www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-20T19:00:02+00:00 www.secnews.physaphae.fr Security Affairs - Blog Secu Unsigned Firmware running on peripherals could expose Windows, Linux systems to hack 2020-02-18T15:50:04+00:00 https://securityaffairs.co/wordpress/98079/hacking/unsigned-firmware-hack.html www.secnews.physaphae.fr/article.php?IdArticle=1549439 False Hack None None Security Affairs - Blog Secu Hacking IoT devices with Focaccia-Board: A Multipurpose Breakout Board to hack hardware in a clean and easy way! 2020-02-18T13:50:52+00:00 https://securityaffairs.co/wordpress/98052/hacking/hacking-iot-focaccia-board.html www.secnews.physaphae.fr/article.php?IdArticle=1549189 False Hack None None Security Affairs - Blog Secu Flaw in WordPress ThemeGrill Demo Importer WordPress theme plugin expose 200K+ sites to hack 2020-02-18T06:25:37+00:00 https://securityaffairs.co/wordpress/98032/hacking/themegrill-demo-importer-wordpress-flaw.html www.secnews.physaphae.fr/article.php?IdArticle=1548389 False Hack,Vulnerability None None Security Affairs - Blog Secu IDF soldiers tricked into installing malicious apps by Hamas operatives posing as attractive women 2020-02-17T11:15:57+00:00 https://securityaffairs.co/wordpress/97978/hacking/idf-hamas-attacks.html www.secnews.physaphae.fr/article.php?IdArticle=1546359 False Hack None None Security Affairs - Blog Secu Fox Kitten Campaign – Iranian hackers exploit 1-day VPN flaws in attacks 2020-02-17T06:07:10+00:00 https://securityaffairs.co/wordpress/97957/apt/fox-kitten-campaign-vpn-bugs.html www.secnews.physaphae.fr/article.php?IdArticle=1546018 True Hack None None Hacking Articles - Blog de Raj Chandel Hack the Box: Writeup Walkthrough Continue reading → ]]> 2020-02-17T06:06:58+00:00 https://www.hackingarticles.in/hack-the-box-writeup-walkthrough/ www.secnews.physaphae.fr/article.php?IdArticle=1546028 False Hack None None ZD Net - Magazine Info Iranian hackers have been hacking VPN servers to plant backdoors in companies around the world 2020-02-16T20:53:00+00:00 https://www.zdnet.com/article/iranian-hackers-have-been-hacking-vpn-servers-to-plant-backdoors-in-companies-around-the-world/#ftag=RSSbaffb68 www.secnews.physaphae.fr/article.php?IdArticle=1545395 False Hack None None ZD Net - Magazine Info IOTA cryptocurrency shuts down entire network after wallet hack 2020-02-16T01:39:27+00:00 https://www.zdnet.com/article/iota-cryptocurrency-shuts-down-entire-network-after-wallet-hack/#ftag=RSSbaffb68 www.secnews.physaphae.fr/article.php?IdArticle=1543933 False Hack,Vulnerability None None Malwarebytes Labs - MalwarebytesLabs Misleading cybersecurity lessons from pop culture: how Hollywood teaches to hack We take a look at some of the most famous (or infamous) hacking scenes from TV and movies and the cybersecurity lessons, if any, we can learn from them. Categories: Awareness Tags: (Read more...) ]]> 2020-02-14T17:32:10+00:00 https://blog.malwarebytes.com/awareness/2020/02/misleading-cybersecurity-lessons-from-pop-culture-how-hollywood-teaches-to-hack/ www.secnews.physaphae.fr/article.php?IdArticle=1541371 False Hack,Guideline None 2.0000000000000000 Security Affairs - Blog Secu Three Italian universities hacked by LulzSec_ITA collective 2020-02-13T19:49:11+00:00 https://securityaffairs.co/wordpress/97802/breaking-news/lulzsec-ita-hacked-italian-universities.html www.secnews.physaphae.fr/article.php?IdArticle=1539707 False Hack None None Tech Worm - Desc Emotet Malware Can Now Spread Through Wi-Fi Networks 2020-02-13T15:53:22+00:00 https://www.techworm.net/2020/02/emotet-malware-spread-wi-fi-networks.html www.secnews.physaphae.fr/article.php?IdArticle=1539374 False Malware,Hack None None Graham Cluley - Blog Security China denies it was behind the Equifax hack, as four men charged for data breach 2020-02-11T15:52:00+00:00 https://www.grahamcluley.com/china-denies-it-was-behind-the-equifax-hack-as-four-men-charged-for-data-breach/ www.secnews.physaphae.fr/article.php?IdArticle=1535714 False Data Breach,Hack Equifax None 01net. Actualites - Securite - Magazine Francais Les Etats-Unis inculpent des agents chinois pour l\'un des plus gros piratages de l\'histoire ]]> 2020-02-11T11:24:16+00:00 https://www.01net.com/actualites/les-etats-unis-inculpent-des-agents-chinois-pour-l-un-des-plus-gros-piratages-de-l-histoire-1855961.html www.secnews.physaphae.fr/article.php?IdArticle=1535140 False Hack Equifax None Security Affairs - Blog Secu The Altsbit exchange will exit in May following a hack 2020-02-11T08:12:37+00:00 https://securityaffairs.co/wordpress/97622/cyber-crime/altsbit-exchange-hacked-exit.html www.secnews.physaphae.fr/article.php?IdArticle=1534952 False Hack None None Krebs on Security - Chercheur Américain U.S. Charges 4 Chinese Military Officers in 2017 Equifax Hack 2020-02-11T03:25:52+00:00 https://krebsonsecurity.com/2020/02/u-s-charges-4-chinese-military-officers-in-2017-equifax-hack/ www.secnews.physaphae.fr/article.php?IdArticle=1534680 True Hack Equifax None Wired Threat Level - Security News How 4 Chinese Hackers Allegedly Took Down Equifax 2020-02-10T17:52:32+00:00 https://www.wired.com/story/equifax-hack-china www.secnews.physaphae.fr/article.php?IdArticle=1533996 False Hack Equifax None BBC - BBC News - Technology Equifax: US charges four Chinese military officers over huge hack 2020-02-10T17:00:03+00:00 https://www.bbc.co.uk/news/world-us-canada-51449778 www.secnews.physaphae.fr/article.php?IdArticle=1533954 False Hack Equifax None ZD Net - Magazine Info DOJ charges four Chinese military hackers for Equifax hack 2020-02-10T15:19:00+00:00 