False None None None Graham Cluley - Blog Security 218,000 private unencrypted AlphaBay dark web messages exposed 218,000 private unencrypted AlphaBay dark web messages exposedSomeone has exploited a vulnerability to view 218,000 private unencrypted messages exchanged by users of the AlphaBay dark web marketplace. David Bisson reports. ]]> 2017-01-25T17:38:30+00:00 https://www.grahamcluley.com/218000-private-unencrypted-alphabay-dark-web-messages-exposed/ www.secnews.physaphae.fr/article.php?IdArticle=300138 False None None None Graham Cluley - Blog Security Corporations at risk of malware attack via Cisco\'s WebEx Chrome extension Corporations at risk of malware attack via Cisco's WebEx Chrome extensionA warning has been issued that companies who have installed the popular Cisco WebEx extension on Chrome could have opened themselves up to malicious attacks. Read more in my article on the Bitdefender Business Insights blog. ]]> 2017-01-25T13:51:10+00:00 http://businessinsights.bitdefender.com/cisco-webex-chrome-extension www.secnews.physaphae.fr/article.php?IdArticle=299714 False None None None Graham Cluley - Blog Security Graham Cluley nominated for most entertaining security blog. Please vote! Graham Cluley nominated for most entertaining security blog. Please vote!The Security Blogger Awards are open for the public to vote - so please do vote for your favourite blogs (even if it's not this one!) and show your support. ]]> 2017-01-25T02:56:51+00:00 https://www.grahamcluley.com/graham-cluley-nominated-for-most-entertaining-security-blog/ www.secnews.physaphae.fr/article.php?IdArticle=299346 False None None None Graham Cluley - Blog Security Internet gang claims it caused Lloyds Bank outage via a DDoS attack Internet gang claims it caused Lloyds Bank outage via a DDoS attackAn internet gang claims it used a distributed denial-of-service (DDoS) attack to interrupt services at the Lloyds Banking Group earlier this month. David Bisson reports. ]]> 2017-01-25T00:12:34+00:00 https://www.grahamcluley.com/internet-gang-claims-caused-lloyds-bank-outage-via-ddos-attack/ www.secnews.physaphae.fr/article.php?IdArticle=299347 False None None None Graham Cluley - Blog Security Yahoo sale to Verizon delayed, following revelation of massive security breaches Yahoo sale to Verizon delayed, following revelation of massive security breachesIf you're in the business of scooping up another company, you probably want to uncover all of its dirty little secrets before you hand over any cash. ]]> 2017-01-24T15:12:53+00:00 https://www.grahamcluley.com/yahoo-sale-verizon-delayed-following-revelation-massive-security-breaches/ www.secnews.physaphae.fr/article.php?IdArticle=299348 False None Yahoo None Graham Cluley - Blog Security Heartbleed is not dead. And isn\'t likely to be any time soon Heartbleed is not deadThe people who cared about fixing their systems against the Heartbleed vulnerability did it long ago. The others simply don't give a damn. ]]> 2017-01-23T17:11:20+00:00 https://www.grahamcluley.com/heartbleed-not-dead-isnt-likely-time-soon/ www.secnews.physaphae.fr/article.php?IdArticle=298141 False None None None Graham Cluley - Blog Security Bug allowed attackers to delete ANY Facebook video they chose Bug allowed attackers to delete ANY Facebook video they choseFacebook has patched a vulnerability that attackers could have abused to delete any user's video off the social media platform. David Bisson reports. ]]> 2017-01-23T15:57:35+00:00 https://www.grahamcluley.com/bug-allowed-attackers-delete-facebook-video-chose/ www.secnews.physaphae.fr/article.php?IdArticle=298142 False None None None Graham Cluley - Blog Security Twitter hack sees New York Times warn of Russian missile strike against USA Twitter hack sees New York Times warn of Russian missile strike against USAVladimir Putin is planning a missile strike on the United States? Hold your horses, it's the latest example of a newspaper having one of its Twitter