Launched just days ago, the latest release of Apple’s operating system for Macs contains a known zero-day vulnerability that could allow attackers to exfiltrate passwords from the user’s keychain. The flaw is also in older versions of macOS, so Mac users are are affected regardless of whether or not they upgraded their systems. Patrick […]
Haythem Elmir
Industrial computer systems increasingly targeted by hackers, warns Kaspersky
Companies in the manufacturing, industrial and infrastructure sectors have been warned to tighten up their security as industrial control systems increasingly come under sophisticated attacks. The warning comes from security specialist Kaspersky, which has warned that computers used in industry have become prime targets for hackers. Kaspersky says that one […]
Guide to securing personal information
Introduction This ‘Guide to securing personal information’ (Guide) provides guidance on the reasonable steps entities are required to take under the Privacy Act 1988 (Cth) (Privacy Act) to protect the personal information they hold from misuse, interference, loss, and from unauthorised access, modification or disclosure. It also includes guidance […]
Une dizaine de sites web tunisiens ont été attaqué par AnonGhost
Le 28 Septembre 2017, une dizaine de sites tunisiens ont été attaqué par le groupe de pirate AnonGhost. L’attaque d’hier a visé des sites tunisiens qui sont hébergés sur le même serveur en France. Les sites sont : ysolutions.com.tn tarab.tn selfie.tn sidd.tn men.tn mhs.tn mobbyclick.tn staroil.tn radiosweb.tn tulipevents.tn L’attaque est de […]
TUNISIA BIG DATA HACKATHON 07 & 08 OCTOBRE 2017
TUNISIA BIG DATA HACKATHON 07 & 08 OCTOBRE 2017 Espace Arena LAC 1 The Tunisian e-government society est une association non gouvernementale, à but non lucratif œuvrant pour une implémentation éclairée des politiques de transformation administrative par l’usage des technologies du numérique. Tunisia Big Data Hackathon 2017 serait le 1er challenge en Tunisie qui […]
Elaborate scripting-fu used in espionage attack against Saudi Arabia Government entity
We recently came across a campaign targeting a Saudi Arabia Government entity via a malicious Word document which at first reminded us of an attack we had previously described on this blog. In our previous research, we detailed how an information stealer Trojan was deployed via a Word macro, in order […]
Apple’s iOS 11 release prevents backdoor exploit on Wi-Fi chips
Apple’s release of iOS 11 patched an out-of-bounds write vulnerability in Wi-Fi chips that, if exploited, could have allowed attackers within range to execute arbitrary code on the firmware. Designated CVE-2017-11120, the bug was discovered by team researcher Gal Beniamini, and is comparable to the Broadpwnvulnerability found in Broadcom chipsets earlier this year. Following Apple’s Sept. […]
Qu’est qu’un Ransomware et comment s’en protéger ?
Europol: Over Two Billion EU Records Compromised Last Year
Ransomware has “eclipsed” most other global cybercrime threats over the past 12 months, with critical infrastructure (CNI) particularly vulnerable and urgent work needed to combat social engineering, according to Europol. The regional police network claimed in its 2017 Internet Organised Crime Threat Assessment(IOCTA) that the first half of 2017 saw […]
More Mac malware than ever before
Malware isn’t a problem on Macs, is it? You might think so. But that’s not a very safe assumption. Macs have been on malware writers’ radar for a long time. And the trend seems to be increasing. Research from Malwarebytes shows that attacks against macOS are growing. More Mac malware was detected in […]