in

Veille #Cybersécurité du 19 au 22 août 2014

Tout ce qu’il ne fallait pas manquer aujourd’hui dans votre veille #Cybersécurité. Bonne lecture !


Tesla crée une équipe de hackers pour sécuriser ses voitures


Alors que les voitures embarquent désormais beaucoup plus d’électronique que de mécanique, et sont destinées à conduire toutes seules, la question de la sécurité des systèmes d’information qui gèrent les freins, la direction, la vitesse ou la détection de l’environnement des véhic

http://www.numerama.com/magazine/30316-tesla-cree-une-equipe-de-hackers-pour-securiser-ses-voitures.html

NSA and GCHQ agents ‘leak Tor bugs’ alleges developer


Some US and UK cyberspies are deliberately undermining their workmates’ « dark web » surveillance efforts, according to the leading developer of software used to access hidden parts of the internet.

http://www.bbc.co.uk/news/technology-28886462

Stealing encryption keys through the power of touch


Researchers from Tel Aviv University have demonstrated an attack against the GnuPG encryption software that enables them to retrieve decryption keys by touching exposed metal parts of laptop computers. There are several ways of attacking encryption systems.

http://arstechnica.com/security/2014/08/stealing-encryption-keys-through-the-power-of-touch/

Chinese hackers spied on investigators of Flight MH370 – report


Malaysian officials investigating the disappearance of flight MH370 have been targeted in a hacking attack that resulted in the theft of classified material.

http://www.theregister.co.uk/2014/08/21/mh370_disaster_cyber_snooping/

CISOs Can Combat APTs with a Bit of Preparation


Advanced persistent threats are on the rise. It is time for CISOs to move beyond the traditional security measures.    It is too early to forget the story of the US retailer, Target and the massive data breach it encountered in December last year.

http://www.pcadvisor.co.uk/news/security/3539142/cisos-can-combat-apts-with-a-bit-of-preparation/

Hacker Or Military? Best Of Both In Cyber Security


How radically different approaches play out across the security industry. Three things happened to me before BlackHat 2014 to bring the entire NSA / Edward Snowden drama back to the forefront. The media reminded us of the one-year anniversary of the original Snowden leaks.

http://www.darkreading.com/operations/careers-and-people/hacker-or-military-best-of-both-in-cyber-security-/a/d-id/1298165

Spy agency uses game to find tomorrow’s cyber security stars


UK government security agency GCHQ wants the public to help protect a (fictitious) aerospace technology company threatened by imminent attack from cyber terrorists.

http://www.techrepublic.com/blog/european-technology/spy-agency-uses-game-to-find-tomorrows-cyber-security-stars/#ftag=RSS56d97e7

How to Save the Net: Break Up the NSA


By treating the Internet as a giant surveillance platform, the NSA has betrayed the Internet and the world. It has subverted the products, protocols, and standards that we use to protect ourselves. It has left us all vulnerable—to foreign governments, to cybercriminals, to hackers.

http://www.wired.com/2014/08/save-the-net-bruce-schneier/

Researchers Show Malware Can Hack Gmail App With 92% Success Rate


Researchers claims a new piece of malware can steal highly sensitive data from smartphone apps on Android, Windows Phone and iOS with up to a 92% success rate.

http://www.ibtimes.co.uk/researchers-show-malware-can-hack-gmail-app-92-success-rate-1462121

L’Allemagne veut renforcer sa « souveraineté numérique »


Le gouvernement allemand a dit hier vouloir protéger sa « souveraineté numérique » à l’occasion de la présentation d’un plan visant notamment à accroître l’innovation, à développer plus rapidement l’Internet à très haut débit et à mieux protéger les utilisateurs du Net.

http://www.lesechos.fr/tech-medias/hightech/0203714354480-lallemagne-veut-renforcer-sa-souverainete-numerique-1034608.php

Hackers Successfully Crack US Nuclear Regulator For The First Time… Twice


The United States has admitted that hackers attacking its nuclear power plants have already succeeded. Twice. An investigation by the Nuclear Regulatory Commission, which oversees the US nuclear power grid, uncovered two incidents in which hackers were able to access its internal documents.

http://www.huffingtonpost.co.uk/2014/08/19/hackers-nuclear-plants_n_5690547.html

Israël se dit


L’armée israélienne a annoncé mardi qu’elle avait subi fin juillet, lors de la Journée mondiale d’Al-Qods organisée chaque année en solidarité avec le peuple palestinien, « une des cyberattaques les plus virulente qu’ait connu le réseau internet israélien ».

http://www.numerama.com/magazine/30300-israel-se-dit-34pret-a-une-cyberguerre34-contre-les-pro-palestiniens.html

Bénin : plongée chez les marabouts arnaqueurs version 2.0


Une des nombreuses photos de marabouts proposant des consultations par Internet, qui circulent sur Facebook. « Marabout féticheur avec 30 ans d’expérience, je peux rendre n’importe quelle femme folle amoureuse de vous et même multiplier vos billets de banque.

http://observers.france24.com/fr/content/20140819-benin-marabout-escroc-arnaque-internet-brouteur

U.S. Cyber Command Continuing to Grow and Gain More Capabilities


FORT MEADE, Md., Aug. 18, 2014 – U.S. Cyber Command continues to expand its capabilities and capacity, Navy Adm. Mike Rogers said Aug. 14. Navy Adm. Mike Rogers, commander of U.S.

http://www.matthewaid.com/post/95120849021

How to implant a Trojan Horse: a user manual


This unsigned document, prepared in late 2009 by an employee of U.S. defense contractor CloudShield, accompanied the delivery of a prototype surveillance system to the German subsidiary of the United Kingdom’s Gamma Group.

http://apps.washingtonpost.com/g/page/world/how-to-implant-a-trojan-horse-a-user-manual/1257/

The Syrian Malware House of Cards


The geopolitical conflicts in the Middle East have deepened in the last few years. Syria is no exception, with the crisis there taking many forms, and the cyberspace conflict is intensifying as sides try to tilt the struggle in their favor by exploiting cyber intelligence and using distortion.

https://securelist.com/blog/research/66051/the-syrian-malware-house-of-cards/

Schrodinger’s Cat Video and the Death of Clear-Text


Read Morgan Marquis-Boire’s op-ed in The Intercept on the report’s findings. Read the report’s accompanying piece in the Washington Post.

https://citizenlab.org/2014/08/cat-video-and-the-death-of-clear-text/



Vous pouvez également vous abonner à cette veille #Cybersécurité via un flux RSS dédié : https://www.cyber-securite.fr/category/veille-cyber/feed

Vous aimerez aussi cet article:

Newsletter

Envie de ne louper aucun de nos articles ? Abonnez vous pour recevoir chaque semaine les meilleurs actualités avant tout le monde.

Laisser un commentaire

Votre adresse e-mail ne sera pas publiée. Les champs obligatoires sont indiqués avec *