The Android spyware was used to steal personal data of victims – The campaign also shows why users should never use their real photos on Facebook. There are almost 2 billion monthly active users on the social media giant Facebook and that makes it one of the most lucrative targets for hackers […]
Des hackers peuvent infiltrer les comptes Tinder avec un simple numéro de téléphone
Votre vie sentimentale n’a peut-être tenu qu’à la bonne volonté d’un hacker pendant un moment. Un informaticien a dévoilé une faille importante sur Tinder. Elle a depuis été corrigée. Si on vous demandait le type d’applications que vous n’avez pas forcément envie de voir tomber entre les mains d’un pirate, […]
The Drupal development team addressed many vulnerabilities in both Drupal 8 and 7, including some flaws rated as “critical”.
Drupal maintainers have fixed many vulnerabilities in Drupal 7 and 8, including some flaws rated as “critical.” One of the critical security vulnerabilities is related to partial cross-site scripting (XSS) prevention mechanisms that was addressed with Drupal 8.4.5 and 7.57 versions. The popular CMS uses a JavaScript function that doesn’t completely sanitize the […]
SamSam Ransomware Hits Colorado DOT, Agency Shuts Down 2,000 Computers
The Colorado Department of Transportation (DOT) has shut down over 2,000 computers after some systems got infected with the SamSam ransomware on Wednesday, February 21. The agency’s IT staff is working with its antivirus provider McAfee to remediate affected workstations and safeguard other endpoints before before reintroducing PCs into its […]
Cisco Unity Connection Mail Relay Vulnerability
A vulnerability in the SMTP relay of Cisco Unity Connection could allow an unauthenticated, remote attacker to send unsolicited email messages. The vulnerability is due to improper handling of domain information in the affected software. An unauthenticated, remote attacker could exploit this vulnerability by sending crafted requests to the targeted […]
Hack the Air Force: A Ton of Vulnerabilities Found in the US Air Force Cybersecurity System
Cyber world is a risky business. On one side it has made our life easier, and on other it presents risks. Everything on the cloud can be hacked, and no institution is 100% sade, including government organizations. HackerOne, an ethical hacking company and security research firm, hosted an event in […]
5 Ways Hackers Can Breach Your Company Undetected
5 Ways Hackers Can Breach Your Company Undetected Security breaches are, quite unfortunately, a common presence in corporate environments. Even companies making effective use of the most recent security solutions such as next generation firewalls, advanced threat protection and security incident and event management (SIEM) systems are not an exception. […]
NEW BEC SPAM CAMPAIGN TARGETS FORTUNE 500 BUSINESSES
Researchers have identified a wave of new business email compromise campaigns targeting Fortune 500 companies that are designed to trick victims into fraudulent wire transfers. Researchers said the campaigns originate from Nigeria and are targeting companies in the retail, healthcare and financial markets. The Nigerian-based business email compromise (BEC) campaigns […]
The Blue Whale Suicide Game : conseils préventifs pour protéger son enfant
Pour protéger nos enfants de ce jeu morbide, on propose aux parents de modifier certains comportements responsables de la réclusion de la victime. Mettre son enfant à l’abri de ce jeu, n’est pas une tâche évidente, dans une époque où même les petits et les adolescents ont un accès libre […]
OMG: Mirai-based Bot Turns IoT Devices into Proxy Servers
In preparation for our talk entitled “IoT: Battle of Bots” at the RootedCon Security conference that will be held in Madrid, Spain this March 2018, the FortiGuard Labs team encountered yet another new Mirai variant. Since the release of the source code of the Mirai botnet, FortiGuard Labs has seen a number […]