accounts hacked. ]]> 2017-01-23T10:41:27+00:00 https://www.grahamcluley.com/twitter-hack-sees-new-york-times-warn-of-russian-missile-strike-against-united-states/ www.secnews.physaphae.fr/article.php?IdArticle=297307 False None None None Graham Cluley - Blog Security Employment scam targets college students and their bank accounts Employment scam targets college students and their bank accountsA scam is tricking college students into depositing fraudulent checks into their bank accounts with the promise of employment. David Bisson reports. ]]> 2017-01-22T21:21:11+00:00 https://www.grahamcluley.com/employment-scam-targeting-college-students-bank-accounts/ www.secnews.physaphae.fr/article.php?IdArticle=296937 False None None None Graham Cluley - Blog Security Smashing Security #004: \'You don\'t mess with Brian Krebs\' Smashing Security #004: 'You don't mess with Brian Krebs'Join me and fellow computer security industry veterans Vanja Svajcer and Carole Theriault as we have another casual chat about whatever is on our minds. This week: the Spora ransomware that offers you more than just your encrypted files back, Brian Krebs busts the alleged masterminds behind the Mirai botnet, and be careful that your IT staff aren't the only ones who know your corporate passwords. Oh, and we're now a podcast as well as a video... :) ]]> 2017-01-19T23:39:48+00:00 https://www.grahamcluley.com/smashing-security-004-dont-mess-brian-krebs/ www.secnews.physaphae.fr/article.php?IdArticle=296118 False None None None Graham Cluley - Blog Security Bring down the White House\'s website for Trump\'s inauguration, urges software engineer Whitehouse flag thumbA software engineer is urging anyone and everyone opposed to the President-Elect to overload Whitehouse.gov on Donald Trump's inauguration day. David Bisson reports. ]]> 2017-01-19T23:12:34+00:00 https://www.grahamcluley.com/white-house-ddos-trump/ www.secnews.physaphae.fr/article.php?IdArticle=296119 False None None None Graham Cluley - Blog Security Samsung SmartCam owners warned of hacker hijack vulnerability Samsung SmartCam owners warned of hacker hijack vulnerabilityA group of security researchers have uncovered a critical security hole in Samsung SmartCam devices that could allow malicious hackers to remotely seize complete control of cameras, and run malicious code. Read more in my article on the Bitdefender blog. ]]> 2017-01-19T17:03:51+00:00 https://www.bitdefender.com/box/blog/smart-home/samsung-smartcam-owners-warned-hacker-hijack-vulnerability/ www.secnews.physaphae.fr/article.php?IdArticle=296120 False None None None Graham Cluley - Blog Security Remote code execution vulnerability affecting Facebook\'s servers earns researcher $40,000 Facebook vulnerability earns researcher $40,000Facebook has awarded US $40,000 to a security researcher who achieved remote code execution on its servers by exploiting a widely-publicised vulnerability. David Bisson reports. ]]> 2017-01-18T16:51:48+00:00 https://www.grahamcluley.com/facebook-remote-code-execution-vulnerability-earns-researcher-40000/ www.secnews.physaphae.fr/article.php?IdArticle=294939 False None None None Graham Cluley - Blog Security Not lovin\' it! Researcher finds way to steal McDonald\'s users\' passwords Mcdonalds thumbA security researcher has discovered two vulnerabilities that allow an attacker to steal users' passwords from McDonald's official website. David Bisson reports. ]]> 2017-01-18T14:09:12+00:00 https://www.grahamcluley.com/steal-mcdonalds-user-passwords/ www.secnews.physaphae.fr/article.php?IdArticle=294940 False None None None Graham Cluley - Blog Security If you\'re going to use Windows, it makes security sense to use Windows 10 If you're going to use Windows, it makes security sense to use Windows 10Wouldn't it be great if modern operating systems hardened their defences, and did a better job in the first place at protecting against these types of security issues even when they are