https://www.zdnet.com/article/doj-charges-four-chinese-military-hackers-for-equifax-hack/#ftag=RSSbaffb68 www.secnews.physaphae.fr/article.php?IdArticle=1533764 False Hack Equifax None ZD Net - Magazine Info Altsbit plans exit after hack leaves cryptocurrency exchange out of pocket 2020-02-10T12:46:58+00:00 https://www.zdnet.com/article/altsbit-says-hack-has-left-the-cryptocurrency-exchange-with-next-to-no-funds/#ftag=RSSbaffb68 www.secnews.physaphae.fr/article.php?IdArticle=1533676 False Hack None None InformationSecurityBuzzNews - Site de News Securite Expert Reaction On Translink Report Suspected IT Hack To The Police Expert Reaction On Translink Report Suspected IT Hack To The Police]]> 2020-02-10T10:27:24+00:00 https://www.informationsecuritybuzz.com/expert-comments/expert-reaction-on-translink-report-suspected-it-hack-to-the-police/ www.secnews.physaphae.fr/article.php?IdArticle=1533354 False Hack None 4.0000000000000000 InformationSecurityBuzzNews - Site de News Securite Breaking Commentary: Phishing Emails Targeting Mobile Devices To Hack Banking Apps Breaking Commentary: Phishing Emails Targeting Mobile Devices To Hack Banking Apps]]> 2020-02-10T10:10:27+00:00 https://www.informationsecuritybuzz.com/expert-comments/breaking-commentary-phishing-emails-targeting-mobile-devices-to-hack-banking-apps/ www.secnews.physaphae.fr/article.php?IdArticle=1533358 False Hack None None IT Security Guru - Blog Sécurité Customers wanting answers on parcel delivery delays due to Toll transport hack 2020-02-10T10:09:30+00:00 https://www.itsecurityguru.org/2020/02/10/customers-wanting-answers-on-parcel-delivery-delays-due-to-toll-transport-hack/?utm_source=rss&utm_medium=rss&utm_campaign=customers-wanting-answers-on-parcel-delivery-delays-due-to-toll-transport-hack www.secnews.physaphae.fr/article.php?IdArticle=1533386 False Hack None None IT Security Guru - Blog Sécurité Cleaners used by cyber criminals to hack businesses 2020-02-10T10:08:07+00:00 https://www.itsecurityguru.org/2020/02/10/cleaners-used-by-cyber-criminals-to-hack-businesses/?utm_source=rss&utm_medium=rss&utm_campaign=cleaners-used-by-cyber-criminals-to-hack-businesses www.secnews.physaphae.fr/article.php?IdArticle=1533387 False Hack None None Tech Worm - Desc Critical Bluetooth Bug Hacks Android Devices [Here\'s How To Patch It] 2020-02-10T05:09:44+00:00 https://www.techworm.net/2020/02/bluetooth-hacks-android-devices.html www.secnews.physaphae.fr/article.php?IdArticle=1533133 False Malware,Hack None None Bleeping Computer - Magazine Américain Bug in Philips Smart Light Allows Hopping to Devices on the Network 2020-02-06T00:03:35+00:00 https://www.bleepingcomputer.com/news/security/bug-in-philips-smart-light-allows-hopping-to-devices-on-the-network/ www.secnews.physaphae.fr/article.php?IdArticle=1527913 False Hack None None Tech Worm - Desc Man Uses 99 Smartphones To Hack Google Maps And Create Fake \'Traffic Jam\' 2020-02-04T15:17:35+00:00 https://www.techworm.net/2020/02/smartphones-hack-google-maps-traffic-jam.html www.secnews.physaphae.fr/article.php?IdArticle=1524228 False Hack None None Graham Cluley - Blog Security Man admits hacking Nintendo, leaking details of Switch games console 2020-02-04T11:21:23+00:00 https://hotforsecurity.bitdefender.com/blog/man-admits-hacking-nintendo-leaking-details-of-switch-games-console-22223.html#new_tab www.secnews.physaphae.fr/article.php?IdArticle=1523771 False Hack None None InformationSecurityBuzzNews - Site de News Securite Cleaners Used To Hack Businesses Cleaners Used To Hack Businesses]]> 2020-02-04T10:37:46+00:00 https://www.informationsecuritybuzz.com/expert-comments/cleaners-used-to-hack-businesses/ www.secnews.physaphae.fr/article.php?IdArticle=1523628 False Hack,Guideline None None Network World - Magazine Info The problem with mobile and app voting 2020-02-04T09:24:00+00:00 https://www.networkworld.com/video/100959/the-problem-with-mobile-and-app-voting#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=1524530 False Hack,Guideline None None Security Affairs - Blog Secu Police are warning crooks are using cleaners to compromise businesses 2020-02-03T15:12:24+00:00 https://securityaffairs.co/wordpress/97254/cyber-crime/crooks-using-cleaners-hack-firms.html www.secnews.physaphae.fr/article.php?IdArticle=1522724 False Hack None None Graham Cluley - Blog Security Did Everton sign Everton? Twitter hack blamed for soccer sign-up screwup 2020-02-03T14:07:58+00:00 https://www.grahamcluley.com/everton-soares-twitter-hack/ www.secnews.physaphae.fr/article.php?IdArticle=1522883 False Hack None None 01net. Actualites - Securite - Magazine Francais Le pirate à l\'origine des fuites sur la Switch risque 25 ans de prison... mais pas à cause de son hack ]]> 2020-02-03T12:44:43+00:00 https://www.01net.com/actualites/le-pirate-a-l-origine-des-fuites-sur-la-switch-risque-25-ans-de-prison-mais-pas-a-cause-de-son-hack-1851393.html www.secnews.physaphae.fr/article.php?IdArticle=1523580 False Hack None None Graham Cluley - Blog Security €13 million Maltese bank cyber-heist – six men arrested in UK 2020-01-31T15:16:33+00:00 https://www.grahamcluley.com/e13-million-maltese-bank-cyber-heist-six-men-arrested-in-uk/ www.secnews.physaphae.fr/article.php?IdArticle=1520577 False Hack None None Security Affairs - Blog Secu Over 200K WordPress sites potentially exposed to hack due to Code Snippets flaw 2020-01-30T13:56:29+00:00 https://securityaffairs.co/wordpress/97037/hacking/code-snippets-plugin-csrf-flaw.html www.secnews.physaphae.fr/article.php?IdArticle=1518360 False Hack None None Darknet - The Darkside - Site de news Américain Cameradar – Hack