Hack-tualité by G-echo - Securite - Semaine 2019/06

Securite - Semaine 2019/06

SpeakUp Linux Backdoor Sets Up for Major Attack
Mon, 04 Feb 2019 20:21:28 GMT
LAS VEGAS — A backdoor trojan dubbed “SpeakUp” has been spotted exploiting the Linux servers that run more than 90 percent of the top 1 million …
Infographic: The death of passwords
Fri, 08 Feb 2019 16:37:05 GMT
Alison DeNisco Rayome
Enterprises need to start preparing for a future without traditional passwords, according to LoginRadius.<p>Enterprises trying to keep customer data …
Des technicités alliées à l'investigation
Thu, 07 Feb 2019 05:42:09 GMT
« La place prépondérante du numérique dans la vie de tous les jours est un facteur aggravant du risque encouru par la population, explique le colonel …
New Hack Can Access Your Mac's Passwords: What to Do Now
Wed, 06 Feb 2019 14:47:47 GMT
Jesus Diaz
MacOS has a new serious vulnerability that essentially leaves your computer’s passwords wide open to be stolen by hackers. Its name: KeySteal.<p>Here …
I scanned the whole country of Austria and this is what I've found
Sun, 10 Feb 2019 03:11:23 GMT
Christian Haschek
<b>Disclaimer:</b> This article is the result of a few weeks of research. I did report the most disturbing things I found to the owners of the servers if I …
Google's New Tool Alerts When You Use Compromised Credentials On Any Site
Tue, 05 Feb 2019 20:05:59 GMT
February 05, 2019
With so many data breaches happening almost every week, it has become difficult for users to know if their credentials are already in possession of …
Encryption against global mass surveillance
Sat, 09 Feb 2019 16:35:52 GMT
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides …
New TLS encryption-busting attack also impacts the newer TLS 1.3
Sat, 09 Feb 2019 10:15:57 GMT
Catalin Cimpanu
Researchers discover yet another Bleichenbacher attack variation (yawn!).<p>A team of academics has revealed a new cryptographic attack this week that …
Vulnerability Summary for the Week of January 28, 2019 | US-CERT
Mon, 04 Feb 2019 20:21:45 GMT
Severity Not Yet Assigned<p>Primary<br>Vendor -- Product<p>Description<p>Published<p>CVSS Score<p>Source & Patch Info<p>3s-smart_software_solutions -- …
Google Translate peut cacher une attaque de phishing
Thu, 07 Feb 2019 09:57:46 GMT
Catalin Cimpanu
Des groupes cybercriminels utilisent Google Translate pour cacher le domaine réel de leurs sites de phishing, ont découvert des chercheurs en …
Cyberattacks to watch for in 2019
Tue, 05 Feb 2019 02:26:18 GMT
Bob Violino
A new report examines eight key threat areas.<p>Organizations will face cyber security threats in eight key areas in 2019, according to a newly released …
Google's head of internet security says businesses should ignore cyber scare tactics and learn from history
Sun, 10 Feb 2019 09:37:25 GMT
Kate Fazzini
There are a lot of scary cybersecurity headlines, and many shiny new solutions from vendors that promise to address those threats.<p>Ignore them and …
Android : une simple image PNG permet de pirater n'importe quel smartphone
Thu, 07 Feb 2019 14:24:23 GMT
Par David Igue,
<b>Google a découvert plus d’une quarantaine de failles de sécurité dans Android dont la plus sévère permet d’exécuter du code malicieux sur les</b> …
Les trottinettes Bird sont piratables avec un tournevis et 30 € (et la startup n’aime pas qu’on en parle)
Fri, 08 Feb 2019 19:17:41 GMT
Marie Turcan
Marie Turcan , à l'instant<p>[Enquête Numerama] Détourner une trottinette Bird avec un simple kit à 30 dollars ? C'est possible. Parce qu'elle utilise …
Hacker Lifecycle Phase 4: Maintaining Access - IncMan SOAR’s Protective Mechanisms
Fri, 08 Feb 2019 07:59:07 GMT
By Cody Mercer / 7 Feb 2019<p>Following on from my last three blogs in this hacker lifecycle series, we will now venture into the fourth phase, known as …
Flaws in Popular RDP Clients Allow Malicious Servers to Reverse Hack PCs
Wed, 06 Feb 2019 04:59:39 GMT
February 05, 2019
You've always been warned not to share remote access to your computer with any untrusted people for many reasons—it's basic cyber security advice, …
Apple : un simple logiciel permet de voler tous les mots de passe sous MacOS
Thu, 07 Feb 2019 09:52:42 GMT
Stéphane Ficca
Un petit logiciel permet de dérober tous les mots de passe stockés sur MacOS. Et le découvreur de la faille refuse de dialoguer avec Apple...
Struts Vulnerability CVE-2017-5638 on VMware vCenter - the Gift that Keeps on Giving, Author: Rob VandenBrink
Mon, 04 Feb 2019 20:23:12 GMT
SANS Internet Storm Center
All too often when doing an internal security assessment or penetration test, a simple NMAP scan will find back-end infrastructure such as RADIUS …
La 5G pose-t-elle un problème de sécurité nationale ?
Sat, 09 Feb 2019 13:38:28 GMT
L’arrivée imminente de la 5G crée la panique au sein du gouvernement, qui souhaite absolument auditer les futurs équipements de réseaux mobiles au …
Google Created Faster Storage Encryption for All Low-End Devices
Fri, 08 Feb 2019 14:08:37 GMT
February 08, 2019
Google has launched a new encryption algorithm that has been built specifically to run on mobile phones and smart IoT devices that don't have the …
By G-echo