Newsletter spécialisée sur abonnement pour {first_name} {last_name}

NEWSLETTER SPÉCIALISÉE CYBERSECURITE ANGLOPHONE

ÉDITION DU 9 mars 2020

#SECURITY ENG

Image
7 mars 2020
Bring your own privacy: VPNs for consumers and orgs
VPNs (virtual private networks) have been popular for quite some time now, and they’re worth a huge amount of money for the companies working in this area. They’re also at…
Lire la suite…
Image
7 mars 2020
More than a billion Android phones at risk of being hacked, experts say
Source : https://it.einnews.com/article/511350509/WaYGNigC5RbItBjG?ref=rss&ecode=Pzxpqm_mVieIWF8G Date : March 6, 2020 at 08:42PM Tag(s) : #SECURITE ENG
Lire la suite…
Image
6 mars 2020
Weekly Threat Report 6th March 2020
The NCSC's weekly threat report is drawn from recent open source reporting. Source : https://www.ncsc.gov.uk/report/weekly-threat-report-6th-march-2020 Date : March 6, 2020 at 12:59PM Tag(s) : UK GOV
Lire la suite…
Image
6 mars 2020
#Privacy: Over a billion of Android devices could be hacked 
Consumer watchdog Which? has suggested that a vulnerability could put more than a billion Android devices at risk. Source : https://gdpr.report/news/2020/03/06/privacy-over-a-billion-of-android-devices-could-be-hacked/ Date : March 6, 2020 at 01:05PM Tag(s) :…
Lire la suite…
Image
6 mars 2020
Critical data protection steps you may be missing
… vectors and potential exposure to cyber attack, resulting in unnecessary data protection … Source : https://it.einnews.com/article/511330821/k9cBaXv5eOFHCqC3?ref=rss&ecode=Pzxpqm_mVieIWF8G Date : March 6, 2020 at 11:06AM Tag(s) : #SECURITE ENG
Lire la suite…
Image
6 mars 2020
US, UK and Estonia accuse Russia of cyber attack on Georgia
… military intelligence Thursday of conducting cyber attacks against the Georgian government and … Cherith Norman Chalet, saying the cyber attacks “are part of Russia’s … Ministry said the Oct.…
Lire la suite…
Image
6 mars 2020
Flags raised over vulnerabilities of military equipment to cyber attacks
Source : https://it.einnews.com/article/511299136/A-evJ8uonunK4rik?ref=rss&ecode=Pzxpqm_mVieIWF8G Date : March 5, 2020 at 09:55PM Tag(s) : #SECURITE ENG
Lire la suite…
Image
6 mars 2020
Virgin Media data breach affects 900,000 customers
… vulnerable it may be to cyber attacks,’ he told Metro.co.uk … Source : https://it.einnews.com/article/511332967/ORVwPONbh2HqRffw?ref=rss&ecode=Pzxpqm_mVieIWF8G Date : March 6, 2020 at 12:38PM Tag(s) : #SECURITE ENG
Lire la suite…
Image
6 mars 2020
Expired Certificates Used as Disguise to Spread Buerak, Mokes Malware
Researchers observed digital attackers employing expired security certificates as a disguise to distribute the Buerak downloader and Mokes malware. Kaspersky Lab learned of a new attack method in which malicious…
Lire la suite…
Image
6 mars 2020
Cybercriminals are taking advantage of coronavirus fears with fake websites and phishing schemes
Exploiting a public health crisis for personal gain is the dastardly crime of our times. Source : https://mashable.com/article/coronavirus-cybercrime/ Date : March 5, 2020 at 08:01PM Tag(s) : Médias internationaux
Lire la suite…
Image
6 mars 2020
The 5 Best Open-Source Password Managers
If you use a computer to get online, then you’ve probably created a number of accounts across various websites. Some of us are juggling dozens. You may even have hundreds.…
Lire la suite…
Image
6 mars 2020
ESRB warns cyber threats pose systemic risk
The possibility of a serious cyber incident poses a systemic risk to the financial system, with seri... Source : https://www.finextra.com/newsarticle/35403/esrb-warns-cyber-threats-pose-systemic-risk?utm_medium=rssfinextra&utm_source=finextrafeed Date : March 6, 2020 at 01:12AM Tag(s) : #Financements
Lire la suite…
Image
5 mars 2020
#Privacy: US government department discloses cybersecurity weaknesses in some healthcare devices
The U.S. Food and Drug Administration (FDA) is informing patients, health care providers and manufacturers about a set of cybersecurity vulnerabilities, referred to as “SweynTooth,” that – if exploited –…
Lire la suite…
Image
5 mars 2020
