OurMine Hackers Hacked VEVO and leaked 3.12TB data online

cyber

The infamous hacker group OurMine targeted the popular video hosting service and leaked 3.12TB worth of data online. The hacker group is constantly in news by attacking various popular companies including HBO recently. Now they leaked 3.12TB of data and some of the documents leaked contain very sensitive information according […]

The Fuzzing Project

cyber

Optionsbleed – HTTP OPTIONS method can leak Apache’s server memory Posted by Hanno Böck on Monday, September 18. 2017 If you’re using the HTTP protocol in everday Internet use you are usually only using two of its methods: GET and POST. However HTTP has a number of other methods, so I wondered what […]

Chrome will tag FTP sites as “Not secure”

cyber

Google Chrome 63, expected to be released sometime around December, will label resources delivered over the FTP protocol as “Not secure”, a member of the Chrome security team has shared. To read the original article : https://www.helpnetsecurity.com/2017/09/15/chrome-ftp-insecure/

Faces of Fraud 2017: Survey Analysis

cyber

Only 38 percent of banking/security leaders have high confidence in their organization’s ability to detect and prevent fraud, according to the latest Information Security Media Group Faces of Fraud Survey. John Gunn of VASCO Data Security weighs in on how to improve that confidence. To read the original article : https://www.inforisktoday.com/faces-fraud-2017-survey-analysis-a-10241

UBCI 1ère Banque de la place certifiée PCI-DSS

cyber

UBCI a obtenu sa certification PCI – DSS V3.1 (Payment Card Industry – Data Security Standard), accordée par la société ControlCase. Ce standard international, imposé par VISA Inc, est soumis à 12 exigences de sécurité visant à garantir aux clients un niveau de sécurité maximal pour leurs données de cartes […]

Cybercrime update: Big trouble in dark markets?

cyber

Many of the components required to commit cybercrime can be bought and sold online if you know the right part of the internet in which to look. These “dark markets” also enable cybercriminals to monetize the fruits of their larcenous labors, from botnet building to credential theft. In the first […]