unknown? Read more in my article on the Hot for Security blog. ]]> 2017-01-18T13:22:09+00:00 https://hotforsecurity.bitdefender.com/blog/if-youre-going-to-use-windows-it-makes-security-sense-to-use-windows-10-17546.html www.secnews.physaphae.fr/article.php?IdArticle=294498 False None None 4.0000000000000000 Graham Cluley - Blog Security It makes good security sense to change Alexa\'s name - here\'s how It makes good security sense to change Alexa's name - here's howWaking your Alexa device should be as hard for an unauthorised party to do as guessing your password. ]]> 2017-01-17T14:50:44+00:00 https://www.grahamcluley.com/change-alexa-name/ www.secnews.physaphae.fr/article.php?IdArticle=293996 False None None None Graham Cluley - Blog Security Facebook took two weeks to remove video of 12-year-old girl that livestreamed her suicide Facebook took two weeks to remove video of 12-year-old girl that livestreamed her suicideFacebook needs to do more to prevent links to disturbing content from being shared widely across its network. ]]> 2017-01-17T13:27:25+00:00 https://www.grahamcluley.com/facebook-took-two-weeks-remove-video-12-year-old-girl-livestreamed-suicide/ www.secnews.physaphae.fr/article.php?IdArticle=293696 False None None None Graham Cluley - Blog Security Is your IP security camera making you less secure? Is your IP security camera making you less secure?As I see it, you buy a security camera to secure yourself. You don't, imagine, install an IP surveillance camera to introduce new security risks. Read more in my article on the Hot for Security blog. ]]> 2017-01-17T10:13:38+00:00 https://hotforsecurity.bitdefender.com/blog/is-your-ip-security-camera-making-you-less-secure-17534.html www.secnews.physaphae.fr/article.php?IdArticle=293697 False None None None Graham Cluley - Blog Security Top tips (not including anti-virus) for protecting your Android from malware Top tips (not including anti-virus) for protecting your Android from malwareHow to defend what Apple's Tim Cook called "a toxic hellstew of vulnerabilities." Guest contributor Yasin Soliman reports. ]]> 2017-01-17T00:20:36+00:00 https://www.grahamcluley.com/top-tips-not-including-anti-virus-for-protecting-your-android-from-malware/ www.secnews.physaphae.fr/article.php?IdArticle=293198 False None None None Graham Cluley - Blog Security I love podcasts so much, I took a deep breath and made one... Smashing security box thumbI don't know what I'm doing, but I hope you like it. At least you don't have to look at me now it's in podcast form. ]]> 2017-01-16T17:51:05+00:00 https://www.grahamcluley.com/love-podcasts-much-took-deep-breath-made-one/ www.secnews.physaphae.fr/article.php?IdArticle=293199 False None None None Graham Cluley - Blog Security Facebook\'s new public Wi-Fi locator is raising privacy concerns Facebook's new public Wi-Fi locator is raising privacy concernsFacebook is testing a new feature that helps users find nearby public Wi-Fi networks, but it's unclear whether its tool undermines users' privacy. David Bisson reports. ]]> 2017-01-16T15:19:46+00:00 https://www.grahamcluley.com/facebooks-new-public-wi-fi-locator-raising-privacy-concerns/ www.secnews.physaphae.fr/article.php?IdArticle=293200 False None None None Graham Cluley - Blog Security Wandera has uncovered severe mobile data exposures that affect a high proportion of enterprises. Try it now for free. Wandera has uncovered a number of severe mobile data exposures that affect a high proportion of enterprises. Try it now for free.Graham Cluley Security News is sponsored this week by the folks at Wandera. Thanks to the great team there for their support! Wandera's 2017 Mobile Leak Report found more than 200 mobile websites and apps leaking personally identifiable information across a range of categories – including those that are essential for work. Your employees might have been exposed to credit card theft, identity theft, or even the re-use of login credentials to access