Hack-tualité by G-echo - Securite - Semaine 2019/07

Securite - Semaine 2019/07

Dirty Sock vulnerability lets attackers gain root access on Linux systems
Wed, 13 Feb 2019 02:01:14 GMT
Catalin Cimpanu
After Dirty COW caused headaches in 2016, now Linux sysadmins have to worry about Dirty Sock.<p>A security researcher published today proof-of-concept …
Beware!! New Windows .exe Malware Found Targeting macOS Computers
Tue, 12 Feb 2019 18:21:52 GMT
February 12, 2019
A malicious Windows EXE file can even infect your Mac computer as well.<p>Yes, you heard me right — a .exe malware on macOS.<p>Security researchers at …
Devastating Cyberattack on Email Provider Destroys 18 Years of Data
Wed, 13 Feb 2019 02:04:53 GMT
Jai Vijayan Freelance writer
All data belonging to US users-including backup copies-have been deleted in catastrophe, VMEmail says.
Microsoft: Improved security features are delaying hackers from attacking Windows users
Mon, 11 Feb 2019 07:31:15 GMT
Catalin Cimpanu
If a vulnerability is exploited, it is most likely going to be exploited as zero-day, or an old security bug for which users and companies have had …
Exploit kits: winter 2019 review
Tue, 12 Feb 2019 20:29:08 GMT
Active malvertising campaigns in December and the new year have kept exploit kit activity from hibernating in winter 2019. We mostly observed Fallout …
Mozilla Releases Security Updates for Firefox | US-CERT
Wed, 13 Feb 2019 02:16:50 GMT
Mozilla has released security updates to address vulnerabilities in Firefox and Firefox ESR. An attacker could exploit some of these vulnerabilities …
Vidéo. L’invasion imminente des « fake vidéos »
Tue, 12 Feb 2019 18:24:39 GMT
Nous avons pris l’habitude de nous méfier des photos qui peuvent être facilement retouchées grâce à des logiciels accessibles sur Internet. Dans …
Ce faux câble Lightning permet de pirater n'importe quel ordinateur à distance
Tue, 12 Feb 2019 18:14:56 GMT
01net
Ce câble est doté d’un module Wi-Fi fait maison, judicieusement planqué dans sa prise USB. Ce qui permet de prendre le contrôle à distance de …
Attack of the week: searchable encryption and the ever-expanding leakage function
Mon, 11 Feb 2019 17:02:09 GMT
A few days ago I had the pleasure of hosting Kenny Paterson, who braved snow and historic cold (by Baltimore standards) to come talk to us about …
By G-echo

Pour aller plus loin

Ressources