RTSP Video Surveillance CCTV Cameras Cameradar – Hack RTSP Video Surveillance CCTV CamerasCameradar is a Go-based tool to hack RTSP Video Surveillance CCTV Cameras, it can detect open RTSP hosts, detect device models and launch automated attacks. The main features of Cameradar are: Detect open RTSP hosts on any accessible target host Detect which device model is streaming Launch automated dictionary attacks to get their stream route (e.g.: /live.sdp) Launch automated dictionary attacks to get the username and password of the cameras Retrieve a complete and user-friendly report of the results Using Cameradar to Hack RTSP Video Cameras "-t, --targets": Set target. Read the rest of Cameradar – Hack RTSP Video Surveillance CCTV Cameras now! Only available at Darknet. ]]> 2020-01-29T09:27:23+00:00 https://www.darknet.org.uk/2020/01/cameradar-hack-rtsp-video-surveillance-cctv-cameras/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed www.secnews.physaphae.fr/article.php?IdArticle=1516515 False Hack,Tool None None Errata Security - Errata Security There\'s no evidence the Saudis hacked Jeff Bezos\'s iPhone public report behind the U.N.'s accusations. That report failed to find evidence proving the theory, but instead simply found unknown things it couldn't explain, which it pretended was evidence.This is a common flaw in such forensics reports. When there's evidence, it's usually found and reported. When there's no evidence, investigators keep looking. Todays devices are complex, so if you keep looking, you always find anomalies you can't explain. There's only two results from such investigations: proof of bad things or anomalies that suggest bad things. There's never any proof that no bad things exist (at least, not in my experience).Bizarre and inexplicable behavior doesn't mean a hacker attack. Engineers trying to debug problems, and support technicians helping customers, find such behavior all the time. Pretty much every user of technology experiences this. Paranoid users often think there's a conspiracy against them when electronics behave strangely, but "behaving strangely" is perfectly normal.When you start with the theory that hackers are involved, then you have an explanation for the all that's unexplainable. It's all consistent with the theory, thus proving it. This is called "confirmation bias". It's the same thing that props up conspiracy theories like UFOs: space aliens can do anything, thus, anything unexplainable is proof of space aliens. Alternate explanations, like skunkworks testing a new jet, never seem as plausible.The investigators were hired to confirm bias. Their job wasn't to do an unbiased investigation of the phone, but instead, to find evidence confirming the suspicion that the Saudis hacked Bezos.Remember the story started in February of 2019 when the National Inquirer tried to extort Jeff Bezos with sexts between him and his paramour Lauren Sanchez. Bezos immediately accused the Saudis of being involved. Even after it was revealed that the sexts came from Michael Sanchez, the paramour's brother, Bezos's team double-downed on their accusations the Saudi's hacked Bezos's phone.The FTI report tells a story beginning with Saudi Crown Prince sending Bezos a message using WhatsApp containing a video. The story goes:The downloader that delivered the 4.22MB video was encrypted, delaying or preventing further study of the code delivered along with the video. It should be noted that the encrypted WhatsApp file sent from MBS' account was slightly larger than the video itself.This story is invalid. Such messages use end-to-end encryption, which means that while nobody in between can decrypt them (not even WhatsApp), anybody with possession of the ends can. That's how the technology is supposed to work. If Bezos loses/breaks his phone and needs to restore a backup onto a new phone, the backup needs to have the keys used to decrypt the WhatsApp messages.Thus, the forensics image taken by the investigators had the necessary keys to decrypt the video -- the investigators simply didn't know about them. In a previous blogpost I explain these magical WhatsApp keys and where to find them so that anybody, even you at home, can forensics their own iPhone, retrieve these keys, and decrypt their own videos.]]> 2020-01-28T16:53:00+00:00 https://blog.erratasec.com/2020/01/theres-no-evidence-saudis-hacked-jeff.html www.secnews.physaphae.fr/article.php?IdArticle=1515208 False Hack Uber None Errata Security - Errata Security How to decrypt WhatsApp end-to-end media files End-to-end encrypted downloaderThe FTI report says that within hours of receiving a suspicious video that Bezos's iPhone began behaving strangely. The report says:...analysis revealed that the suspect video had been delivered via an encrypted downloader host on WhatsApp's media server. Due to WhatsApp's end-to-end encryption, the contents of the downloader cannot be practically determined. The phrase "encrypted downloader" is not a technical term but something the investigators invented. It sounds like a term we use in malware/viruses, where a first stage downloads later stages using encryption. But that's not what happened here.Instead, the file in question is simply the video itself, encrypted, with a few extra bytes due to encryption overhead (10 bytes of checksum at the start, up to 15 bytes of padding at the end).Now let's talk about "end-to-end encryption". This only means that those in middle can't decrypt the file, not even WhatsApp's servers. But those on the ends can -- and that's what we have here, one of the ends. Bezos can upgrade his old