Veille #Cybersécurité du 07/08/2014

Tout ce qu’il ne fallait pas manquer aujourd’hui dans votre veille #Cybersécurité. Bonne lecture !

Black Hat 2014 : un pirate peut-il prendre le contrôle à distance d’une voiture?

Deux chercheurs ont analysé les risques liés aux technologies radiofréquence intégrées dans les voitures. Certains modèles s’en sortent beaucoup mieux que d’autres.

Former top brass say cyberspace key in new defense rules

US Homeland Security data possibly stolen in cyberattack

One of the US government’s biggest contractors revealed Wednesday that its computer systems were hit by hackers, according to the Washington Post.

Blocklists of Suspected Malicious IPs and URLs

Several organizations maintain and publish blocklists (a.k.a blacklists) of IP addresses and URLs of systems and networks suspected in malicious activities on-line. Many of these lists are available for free; some have usage restrictions:

Operation Poisoned Hurricane

Our worldwide sensor network provides researchers at FireEye Labs with unique opportunities to detect innovative tactics employed by malicious actors and protects our clients from these tactics.

Deploying and monitoring honeypots made easy

LogRhythm released a new analytics suite that monitors honeypots to track would-be attackers, enabling customers to analyze nefarious tactics and generate targeted threat intelligence that facilitates an ongoing adaptive defense posture.

Sophisticated Phishing is targeting French-Speaking banking users

A very sophisticated phishing campaign has been discovered by Malcovery Security, it targets French-speaking computer users to steal banking credentials.

L’arrestation du créateur de Blackhole n’a pas supprimé les menaces

Selon le rapport annuel sur la sécurité publié mardi par Cisco lors de la conférence sur la sécurité Black Hat qui se tient à Las Vegas, un grand nombre de kit permettant d’exploiter des failles logicielles essayent de supplanter le fameux kit Blackhole et les menaces ne sont pas écartées.

Why I’m Not at Black Hat or DEFCON

Making software do things for us is a lot like stringing words together to make coherent and interesting sentences. We know how to gather, record, and reason over data. We know efficient and proven algorithms for all sorts of interesting problems.

Oh, great. It’s not that hard to hack TSA’s airport security scanning machines

LAS VEGAS — It’s been more than a decade since 9/11 brought a stringent screening process to all airports.

Black Hat 2014 Keynote: What InfoSec Needs to Do

In a far-ranging speech, Geer outlined 10 policy proposals “on a suite of pressing current topics,” such as government surveillance, embedded systems security, net neutrality, the right to be forgotten, and the state of vulnerability research and disclosure, to name just a few.

Creating a Bitcoin-Mining Botnet at No Cost

At the Black Hat 2014 conference in Las Vegas, Rob Ragan and Oscar Salazar, penetration testers from Bishop Fox, demonstrated a technique for cloud-based bitcoin mining that cost them exactly…nothing. At this moment, one bitcoin is worth $576.57.

How To Talk To Your Employees About Cybersecurity (Without Putting Them To Sleep)

You can just see the eye-rolls across the conference table when you bring it up.

Black Hat 2014 : peut-on hacker un avion ?

Un expert affirme pouvoir pirater les systèmes de navigation et de sécurité à bord des avions et des navires qui utilisent des communications satellites. Il en fera la démonstration le 7 août prochain à la conférence Black Hat.

Buy All the Cybersecurity Vulnerabilities: Black Hat Keynote

LAS VEGAS: Dan Geer, a well known and respected digital security expert and the CISO of In-Q-Tel, had a unique opportunity this year, as he was the only keynote speaker at the Black Hat USA conference.

Cybersecurity experts take Russian hacking scare ‘with a pinch of salt’

Security researchers have expressed concern over the claim that more than 4.5bn user credentials including 1.2bn unique usernames and passwords have been amassed by a Russian cybercriminal gang.

