Reviewing the spam filters: Malspam pushing Gozi-ISFB, (Wed, Jan 17th)

Introduction Researchers should review their spam filters to see what malware is getting caught.  Security professionals should be aware of current practices used by criminals pushing malware, even if it…

Zyklon Malware Delivered via Recent Office Flaws

A piece of malware known as Zyklon has been delivered by cybercriminals using some relatively new vulnerabilities in Microsoft Office, FireEye reported on Wednesday. read more Source: Security…

A Venture Capitalist's 2018 Outlook

As a longtime investor in companies offering cybersecurity solutions, Alberto Yépez of Trident Capital Cybersecurity is most concerned by a lack of investment in one key area; replacing aged technologies…

BlackBerry in Motion: Firm Aims to Secure Cars From Hackers

With Jarvis, BlackBerry Targets Connected – and Driverless – Vehicle SecurityBlackBerry mobile devices have become a rare sight. But drivers of Audi, GM and Mercedes vehicles may be using the…

Anatomy of a Cryptocurrency Phishing Campaign

North Korea Keeps Hacking for Bitcoins, Researchers SayVirtual currency that’s been surging in value, stored in internet-connected banks and virtual “hot wallets”: What could go wrong? The answer includes well…

Stack Ranking SSL Vulnerabilities: The ROBOT attack

At least two additional security vendors, including IBM and Palo Alto Networks, have been added to the list of vendors vulnerable to a variation on the Bleichenbacher attack called the…

World's Largest Spam Botnet Is Pumping and Dumping an Obscure Cryptocurrency

Necurs, the world’s largest spam botnet, is currently sending millions of spam emails that push an obscure cryptocurrency named Swisscoin. […] Source: leepingcomputer.com World’s Largest Spam Botnet Is Pumping…

Briton Pleads Guilty to Running Malware Services

Goncalo Esteves, a 24-year-old man from the United Kingdom, has pleaded guilty to charges related to creating and running services designed to help cybercriminals develop malware that would not be…

Rapport annuel – Les chiffres des attaques DDoS en France en 2017

NETSCOUT Arbor ATLAS a révélé les chiffres de l’année 2017 concernant le trafic des données internet en France. Source: Undernews Rapport annuel – Les chiffres des attaques DDoS en…

Threat Actors Quickly Adopt Effective Exploits

Cybercriminals and nation state groups were quick to adopt the most effective exploits last year, a new AlienVault report reveals. read more Source: Security Week Threat Actors…

Crypto-Mining Attack Targets Web Servers Globally

A new malware family is targeting web servers worldwide in an attempt to ensnare them into a crypto-mining botnet, security researchers have discovered. read more Source: Security Week…

-77% les abonnements CyberGhost VPN ! #Soldes #Soldes2018

CyberGhost VPN est certainement l’un des fournisseurs les plus populaires au monde ! A l’occasion des soldes, l’abonnement 3 ans est proposé à -77%, soit seulement 2,75€ / mois (offre…

La Chine a commencé à bloquer le protocole OpenVPN via son firewall géant

Alors que la Chine intensifie sa lutte et sa censure contre les VPN sur son territoire, des blocages d’envergures ciblant le protocole OpenVPN ont eu lieu depuis ce weekend. Bilan…

Comment convertir un fichier M4A en MP3 ?

Le format M4A n’est pas un format classique, que nous avons l’occasion de rencontrer tous les jours. En cela, il peut être difficile de le lire, car nous pouvons avoir…

Google Launches IT Support Training Program And Offers 10,000 Scholarships

As part of its Grow with Google program, Google has created an IT Support certification program based on the same methods that they use train their own employees. Called the…

Previous Page · Next Page