iPhone X to a new iPhone XS by backing up the old phone and restoring onto the new phone and still decrypt the video. That means the decryption key is somewhere in the backup.Specifically, the decryption key is in the file named 7c7fba66680ef796b916b067077cc246adacf01d in the backup, in the table named ZWAMDIAITEM, as the first protobuf field in the field named ZMEDIAKEY. These details are explained below.WhatsApp end-to-end encryption of videoLet's discuss how videos are transmitted using text messages.We'll start with SMS, the old messaging system built into the phone system that predates modern apps. It can only send short text messages of a few hundred bytes at a time. These messages are too small to hold a complete video many megabytes in size. They are sent through the phone system itself, not via the Internet.When you send a video via SMS what happens is that the video is uploaded to the phone company's servers via HTTP. Then, a text message is sent with a URL link to the video. When the recipient gets the message, their phone downloads the video from the URL. The text messages going through the phone system just contain the URL, an Internet connection is used to transfer the video.This happens transparently to the user. The user just sees the video and not the URL. They'll only notice a difference when using ancient 2G mobile phones that can get the SMS messages but which can't actually connect to the Internet.A similar thing happens with WhatsApp, only with encryption added.The sender first encryp]]> 2020-01-28T14:24:42+00:00 https://blog.erratasec.com/2020/01/how-to-decrypt-whatsapp-end-to-end.html www.secnews.physaphae.fr/article.php?IdArticle=1514927 False Malware,Hack,Tool None None InformationSecurityBuzzNews - Site de News Securite Zoom Updates Security As Eavesdrop Hack Discovered By Check Point Research Zoom Updates Security As Eavesdrop Hack Discovered By Check Point Research]]> 2020-01-28T11:24:00+00:00 https://www.informationsecuritybuzz.com/study-research/zoom-updates-security-as-eavesdrop-hack-discovered-by-check-point-research/ www.secnews.physaphae.fr/article.php?IdArticle=1514130 False Hack None None BBC - BBC News - Technology Keeping your phone safe from prying eyes 2020-01-28T10:13:19+00:00 https://www.bbc.co.uk/news/technology-51178091 www.secnews.physaphae.fr/article.php?IdArticle=1513980 False Hack None None Hacking Articles - Blog de Raj Chandel Hack the Box- Jarvis Walkthrough Continue reading → ]]> 2020-01-27T17:31:09+00:00 https://www.hackingarticles.in/hack-the-box-jarvis-walkthrough/ www.secnews.physaphae.fr/article.php?IdArticle=1512547 False Hack None None Security Affairs - Blog Secu Chinese hackers exploited a Trend Micro antivirus zero-day used in Mitsubishi Electric hack 2020-01-25T13:21:43+00:00 https://securityaffairs.co/wordpress/96805/hacking/trend-micro-av-0day-mitsubishi-electric.html www.secnews.physaphae.fr/article.php?IdArticle=1509490 True Hack,Vulnerability None None Hacking Articles - Blog de Raj Chandel Hack the Box Challenge: Bitlab Walkthrough Continue reading → ]]> 2020-01-25T06:42:34+00:00 https://www.hackingarticles.in/hack-the-box-challenge-bitlab-walkthrough/ www.secnews.physaphae.fr/article.php?IdArticle=1509146 False Hack None None ZD Net - Magazine Info Trend Micro antivirus zero-day used in Mitsubishi Electric hack 2020-01-24T20:51:09+00:00 https://www.zdnet.com/article/trend-micro-antivirus-zero-day-used-in-mitsubishi-electric-hack/#ftag=RSSbaffb68 www.secnews.physaphae.fr/article.php?IdArticle=1508660 False Hack None None AlienVault Blog - AlienVault est un acteur de defense majeur dans les IOC Healthcare security: How can blockchain help? This is part 2 of a blog on healthcare security. For more info, check out part 1. An independent guest blogger wrote this blog. When it comes to data security, there is no more important place than the healthcare industry. When people go to the doctor, they provide all of their most sensitive information, from their health issues to their phone number, to a doctor they trust. When a medical office or database is hacked or damaged, and that information is released, it can be catastrophic to everyone involved. Patient security is not only good practice, but it is also the law. Guidelines are in place to protect patient data, and it is up to health professionals and administrators to ensure that proper protections are made. Here are some best practices for now and advanced security platforms to look forward to in the future. The rise of blockchain technology While the possibility of losing business and patient data through a system breakdown or employee error is a serious concern, the potential for cybercrime is perhaps the bigger threat. As technology advances, so do the methods that hackers use to infiltrate our systems. The result is a combination of threats from computer viruses to phishing attacks, which trick employees into clicking a link or attachment that opens a door into their computer’s infrastructure. From there, a hacker can sell the personal info that they obtain on the black market or use it to extort money from the unsuspecting patient. Since criminals have the ability to hack into health systems, an extra layer of security is needed: enter the blockchain. Instead of having patient information listed on an excel spreadsheet or an unsecured platform, this type of technology has information that is encrypted and entered into a chain that cannot be changed, deleted, or tampered with. All new information is verified against a ledger of previous events and cannot be modified unless it is deemed accurate. In