Google va suspendre les certificats Symantec dans Chrome

cyber

Au cours des prochains mois, Google a annoncé suspendre les certificats de sécurité de Symantec émis avant le 1er juin 2016 dans son navigateur web Chrome. Une décision qui intervient après de longs mois de discorde entre les deux fournisseurs. To read the original article : http://www.lemondeinformatique.fr/actualites/lire-google-va-suspendre-les-certificats-symantec-dans-chrome-69395.html

POS Malware Abuses Exposed ElasticSearch Nodes for C&C

cyber

Two point of sale (POS) malware families have been abusing thousands of publicly accessible ElasticSearch nodes for command and control (C&C) purposes, Kromtech security researchers warn. Malicious files discovered on the ElasticSearch deployments referenced to the AlinaPOS and JackPOS malware families, which are well known for their wide use in credit card data […]

New “Red Alert” Android Banking Trojan Emerges

cyber

A recently discovered Android banking Trojan features a bot and command and control panel fully written from scratch, SfyLabs has discovered. Dubbed Red Alert 2.0, the malware has been designed and distributed over the past several months by a new threat actor, the researchers say. The threat features new code but […]

EU to Launch Cybersecurity ‘Safety Labels’

cyber

The European Union unveiled plans Tuesday to step up its response to cyber attacks, including a new intelligence-sharing agency, cyber war games and product safety labels. The proposals by the European Commission, the executive arm of the 28-nation bloc, come amid growing concerns over election hacking by foreign states, ransomware […]

How to recognize a targeted malware/phishing attack

cyber

I received an email pretending to be from my hoster Strato (known as Cronon AG) telling me that my domain I have for my IT Consulting business has been suspended because of complains they received. This kind of email is called “Spear Phishing”: it targets only certain users that have a proven […]

Ransomware: Prevention is the best solution

cyber

Ransomware is malicious software that denies you access to your computer or files until you pay a ransom. There are several types of ransomware that are commonly seen: files/folders encryptors screen ‘lockers‘ MBR ransomware (MBR: master boot record) To read the original article : http://improve-your-security.org/ransomware-prevention-is-the-best-solution/

Set of online resources from AV-Comparatives.org

cyber

TOPICS:AV-ComparativesResourcesTips POSTED BY: IMPROVEYOURSECURITY SEPTEMBER 18, 2017 Here is a set of resources put together by AV-Comparatives.org : General guidelines in minimizing risks Online vulnerability starts with human vulnerability E-mail security Web navigation Safe online banking To read the original article : http://improve-your-security.org/set-of-online-resources-from-av-comparatives-org/

CCleaner Malware Incident – What You Need to Know and How to Remove

cyber

This is a small guide and FAQ on the malware installed alongside CCleaner 5.33.6162. For a full recap of what happened, you can read our complete CCleaner coverage. What happened? An unknown threat group compromised the CCleaner infrastructure. The attacker added malware to the CCleaner 5.33.6162 and CCleaner Cloud 1.07.3191 installers, but the malware only executed on […]

How Do Hackers Hack Social Networking Websites?

cyber

At the point when individuals discuss hacking and social networks, they’re not alluding to the common meaning of hacking, which is utilizing malignant code or secondary passages as a part of machine systems to harm systems or take restrictive data. Hacking into social networks requires almost no specialized ability. It’s […]

OurMine Hackers Hacked VEVO and leaked 3.12TB data online

cyber

The infamous hacker group OurMine targeted the popular video hosting service and leaked 3.12TB worth of data online. The hacker group is constantly in news by attacking various popular companies including HBO recently. Now they leaked 3.12TB of data and some of the documents leaked contain very sensitive information according […]