a corporate network. Read the 2017 Mobile Leak Report to see which types of apps present the highest risk to your sensitive corporate data. Mobile is indisputably the new frontier for cyber threats, as adoption of corporate mobility continues to grow, so too does the number of attacks. Businesses have become increasingly exposed to new threats, vulnerabilities and data leaks. Wandera provides enterprise-grade threat defense against these mobile security risks, keeping devices secure across all four levels of protection as identified by Gartner. Try Wandera for free to assess and understand what is happening with your mobile data. Wandera works with some of the biggest and best-loved brands in the world. Find out how your business could also benefit by having devices protected and managed at the data-level.
If you're interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here. ]]>
2017-01-16T13:38:32+00:00 https://www.grahamcluley.com/feed-sponsor-wandera/ www.secnews.physaphae.fr/article.php?IdArticle=292342 False None None None
Graham Cluley - Blog Security WhatsApp vulnerability could allow Facebook and others to read messages WhatsApp vulnerability could allow Facebook and others to read messagesA security issue could allow Facebook and other parties to intercept and read the messages you send via WhatsApp. David Bisson reports. ]]> 2017-01-14T13:40:29+00:00 https://www.grahamcluley.com/vulnerability-allows-facebook-others-to-read-your-whatsapp-messages/ www.secnews.physaphae.fr/article.php?IdArticle=291990 False None None None Graham Cluley - Blog Security Don\'t follow the example of Donald Trump\'s choice for cybersecurity czar Don't follow the example of Donald Trump's choice for cybersecurity czarTwo days is a long time in cybersecurity for Rudy Giuliani. ]]> 2017-01-13T14:01:28+00:00 https://www.grahamcluley.com/dont-follow-example-donald-trumps-choice-cybersecurity-czar/ www.secnews.physaphae.fr/article.php?IdArticle=291615 False None None None Graham Cluley - Blog Security Podcast on ransomware\'s threat to the healthcare industry Podcast on ransomware's threat to the healthcare industryThe Fight Ransomware podcast invited me onto their show to discuss how heathcare organisations are fighting the ransomware threat. Give it a listen. ]]> 2017-01-13T13:17:17+00:00 https://www.grahamcluley.com/podcast-ransomwares-threat-healthcare-industry/ www.secnews.physaphae.fr/article.php?IdArticle=291616 False None None None Graham Cluley - Blog Security Smashing Security #003: \'Alexa! Get me an axe!\' Smashing Security #003: 'Alexa! Get me an axe!'Join me and fellow computer security industry veterans Vanja Svajcer and Carole Theriault as we have another casual video chat about whatever is on our minds. This week: Donald Trump and *that* secret dossier, MongoDB databases under attack, Microsoft employees suffering from PTSD, and Alexa buying doll houses. ]]> 2017-01-12T22:42:00+00:00 https://www.grahamcluley.com/smashing-security-003-alexa-get-axe/ www.secnews.physaphae.fr/article.php?IdArticle=291205 False None None None Graham Cluley - Blog Security Vawtrak malware spread via toxic Word documents is still a thing apparently Vawtrak malware spread via toxic Word documents is still a thing apparentlyBeware poisoned parking tickets! David Bisson reports. ]]> 2017-01-12T15:04:42+00:00 https://www.grahamcluley.com/vawtrak-malware-spread-via-toxic-word-documents-is-still-a-thing-apparently/ www.secnews.physaphae.fr/article.php?IdArticle=291206 False None None None Graham Cluley - Blog Security Honeytraps used to infect Israeli soldiers\' smartphones with spyware Honeytraps used to infect Israeli soldiers' smartphones with spywareBogus social networking profiles of young, attractive women are being used to trick soldiers into installing malicious spyware on their smartphones. ]]> 2017-01-12T14:17:16+00:00 https://www.grahamcluley.com/honeytraps-used-infect-israeli-soldiers-smartphones-spyware/ www.secnews.physaphae.fr/article.php?IdArticle=291208 False None None None Graham Cluley - Blog Security Donald Trump finally believes Russia hacked the DNC Donald Trump finally believes Russia hacked the DNCIt's been an extraordinary couple of weeks in the ongoing media tornado that US President-Elect Donald Trump finds himself in related to just who hacked the US Democratic party and released swathes of confidential email correspondence to WikiLeaks. ]]> 2017-01-12T01:46:27+00:00 https://www.grahamcluley.com/donald-trump-finally-believes-russia-hacked-dnc/ www.secnews.physaphae.fr/article.php?IdArticle=290441 False None None None Graham Cluley - Blog Security Airline passengers\' bookings and info leaked by boarding gate displays Airline passengers' bookings and info leaked by boarding gate displaysBoarding gate displays at an airport leaked information that could have allowed attackers to gain access to passengers' bookings and their personal details. David Bisson reports. ]]> 2017-01-11T15:28:42+00:00 https://www.grahamcluley.com/airline-passengers-bookings-and-info-leaked-by-boarding-gate-displays/ www.secnews.physaphae.fr/article.php?IdArticle=290442 False None None None Graham Cluley - Blog Security Hello Kitty, Goodbye database containing 3.3 million users credentials Hello Kitty, Goodbye database containing 3.3 million users credentialsA database of 3,345,168 Hello Kitty fans has surfaced online, stemming from a misconfigured Sanrio user database that was accessible to anyone in the world. Read more in my article on the Hot for Security blog. ]]> 2017-01-11T13:43:17+00:00 https://hotforsecurity.bitdefender.com/blog/hello-kitty-goodbye-database-containing-3-3-million-users-credentials-17501.html www.secnews.physaphae.fr/article.php?IdArticle=289956 False None None None Graham Cluley - Blog Security Netflix users targeted by credit card phishing scheme Netflix users targeted by credit card phishing schemeA new phishing scheme is targeting Netflix users for their credit card details and other personal information. David Bisson reports. ]]> 2017-01-10T22:33:15+00:00 https://www.grahamcluley.com/netflix-users-targeted-credit-card-phishing-scheme/ www.secnews.physaphae.fr/article.php?IdArticle=289489 False None None None Graham Cluley - Blog Security Ransomware extorts Los Angeles school to the tune of $28,000 Ransomware extorts Los Angeles school to the tune of $28,000Blackmailers have claimed another scalp, extorting US $28,000 from a school hit by a ransomware attack. Read more in my article on the Hot for Security blog. ]]> 2017-01-10T14:03:21+00:00 https://hotforsecurity.bitdefender.com/blog/ransomware-extorts-los-angeles-school-to-the-tune-of-28000-17489.html www.secnews.physaphae.fr/article.php?IdArticle=289491 False None None None Graham Cluley - Blog Security Onion Browser goes free for privacy-conscious iOS users, citing \'recent events\' Free Onion BrowserFor over four years mobile app developer and privacy journalist Mike Tigas has been selling his browser which encrypts and tunnels users' web traffic through the Tor network. And now he's made it free. ]]> 2017-01-10T00:24:48+00:00 https://www.grahamcluley.com/onion-browser-goes-free-privacy-conscious-ios-users-citing-recent-events/ www.secnews.physaphae.fr/article.php?IdArticle=288558 False None None None Graham Cluley - Blog Security 27,000 MongoDB servers have their data wiped, receive ransom demand for its safe return 27,000 MongoDB servers have their data wiped, receive ransom demand for its safe returnTens of thousands of unprotected MongoDB databases have been taken hostage by hackers, who have wiped data from company servers and are demanding a ransom be paid for the safe return of the information. Ouch. Here's what you need to know. ]]> 2017-01-09T23:40:58+00:00 https://www.grahamcluley.com/27000-mongodb-servers-data-wiped-receive-ransom-demand-safe-return/ www.secnews.physaphae.fr/article.php?IdArticle=288559 False None None None