addition to creating better security, blockchain also creates additional transparency for those receiving care. Since a patient would be one of the owners of the blockchain, they are able to monitor when new data is added or changed within their records and have a say in the decision. Blockchain also prevents the leakage of data when emailing or shipping patient records to a new provider, as the new office would need only an access key to view and add their own content. While this is a relatively new technology, it could prove to be a necessary one in the future. Safeguarding medical data Regardless of how data can be lost, it is essential that your medical office is proactive instead of reactive when it comes to a potential breakdown. The first step should always be to create an extensive risk analysis that not only assumes potential risks but also lists a plan of action if the unthinkable were to occur]]> 2020-01-23T14:00:00+00:00 https://feeds.feedblitz.com/~/617074756/0/alienvault-blogs~Healthcare-security-How-can-blockchain-help www.secnews.physaphae.fr/article.php?IdArticle=1506210 False Hack None None ZD Net - Magazine Info A timeline of events surrounding the Bezos phone hack 2020-01-22T21:23:00+00:00 https://www.zdnet.com/article/a-timeline-of-events-surrounding-the-bezos-phone-hack/#ftag=RSSbaffb68 www.secnews.physaphae.fr/article.php?IdArticle=1505252 False Hack None None BBC - BBC News - Technology Jeff Bezos hack: UN experts demand probe of Saudi crown prince 2020-01-22T20:48:46+00:00 https://www.bbc.co.uk/news/world-us-canada-51210743 www.secnews.physaphae.fr/article.php?IdArticle=1505777 False Hack None None Wired Threat Level - Security News Everything We Know About the Jeff Bezos Phone Hack 2020-01-22T17:19:43+00:00 https://www.wired.com/story/bezos-phone-hack-mbs-saudi-arabia www.secnews.physaphae.fr/article.php?IdArticle=1504925 False Hack None None IT Security Guru - Blog Sécurité Jeff Bezos phone hack 2020-01-22T11:36:48+00:00 https://www.itsecurityguru.org/2020/01/22/jeff-bezos-phone-hack/?utm_source=rss&utm_medium=rss&utm_campaign=jeff-bezos-phone-hack www.secnews.physaphae.fr/article.php?IdArticle=1504299 False Hack None None Security Affairs - Blog Secu Hack the Army bug bounty program paid $275,000 in rewards 2020-01-17T20:23:20+00:00 https://securityaffairs.co/wordpress/96523/hacking/second-hack-the-army.html www.secnews.physaphae.fr/article.php?IdArticle=1501919 False Hack None None Tech Worm - Desc Hack A Tesla Model 3 And Get $1M And A Free Tesla Car As Rewards 2020-01-17T18:55:39+00:00 https://www.techworm.net/2020/01/hack-tesla-model-3-car-reward.html www.secnews.physaphae.fr/article.php?IdArticle=1502076 False Hack None None Network World - Magazine Info 3 easy ways to make your Windows network harder to hack 2020-01-15T03:00:00+00:00 https://www.networkworld.com/video/100228/3-easy-ways-to-make-your-windows-network-harder-to-hack#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=1501558 False Hack None None Graham Cluley - Blog Security Boing Boing bounces back after hack attempted to infect users with fake Adobe Flash update 2020-01-14T14:38:59+00:00 https://www.grahamcluley.com/boing-boing-hack/ www.secnews.physaphae.fr/article.php?IdArticle=1501521 False Hack None 5.0000000000000000 Wired Threat Level - Security News Why Scientists Are Flying Drones Into Clouds of Whale Snot 2020-01-10T18:48:09+00:00 https://www.wired.com/story/snotbot www.secnews.physaphae.fr/article.php?IdArticle=1500572 False Hack None None Graham Cluley - Blog Security Just one month later, the Currys PC World/Dixons Travel hack would have cost them a heck of a lot more 2020-01-10T11:18:39+00:00 https://www.grahamcluley.com/currys-pc-world-dixons-data-breach/ www.secnews.physaphae.fr/article.php?IdArticle=1500043 False Hack None None BBC - BBC News - Technology Travelex customer: My money is in limbo 2020-01-08T06:56:12+00:00 https://www.bbc.co.uk/news/business-51026383 www.secnews.physaphae.fr/article.php?IdArticle=1498694 False Hack None None The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Researchers Demonstrate How to Hack Any TikTok Account by Sending SMS ]]> 2020-01-08T02:05:50+00:00 http://feedproxy.google.com/~r/TheHackersNews/~3/oFxt48B8hO8/hack-tiktok-account.html www.secnews.physaphae.fr/article.php?IdArticle=1498784 False Hack None None Security Affairs - Blog Secu MageCart gang compromised popular Focus Camera website 2020-01-07T15:52:42+00:00 https://securityaffairs.co/wordpress/96104/hacking/magecart-focus-camera-website.html www.secnews.physaphae.fr/article.php?IdArticle=1497957 False Hack None None InformationSecurityBuzzNews - Site de News Securite Response Comment: Travelex Foreign Currency Website STILL Down After 4 Days Following Cyber Attack Response Comment: Travelex Foreign Currency Website STILL Down After 4 Days Following Cyber Attack]]> 2020-01-07T11:22:18+00:00 https://www.informationsecuritybuzz.com/expert-comments/response-comment-travelex-foreign-currency-website-still-down-after-4-days-following-cyber-attack/ www.secnews.physaphae.fr/article.php?IdArticle=1497617 False Hack None None Tech Worm - Desc Iranian Hackers Hack And Deface U.S. Government Agency Website 2020-01-06T18:05:40+00:00 https://www.techworm.net/2020/01/iran-hackers-us-government-website.html www.secnews.physaphae.fr/article.php?IdArticle=1496854 False Hack None None InformationSecurityBuzzNews - Site de News Securite Security Awareness Advocate On Austria\'s Foreign Ministry Targeted By \'Serious\' Cyber Attack Security Awareness Advocate On Austria’s Foreign Ministry Targeted By ‘Serious’ Cyber Attack]]> 