Catégorie : #SECURITE
L’actualité de la sécurité informatique et de la cybersécurité, traitant de l’actualité francophone et anglophone de la sécurité informatique, du hacking et des programmes informatiques à visée malveillante.
Expired Certificates Used as Disguise to Spread Buerak, Mokes Malware
Researchers observed digital attackers employing expired security certificates as a disguise to distribute the Buerak downloader and Mokes malware. Kaspersky Lab learned of a new attack method in which malicious actors leveraged infected websites to warn visitors of an expired security certificate. The Russian security firm traced the first instances…
Les craintes liées au coronavirus exploités par les cyberattaques
Si vous receviez un courriel de l’Organisation Mondiale de la santé concernant l’épidémie de coronavirus, l’ouvririez-vous ? Téléchargeriez-vous des pièces jointes et cliqueriez-vous sur des liens pour obtenir plus d’informations ? Les cybercriminels pensent que certains, si ce n’est la plupart d’entre nous, le feront. Source : https://www.undernews.fr/hacking-hacktivisme/les-craintes-liees-au-coronavirus-exploites-par-les-cyberattaques.html?utm_source=rss&utm_medium=rss&utm_campaign=les-craintes-liees-au-coronavirus-exploites-par-les-cyberattaques Date :…
Cybercriminals are taking advantage of coronavirus fears with fake websites and phishing schemes
Exploiting a public health crisis for personal gain is the dastardly crime of our times. Source : https://mashable.com/article/coronavirus-cybercrime/ Date : March 5, 2020 at 08:01PM Tag(s) : Médias internationaux Share this… Email Facebook Twitter Linkedin Whatsapp Print
The 5 Best Open-Source Password Managers
If you use a computer to get online, then you’ve probably created a number of accounts across various websites. Some of us are juggling dozens. You may even have hundreds. A password manager can help you, your family members, and your work colleagues avoid the unsafe practice of using the…
Ransomwares : les pirates visent désormais les sauvegardes Cloud
Les Ransomwares sont devenus, il y a quelques années déjà, l’outil favori des cybercriminels pour soutirer de l’argent à leurs victimes. Et désormais, ces derniers s’attaquent également aux sauvegardes Cloud. Source : https://www.generation-nt.com/ransomwares-pirates-visent-desormais-sauvegardes-cloud-actualite-1973918.html Date : March 5, 2020 at 06:39PM Tag(s) : Médias spécialisés Share this… Email Facebook Twitter Linkedin…
ESRB warns cyber threats pose systemic risk
The possibility of a serious cyber incident poses a systemic risk to the financial system, with seri… Source : https://www.finextra.com/newsarticle/35403/esrb-warns-cyber-threats-pose-systemic-risk?utm_medium=rssfinextra&utm_source=finextrafeed Date : March 6, 2020 at 01:12AM Tag(s) : #Financements Share this… Email Facebook Twitter Linkedin Whatsapp Print
#Privacy: US government department discloses cybersecurity weaknesses in some healthcare devices
The U.S. Food and Drug Administration (FDA) is informing patients, health care providers and manufacturers about a set of cybersecurity vulnerabilities, referred to as “SweynTooth,” that – if exploited – may introduce risks for certain medical devices. Source : https://gdpr.report/news/2020/03/05/privacy-us-government-department-discloses-cybersecurity-weaknesses-in-some-healthcare-devices/ Date : March 5, 2020 at 07:40AM Tag(s) : #RGPD…
Ransomware : des données d’employés et de clients d’hôtels diffusés
Des pirates informatiques spécialisés dans l’infiltration de serveur et leur chiffrement viennent de diffuser des informations concernant des employés de plusieurs hôtels français. Le double effet ransomware !… Source : https://www.zataz.com/ransomware-des-donnees-demployes-et-de-clients-dhotels-diffuses/ Date : March 4, 2020 at 08:49PM Tag(s) : #SECURITE FRA Share this… Email Facebook Twitter Linkedin Whatsapp Print
Oppens, le coach cybersécurité pour les TPE et PME
Source : http://www.agefi.fr/fintech/actualites/hebdo/20200305/oppens-coach-cybersecurite-tpe-pme-294477 Date : March 5, 2020 at 08:16AM Tag(s) : #Financements Share this… Email Facebook Twitter Linkedin Whatsapp Print
Are our police forces equipped to deal with modern cybercrimes?