Are our police forces equipped to deal with modern cybercrimes?
“You should have asked for the presence of a digital detective,” Karen said when I told her what happened at the police station. I had accompanied a neighbor, who is…
Lire la suite…
Image
5 mars 2020
Best ways to debug your life and avoid falling victim to cyber attacks
… they can be vulnerable to cyber attackers," the NCSC's … monitors can be vulnerable to cyber attackers if the right security measures … Source : https://it.einnews.com/article/511229313/Crebj4y4kDBOtTeI?ref=rss&ecode=Pzxpqm_mVieIWF8G Date : March…
Lire la suite…
Image
5 mars 2020
FBI works to 'burn down' cyber criminals' infrastructure
… from China, are also using cyber attacks to steal research from the … Source : https://it.einnews.com/article/511207893/5MQEKTRx7CrWgTHz?ref=rss&ecode=Pzxpqm_mVieIWF8G Date : March 4, 2020 at 09:49PM Tag(s) : #SECURITE ENG
Lire la suite…
Image
5 mars 2020
What is ISO 27701?
If you have a familiarity with any information security frameworks and certifications, it’s more than likely you have heard of International Organisation for Standardisation (ISO) and possibly the International Electrotechnical…
Lire la suite…
Image
5 mars 2020
#Privacy: Boots suffers cyber attack
The UK’s leading health and beauty retailer has suspended its Advantage Card payments following a cyber attack. Source : https://gdpr.report/news/2020/03/05/privacy-boots-suffers-cyber-attack/ Date : March 5, 2020 at 07:40AM Tag(s) : #RGPD…
Lire la suite…
Image
5 mars 2020
Ryuk ransomware attack forced industrial conglomerate EMCOR to shut down IT systems
… was adversely affected following a cyber attack involving Ryuk ransomware. The National … Source : https://it.einnews.com/article/511279051/gezArbize09gpI9R?ref=rss&ecode=Pzxpqm_mVieIWF8G Date : March 5, 2020 at 03:23PM Tag(s) : #SECURITE ENG
Lire la suite…
Image
5 mars 2020
#Privacy: IT scientists trick hackers into sharing codes to access stronger cybersecurity
Instead of blocking hackers, a new cybersecurity defense approach developed by University of Texas at Dallas computer scientists actually welcomes them. Source : https://gdpr.report/news/2020/03/05/privacy-it-scientists-trick-hackers-into-sharing-codes-to-access-stronger-cybersecurity/ Date : March 5, 2020 at 08:41AM Tag(s)…
Lire la suite…
Image
5 mars 2020
#Privacy: T-Mobile discloses second security breach
The telecommunications giant has disclosed a security breach which impacted both its employees and customers. Source : https://gdpr.report/news/2020/03/05/privacy-t-mobile-discloses-second-security-breach/ Date : March 5, 2020 at 02:47PM Tag(s) : #RGPD ENG
Lire la suite…
Image
5 mars 2020
The War of Passwords: Compliance vs NIST
The most recent National Institute of Standards and Technology (NIST) guidelines have been updated for passwords in section 800-63B. The document no longer recommends combinations of capital letters, lower case…
Lire la suite…
Image
5 mars 2020
5G Supply Chain Security: Threats and Solutions
5G Supply Chain Security: Threats and Solutions. March 4, 2020. James A. Lewis, senior vice president and director, Technology Policy Program, ... Source : https://www.csis.org/analysis/5g-supply-chain-security-threats-and-solutions Date : March 5, 2020 at…
Lire la suite…
Image
4 mars 2020
Cybersecurity In Healthcare Industry
2017, Wannacry cyberattack shook the National Health Service of the UK, which infected more than 2,00,000 computers, putting a total number of 16 healthcare centres on halt that led to…
Lire la suite…
Image
4 mars 2020
Let’s Encrypt Says It Will Revoke 3M Certificates Due to Software Bug
Non-profit certificate authority (CA) Let’s Encrypt announced it will revoke more than three million digital certificates due to a software bug. On March 3, Let’s Encrypt revealed its plan to…
Lire la suite…
Image
4 mars 2020
These are the first passwords hackers will try when attacking your device
… to detect patterns in the cyber attacks. The vast majority of traffic … Source : https://it.einnews.com/article/511184628/YLTAL_MgtbkQOfpT?ref=rss&ecode=Pzxpqm_mVieIWF8G Date : March 4, 2020 at 04:19PM Tag(s) : #SECURITE ENG