2020-01-06T11:59:53+00:00 https://www.informationsecuritybuzz.com/expert-comments/security-awareness-advocate-on-austrias-foreign-ministry-targeted-by-serious-cyber-attack/ www.secnews.physaphae.fr/article.php?IdArticle=1496566 False Hack None None Hacking Articles - Blog de Raj Chandel Hack the Box: Heist Walkthrough Continue reading → ]]> 2019-12-26T14:39:37+00:00 https://www.hackingarticles.in/hack-the-box-heist-walkthrough/ www.secnews.physaphae.fr/article.php?IdArticle=1494495 True Hack None None InformationSecurityBuzzNews - Site de News Securite Comments On Chinese Hacker Group Bypassing 2FA To Hack Government Entities And MSPs Comments On Chinese Hacker Group Bypassing 2FA To Hack Government Entities And MSPs]]> 2019-12-25T10:21:09+00:00 https://www.informationsecuritybuzz.com/expert-comments/comments-on-chinese-hacker-group-bypassing-2fa-to-hack-government-entities-and-msps/ www.secnews.physaphae.fr/article.php?IdArticle=1494803 True Hack APT 20 None InformationSecurityBuzzNews - Site de News Securite Multiple Security Experts Comment On 172M Zynga Logins Leaked Multiple Security Experts Comment On 172M Zynga Logins Leaked]]> 2019-12-20T14:49:52+00:00 https://www.informationsecuritybuzz.com/expert-comments/comments-on-170m-passwords-stolen-in-zynga-hack-monitor-says/ www.secnews.physaphae.fr/article.php?IdArticle=1494811 False Hack None None InformationSecurityBuzzNews - Site de News Securite LifeLabs Reveals Data Breach, Pays Ransom To Secure Personal Info Of 15M People LifeLabs Reveals Data Breach, Pays Ransom To Secure Personal Info Of 15M People]]> 2019-12-18T19:47:08+00:00 https://www.informationsecuritybuzz.com/expert-comments/lifelabs-reveals-data-breach-pays-ransom-to-secure-personal-info-of-15m-people/ www.secnews.physaphae.fr/article.php?IdArticle=1494375 False Hack None None BBC - BBC News - Technology Iran \'foils second cyber-attack in a week\' 2019-12-15T09:07:58+00:00 https://www.bbc.co.uk/news/world-middle-east-50799147 www.secnews.physaphae.fr/article.php?IdArticle=1494038 False Hack None None The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Flaw in Elementor and Beaver Addons Let Anyone Hack WordPress Sites ]]> 2019-12-13T02:53:40+00:00 http://feedproxy.google.com/~r/TheHackersNews/~3/FT8plHIZrDs/wordpress-elementor-beaver.html www.secnews.physaphae.fr/article.php?IdArticle=1493867 False Hack,Vulnerability None 2.0000000000000000 01net. Actualites - Securite - Magazine Francais Un hack permet de contourner la fin de support de Windows 7 ]]> 2019-12-09T10:58:03+00:00 https://www.01net.com/actualites/un-hack-permet-de-contourner-la-fin-de-support-de-windows-7-1820947.html www.secnews.physaphae.fr/article.php?IdArticle=1493920 False Hack None None NoticeBored - Experienced IT Security professional NBlog December - social engineering awareness module December 2019 sees the release of our 200th security awareness and training module, this one covering social engineering. The topic was planned to coincide with the end of year holiday period - peak hunting season for social engineers on the prowl, including those portly, bearded gentlemen in red suits, allegedly carrying sacks full of presents down chimneys. Yeah right!I'm fascinated by the paradox at the heart of social engineering. Certain humans threaten our interests by exploiting or harming our information. They are the tricksters, scammers, con-artists and fraudsters who evade our beautiful technological and physical security controls, exploiting the vulnerable underbelly of information security: the people. At the same time, humans are intimately involved in protecting and legitimately exploiting information for beneficial purposes. We depend on our good people to protect us against the bad people.Vigilance is often the only remaining hurdle to be overcome, making security awareness and training crucial to our defense. It's do or die, quite literally in some cases! The module concerns information risks, controls and incidents involving and affecting people:Various types of social engineering attacks, scams, cons and frauds – phishing being just one of many topical examples;Exploitation of information and people via social media, social networks, social apps and social proofing e.g. fraudulent manipulation of brands and reputations through fake customer feedback, blog comments etc.;The social engineer's tradecraft i.e. pretexts, spoofs, masquerading, psychological manipulation and coercion.]]> 2019-12-01T17:44:15+00:00 http://feedproxy.google.com/~r/NoticeBored/~3/v9HTbLDA1ss/nblog-december-social-engineering.html www.secnews.physaphae.fr/article.php?IdArticle=1495743 False Malware,Hack None None Graham Cluley - Blog Security Smashing Security #156: Better safe than Sony 2019-11-27T16:59:33+00:00 https://www.grahamcluley.com/smashing-security-156-better-safe-than-sony/ www.secnews.physaphae.fr/article.php?IdArticle=1490181 False Hack None None We Live Security - Editeur Logiciel Antivirus ESET Cryptocurrency exchange loses US$50 million in apparent hack 2019-11-27T16:06:00+00:00 http://feedproxy.google.com/~r/eset/blog/~3/zlSJ8tXiFCo/ www.secnews.physaphae.fr/article.php?IdArticle=1490120 False Hack None None InformationSecurityBuzzNews - Site de News Securite EXPERT COMMENT: Crypto Exchange Upbit Suffers $50 Million Hack EXPERT COMMENT: Crypto Exchange Upbit Suffers $50 Million Hack]]> 2019-11-27T11:48:59+00:00 https://www.informationsecuritybuzz.com/expert-comments/expert-comment-crypto-exchange-upbit-suffers-50-million-hack/ www.secnews.physaphae.fr/article.php?IdArticle=1489614 False Hack None None Security Affairs - Blog Secu