Researchers Get $10M to Build Modular Cybersecurity System

A project headed by Boston University researchers has received a $10 million grant to build a cloud-based modular cybersecurity system. The grant is a Frontier Award, awarded by the National Science Foundation (NSF) as part of its Secure and Trustworthy Cyberspace program.

A Cold War in Cyberspace: Does the US Have Jurisdiction Over Russian Hackers?

The recent arrest of Russian citizen Roman Valeravich Seleznev by US authorities for alleged cyber crimes highlights one of the most difficult jurisdictional problems facing the international community today.

Mots de passe volés: Pourquoi il ne faut pas paniquer

INFORMATIQUE – L’entreprise qui révèle ce casse est loin d’être transparente sur l’ampleur réelle du problème… Peur sur le Net.

A Peek Inside The Black Hat Show Network

Black Hat USA’s wireless network offers authenticated, secure access as well as ‘open’ access.

Vulnerability Management: Just Turn It Off! Part II

Our last post in the “Turn It Off!” blog series discussed some of the most common and yet unnecessary features that can make your environment more vulnerable, including JBoss JMX consoles, server banners and the Apache HTExploit.

Researcher demonstrates how he controlled room devices in luxury hotel

At a Black Hat 2014 session, one hacker revealed how he was able to control basic amenities in a luxury hotel – and why the hospitality industry must update its security policies to take into consideration Internet of Things threats. While staying at the St.

MDM is Terrible: When Security Solutions Hurt Security

Much to Blackberry’s chagrin, most people aren’t interested in carrying a stodgy work phone along with the fun smart phone they picked out themselves. That’s why big companies have invested heavily in mobile device management (MDM).

US Department of Homeland Security contractor hacked

According to the Washington Post, the attackers managed to steal personal information about Department of Homeland Security’s (DHS) employees from systems of Virginia-based US Investigations Services.

Cisco 2014 Midyear Security Report: Threats – Inside and Out

Through our ongoing “Inside Out” project at Cisco, our threat researchers have the opportunity to closely examine select networks—with our customers’ permission—to identify evidence of malicious traffic.

Snowden allowed to stay in Russia for three more years

NSA whistleblower Edward Snowden has been permitted to stay in Russia for another three years, and is free to travel within the country and abroad, Russia Today reports.

Magnitude Exploit Kit Backend Infrastructure Insight – Part I

In our recently released Trustwave Global Security Report Online and previous Magnitude blog post, A Peek Into the Lion’s Den – The Magnitude [aka PopAds] Exploit Kit, we detailed our discovery of one of the more prevalent exploit kits seen these days, showed an inside look at the control pane

New PCI Guidance for Third-Party Risks

Card data security risks posed by third parties have gotten renewed attention in recent months because of a string of U.S. retailer breaches that have compromised millions of credit and debit cards.

Cybersecurity: What the U.S. can teach Europe

Having attended two reputable information security conferences this year, one on each side of the Atlantic, a few observations emerged on the differences and similarities of opinion on cybersecurity issues in the U.S. and Europe.

L’ANSSI publie la version anglaise des mesures visant à renforcer la cybersécurité des systèmes industriels

Depuis février 2013, les acteurs industriels (utilisateurs, équipementiers, intégrateurs, associations et groupements d’industriels, etc.

Le « secret des affaires » de retour dans le débat public, encore un essai sans suite ou réelle prise de conscience ?

Depuis plusieurs années maintenant les entreprises françaises estiment que leur patrimoine immatériel n’est pas assez protégé par la législation.

The Epic Turla Operation

Over the last 10 months, Kaspersky Lab researchers have analyzed a massive cyber-espionage operation which we call « Epic Turla ».

Vous pouvez également vous abonner à cette veille #Cybersécurité via un flux RSS dédié :

Vous aimerez aussi cet article:


Envie de ne louper aucun de nos articles ? Abonnez vous pour recevoir chaque semaine les meilleurs actualités avant tout le monde.

Laisser un commentaire

Votre adresse e-mail ne sera pas publiée. Les champs obligatoires sont indiqués avec *