Lire la suite…
Image
4 mars 2020
FBI working to 'burn down' cyber criminals' infrastructure
… from China, are also using cyber attacks to steal research from the … Source : https://it.einnews.com/article/511194333/EEXDJblBvEpXEa0y?ref=rss&ecode=Pzxpqm_mVieIWF8G Date : March 4, 2020 at 06:50PM Tag(s) : #SECURITE ENG
Lire la suite…
Image
4 mars 2020
2019 proves a bumper year for cyber attacks
Cyber criminals launched a barrage of attacks in 2019, spurred on by botnets of infected IoT devices and by attacker interest in the Eternal Blue vulnerability. Security company F-Secure's global…
Lire la suite…
Image
4 mars 2020
SA ranks as 31st worst country at cyber security
Source : https://it.einnews.com/article/511170012/y9QGAo2O_3ScoiPa?ref=rss&ecode=Pzxpqm_mVieIWF8G Date : March 4, 2020 at 12:48PM Tag(s) : #SECURITE ENG
Lire la suite…
Image
4 mars 2020
#Privacy: UK fintech company hit by cyber attack
Credit score builder Loqbox has announced that it was hit by a “sophisticated and complex” cyber attack. Source : https://gdpr.report/news/2020/03/04/privacy-uk-fintech-company-hit-by-cyber-attack/ Date : March 4, 2020 at 01:23PM Tag(s) : #RGPD…
Lire la suite…
Image
4 mars 2020
#Privacy: Cybersecurity market set to reach $258bn in five years’ time
Emergence of IoT & BYOD, surge in malware and phishing threats among enterprises, and rise in demand for cloud-based solutions propel the growth of the global cyber security market. Source…
Lire la suite…
Image
4 mars 2020
Cyber security experts sound the alarm on 5G
5G is here to stay, and it's set to shake up a lot of different industries. It brings a host of benefits, including super-fast speeds, reliability, efficiency and ... Source :…
Lire la suite…
Image
4 mars 2020
What is the most prolific cyber threat from IoT devices?
IoT varies from common traditional internet since it doesn’t rely on human intervention to function. It has developed by leaps and bounds in a defined time frame. Ranging from the…
Lire la suite…
Image
4 mars 2020
Guide On Protecting Your IoT Mobile App From Cyber Attack
Before starting let me introduce the term IoT and why it is important to protect and How to protect or what are the various ways to protect mobile apps from…
Lire la suite…
Image
3 mars 2020
Daily cyber attacks on parliament system
Australia's parliament is under daily attack from malicious actors seeking to infiltrate its computer systems. Senate President Scott Ryan told a parliamentary committee on Monday investments in beefing up cybersecurity…
Lire la suite…
Image
3 mars 2020
6 In Demand Cybersecurity Job Roles For 2020
As more data breaches take place, the requirements and salary for cybersecurity professionals are increasing. With ransomware, hacks and threats becoming more common, an organisation’s need to concentrate more on…
Lire la suite…
Image
3 mars 2020
Patients’ Privacy & Data Threat in Digital Era: eHealth Magazine March Issue 2020
TeleHealth—Powerful Tool to Achieve Universal Healthcare & Holistic Wellness ‘Data Privacy Key for Seamless Patient Experience’ Preventing the Spread of Coronavirus From Contaminated Medical Devices Smart Hospitals The Future of…
Lire la suite…
Image
3 mars 2020
#Privacy: Leadership roles of women in cybersecurity
According to the US Bureau of Labor Statistics, US companies will add 546,200 new jobs in computer and information technology between 2018 and 2028, a rate higher than the average for…
Lire la suite…
Image
3 mars 2020
'Malware-free' attacks now most popular tactic amongst cybercriminals
Source : https://it.einnews.com/article/511068801/OC2ClEYUlNRaA8Kw?ref=rss&ecode=Pzxpqm_mVieIWF8G Date : March 3, 2020 at 12:16PM Tag(s) : #SECURITE ENG
Lire la suite…
Image
3 mars 2020
How to avoid falling victim to a cyber attack
Source : https://it.einnews.com/article/511082473/VV_J80FdkcVwwNAv?ref=rss&ecode=Pzxpqm_mVieIWF8G Date : March 3, 2020 at 03:49PM Tag(s) : #SECURITE ENG
Lire la suite…

TNTIC est une service de la société CITICA - Créée en 1996 - SIRET : 410 136 758 00035 - BP 43109 - 31131 BALMA Cedex - Mail : contact@tntic.com

Gérer mon inscription    |    Voir en ligne