Google will pay up to $1.5m for full chain RCE for Android on Titan M chips 2019-11-21T20:56:47+00:00 https://securityaffairs.co/wordpress/94211/hacking/android-titan-m-hack.html www.secnews.physaphae.fr/article.php?IdArticle=1480478 False Hack None None ZD Net - Magazine Info Google will pay bug hunters up to $1.5m if they can hack its Titan M chip 2019-11-21T17:00:08+00:00 https://www.zdnet.com/article/google-will-pay-bug-hunters-up-to-1-5m-if-they-can-hack-its-titan-m-chip/#ftag=RSSbaffb68 www.secnews.physaphae.fr/article.php?IdArticle=1480202 False Hack None None Security Affairs - Blog Secu A critical flaw in Jetpack exposes millions of WordPress sites 2019-11-21T14:43:39+00:00 https://securityaffairs.co/wordpress/94190/hacking/jetpack-wordpress-plugin.html www.secnews.physaphae.fr/article.php?IdArticle=1479953 False Hack,Vulnerability,Threat None None IT Security Guru - Blog Sécurité Under the microscope: inbound versus outbound email protection 2019-11-21T12:08:18+00:00 https://www.itsecurityguru.org/2019/11/21/under-the-microscope-inbound-versus-outbound-email-protection/?utm_source=rss&utm_medium=rss&utm_campaign=under-the-microscope-inbound-versus-outbound-email-protection www.secnews.physaphae.fr/article.php?IdArticle=1479700 False Malware,Hack None None The Last Watchdog - Blog Sécurité de Byron V Acohido SHARED INTEL: How \'memory attacks\' and \'firmware spoilage\' circumvent perimeter defenses 2019-11-20T17:10:12+00:00 https://www.lastwatchdog.com/shared-intel-how-memory-attacks-and-firmware-spoilage-circumvent-perimeter-defenses/ www.secnews.physaphae.fr/article.php?IdArticle=1478103 False Ransomware,Hack None None Security Affairs - Blog Secu Monero Project website has been compromised to deliver a coin stealer 2019-11-20T07:30:58+00:00 https://securityaffairs.co/wordpress/94121/malware/monero-project-website-hacked.html www.secnews.physaphae.fr/article.php?IdArticle=1477322 False Hack None None AlienVault Blog - AlienVault est un acteur de defense majeur dans les IOC The surprising truth about cybersecurity and autism 2019-11-19T14:00:00+00:00 https://feeds.feedblitz.com/~/609578724/0/alienvault-blogs~The-surprising-truth-about-cybersecurity-and-autism www.secnews.physaphae.fr/article.php?IdArticle=1475842 False Hack,Guideline None None AlienVault Blog - AlienVault est un acteur de defense majeur dans les IOC How website security and SEO are intimately connected back-door SEO. For instance, a hacker wants to put a link on your site, or add a web page. Sometimes they even target your domain and redirect it to another site altogether. Sucuri has an excellent example of a common hack they see on WordPress sites. These hacks make your website look like an untrustworthy page, or may even draw penalties from Google that cause your site to be blacklisted. Sometimes, no matter how much effort you put into SEO, failures in cybersecurity can drastically impact how Google sees your site, therefore also impacting your place in the SERPs. The First Step in Security to Boost SEO One of the first things you need to do to protect your website and boost your Google ranking is to install HTTPS. Google named this security protocol a ranking signal several years ago, so it’s obvious that your SEO results will be tied to it. You’ll need to make sure you have a proper certificate and allow indexing so that Google can still read your website. However, this is only the beginning. An HTTPS setup does not secure a website, it only secures the connection and encrypts data that is sent. That means that communication between your server and the web browser a visitor is using is secure and data — like a credit card number used for purchase — cannot be stolen. Other Important Security Steps Information security, or keeping your stored data secure, is another important part of keeping your website secure and helping it rank well, and the good news is that this security requires the same vigilance that SEO does. As a result, you can monitor both simultaneously. Platform Security Be sure you’ve chosen a good web host that has strong security on their end. Use security software or plugins as appropriate. For smaller websites using WordPress, you can use Wordfence, iThemes Security, or Bulletproof Security, for example. Overall, you want plugins that address the known security issues in the platform you use. All websites can also benefit from using SiteLock, which not only closes security loopholes but also monitors your website daily for malware, viruses, and more. Secure Passwords Believe it or not, the ]]> 2019-11-18T14:00:00+00:00 https://feeds.feedblitz.com/~/609461063/0/alienvault-blogs~How-website-security-and-SEO-are-intimately-connected www.secnews.physaphae.fr/article.php?IdArticle=1474066 False Malware,Hack APT 19 None InformationSecurityBuzzNews - Site de News Securite Comments On Home Office App For EU Citizens Easy To Hack Comments On Home Office App For EU Citizens Easy To Hack]]> 2019-11-18T13:53:07+00:00 https://www.informationsecuritybuzz.com/expert-comments/comments-on-home-office-app-for-eu-citizens-easy-to-hack/ www.secnews.physaphae.fr/article.php?IdArticle=1474009 False Hack None None ZD Net - Magazine Info Mexico\'s Pemex oil provider says attempted hack \'neutralized\' 2019-11-12T10:23:19+00:00 https://www.zdnet.com/article/mexicos-pemex-oil-provider-says-attempted-ransomware-hack-neutralized/#ftag=RSSbaffb68 www.secnews.physaphae.fr/article.php?IdArticle=1462381 False Hack None None Security Affairs - Blog Secu ZoneAlarm forum site hack exposed data of thousands of users 2019-11-11T20:09:47+00:00 