“You should have asked for the presence of a digital detective,” Karen said when I told her what happened at the police station. I had accompanied a neighbor, who is a small business owner, that had been hit with ransomware and wanted to file a report. After listening to his…
Olivier-Pierre de Mazières, nouveau patron de la lutte contre les cybermenaces
Olivier-Pierre de Mazières est titulaire d’une maîtrise de droit public obtenue à l’Université Paris 2 Panthéon-Assas en 1993. Puis diplômé de Science-Po Paris en 1994. Il a été élève de l’École Nationale d’Administration (ENA) de 1996 à 1998. Source : https://www.infoprotection.fr/olivier-pierre-de-mazieres-nouveau-patron-de-la-lutte-contre-les-cybermenaces/ Date : March 4, 2020 at 10:40PM Tag(s) :…
Best ways to debug your life and avoid falling victim to cyber attacks
… they can be vulnerable to cyber attackers, » the NCSC’s … monitors can be vulnerable to cyber attackers if the right security measures … Source : https://it.einnews.com/article/511229313/Crebj4y4kDBOtTeI?ref=rss&ecode=Pzxpqm_mVieIWF8G Date : March 5, 2020 at 02:18AM Tag(s) : #SECURITE ENG Share this… Email Facebook Twitter Linkedin Whatsapp Print
FBI works to ‘burn down’ cyber criminals’ infrastructure
… from China, are also using cyber attacks to steal research from the … Source : https://it.einnews.com/article/511207893/5MQEKTRx7CrWgTHz?ref=rss&ecode=Pzxpqm_mVieIWF8G Date : March 4, 2020 at 09:49PM Tag(s) : #SECURITE ENG Share this… Email Facebook Twitter Linkedin Whatsapp Print
What is ISO 27701?
If you have a familiarity with any information security frameworks and certifications, it’s more than likely you have heard of International Organisation for Standardisation (ISO) and possibly the International Electrotechnical Commission (IEC). From my experience, the most commonly referred to business-level security related certifications are ISO/IEC 27001 and ISO/IEC 27002….
#Privacy: Boots suffers cyber attack
The UK’s leading health and beauty retailer has suspended its Advantage Card payments following a cyber attack. Source : https://gdpr.report/news/2020/03/05/privacy-boots-suffers-cyber-attack/ Date : March 5, 2020 at 07:40AM Tag(s) : #RGPD ENG Share this… Email Facebook Twitter Linkedin Whatsapp Print
Pourquoi est-il si difficile de voter en toute sécurité ?
Si nous partons du principe que vous ne vivez pas coupé du monde (sans Twitter, Facebook, Netflix ou les informations), il est fort probable que vous sachiez que 2020 est l’année des élections présidentielles américaines. Si vous êtes déconnecté depuis plusieurs années alors vous ne savez peut-être pas ce qui…
Ryuk ransomware attack forced industrial conglomerate EMCOR to shut down IT systems
… was adversely affected following a cyber attack involving Ryuk ransomware. The National … Source : https://it.einnews.com/article/511279051/gezArbize09gpI9R?ref=rss&ecode=Pzxpqm_mVieIWF8G Date : March 5, 2020 at 03:23PM Tag(s) : #SECURITE ENG Share this… Email Facebook Twitter Linkedin Whatsapp Print
#Privacy: IT scientists trick hackers into sharing codes to access stronger cybersecurity
Instead of blocking hackers, a new cybersecurity defense approach developed by University of Texas at Dallas computer scientists actually welcomes them. Source : https://gdpr.report/news/2020/03/05/privacy-it-scientists-trick-hackers-into-sharing-codes-to-access-stronger-cybersecurity/ Date : March 5, 2020 at 08:41AM Tag(s) : #RGPD ENG Share this… Email Facebook Twitter Linkedin Whatsapp Print
#Privacy: T-Mobile discloses second security breach
The telecommunications giant has disclosed a security breach which impacted both its employees and customers. Source : https://gdpr.report/news/2020/03/05/privacy-t-mobile-discloses-second-security-breach/ Date : March 5, 2020 at 02:47PM Tag(s) : #RGPD ENG Share this… Email Facebook Twitter Linkedin Whatsapp Print
Quels mots de passe les hackers utiliseront en priorité pour pirater vos appareils ?
Elle a déclaré que l’augmentation du « trafic d’attaque » reflète le nombre croissant de menaces sur les dispositifs de l’Internet des objets (IoT). Source : https://www.zdnet.fr/actualites/quels-mots-de-passe-les-hackers-utiliseront-en-priorite-pour-pirater-vos-appareils-39900135.htm Date : March 5, 2020 at 11:04AM Tag(s) : #IOT FRA Share this… Email Facebook Twitter Linkedin Whatsapp Print