https://securityaffairs.co/wordpress/93711/data-breach/zonealarm-forum-site-hack.html www.secnews.physaphae.fr/article.php?IdArticle=1461287 False Data Breach,Hack None None SecureMac - Security focused on MAC Checklist 162: Insecurity with a “light” touch 2019-11-08T16:37:40+00:00 https://www.securemac.com/checklist/checklist-162-insecurity-with-a-light-touch www.secnews.physaphae.fr/article.php?IdArticle=1454629 False Hack None None Tech Worm - Desc Alexa, Google Assistant And Siri Vulnerable To Laser Hack Attacks 2019-11-06T20:25:25+00:00 https://www.techworm.net/2019/11/alexa-google-assistant-siri-laser-hack.html www.secnews.physaphae.fr/article.php?IdArticle=1450182 False Hack,Vulnerability None None Security Affairs - Blog Secu \'Light commands\' attack: hacking Alexa, Siri, and other voice assistants via Laser Beam 2019-11-05T08:47:15+00:00 https://securityaffairs.co/wordpress/93429/hacking/light-commands-attack-voice-assistants.html www.secnews.physaphae.fr/article.php?IdArticle=1446275 False Hack None None The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Hackers Can Silently Control Your Google Home, Alexa, Siri With Laser Light ]]> 2019-11-05T02:11:04+00:00 http://feedproxy.google.com/~r/TheHackersNews/~3/qfTKEDAHKrY/hacking-voice-assistant-laser.html www.secnews.physaphae.fr/article.php?IdArticle=1446482 False Hack,Vulnerability None None Security Affairs - Blog Secu Two unpatched RCE flaws in rConfig software expose servers to hack 2019-11-04T10:39:15+00:00 https://securityaffairs.co/wordpress/93391/hacking/rconfig-rce-flaws.html www.secnews.physaphae.fr/article.php?IdArticle=1443961 False Hack None None Wired Threat Level - Security News WhatsApp Hack Targeted Officials in More Than 20 Countries 2019-11-02T13:00:00+00:00 https://www.wired.com/story/security-roundup-government-officials-hacked-whatsapp www.secnews.physaphae.fr/article.php?IdArticle=1440561 False Hack None None Tech Worm - Desc Top Government officials across 20 countries targets of WhatsApp hacking 2019-11-02T03:49:56+00:00 https://www.techworm.net/2019/11/government-whatsapp-hacking.html www.secnews.physaphae.fr/article.php?IdArticle=1439807 False Hack None None BBC - BBC News - Technology Pegasus breach: India denies WhatsApp hack amid outrage 2019-11-01T06:26:44+00:00 https://www.bbc.co.uk/news/world-asia-india-50258948 www.secnews.physaphae.fr/article.php?IdArticle=1437968 False Hack None None Graham Cluley - Blog Security Men who were paid $100,000 by Uber to hush-up hack plead guilty to extortion scheme 2019-10-31T22:20:11+00:00 https://www.tripwire.com/state-of-security/featured/men-paid-100k-by-uber-to-hush-up-hack-plead-guilty-to-extortion-scheme/#new_tab www.secnews.physaphae.fr/article.php?IdArticle=1437506 True Hack,Guideline Uber None The State of Security - Magazine Américain Men paid $100K by Uber to hush up hack plead guilty to extortion scheme Read More ]]> 2019-10-31T18:10:27+00:00 https://www.tripwire.com/state-of-security/featured/men-paid-100k-by-uber-to-hush-up-hack-plead-guilty-to-extortion-scheme/ www.secnews.physaphae.fr/article.php?IdArticle=1437202 False Hack,Guideline Uber None Security Affairs - Blog Secu Thousands of Xiaomi FURRYTAIL pet feeders exposed to hack 2019-10-30T08:11:32+00:00 https://securityaffairs.co/wordpress/93062/hacking/xiaomi-furrytail-pet-feeders-hack.html www.secnews.physaphae.fr/article.php?IdArticle=1434592 False Hack None None Bleeping Computer - Magazine Américain NordVPN Plans Security and Privacy Upgrades After Hack 2019-10-29T12:11:17+00:00 https://www.bleepingcomputer.com/news/security/nordvpn-plans-security-and-privacy-upgrades-after-hack/ www.secnews.physaphae.fr/article.php?IdArticle=1433349 False Hack None None InformationSecurityBuzzNews - Site de News Securite Security Researcher Gets Access To All Xiaomi Pet Feeders Around The World Security Researcher Gets Access To All Xiaomi Pet Feeders Around The World]]> 2019-10-29T07:57:29+00:00 https://www.informationsecuritybuzz.com/expert-comments/security-researcher-gets-access-to-all-xiaomi-pet-feeders-around-the-world/ www.secnews.physaphae.fr/article.php?IdArticle=1432537 False Hack None None The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Russian Hackers Targeting Anti-Doping Agencies Ahead of 2020 Tokyo Olympics ]]> 2019-10-29T00:24:28+00:00 http://feedproxy.google.com/~r/TheHackersNews/~3/QY7fLDJnJ20/cyber-attack-tokyo-olympics.html www.secnews.physaphae.fr/article.php?IdArticle=1432478 False Hack None None Security Affairs - Blog Secu CVE-2019-11043 exposes Web servers using nginx and PHP-FPM to hack 2019-10-26T15:07:54+00:00 https://securityaffairs.co/wordpress/92997/hacking/cve-2019-11043-php7-flaw.html www.secnews.physaphae.fr/article.php?IdArticle=1428162 False Hack,Vulnerability None None The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) New PHP Flaw Could Let Attackers Hack Sites Running On Nginx Servers ]]> 2019-10-26T12:53:02+00:00 http://feedproxy.google.com/~r/TheHackersNews/~3/FsBHt8lHiJo/nginx-php-fpm-hacking.html www.secnews.physaphae.fr/article.php?IdArticle=1428380 False Hack,Vulnerability None None Hacking Articles - Blog de Raj Chandel HA: Naruto Vulnhub Walkthrough Continue reading → ]]> 2019-10-24T15:21:57+00:00 https://www.hackingarticles.in/ha-naruto-vulnhub-walkthrough/ www.secnews.physaphae.fr/article.php?IdArticle=1424227 False Hack None None Security Affairs - Blog Secu Robots at HIS Group are vulnerable to hack 2019-10-23T11:34:02+00:00 https://securityaffairs.co/wordpress/92870/hacking/robots-vulnerable-to-hack.html www.secnews.physaphae.fr/article.php?IdArticle=1421854 False Hack None None