Tout ce qu’il ne fallait pas manquer aujourd’hui dans votre veille #Cybersécurité. Bonne lecture !
—
Dutch spy agencies can receive NSA data, court rules
Dutch intelligence services can receive bulk data that might have been obtained by the U.S. National Security Agency (NSA) through mass data interception programs, even though collecting data that way is illegal for the Dutch services, the Hague District Court ruled Wednesday.
http://www.pcworld.com/article/2457400/dutch-spy-agencies-can-receive-nsa-data-court-rules.html#tk.rss_privacy
The psychology of phishing
Phishing emails are without a doubt one of the biggest security issues consumers and businesses face today. Cybercriminals no longer send out thousands of emails at random hoping to get a handful of hits, today they create highly targeted phishing emails which are tailored to suit their recipients.
http://www.net-security.org/article.php
Attackers Bypass 2FA Systems Used by Banks in ‘Operation Emmental’
SMS-based two-factor authentication (2FA) mechanisms used by banks to secure their customers’ accounts have been bypassed by cybercriminals using a combination of malware, mobile apps, rogue DNS servers, and phishing sites, according to a report published by Trend Micro on Tuesday.
http://www.securityweek.com/attackers-bypass-2fa-systems-used-banks-operation-emmental
Hacker claims breach of Wall Street Journal and Vice websites, punts ‘user data’ for sale
An individual going under the handle « w0rm » posted screenshots in a bid to substantiate his claims of hacks against the WSJ (here) and Vice (here) before offering to sell stolen databases from both publications for 1 BTC apiece ($620).
http://www.theregister.co.uk/2014/07/22/wsj_vice_hack_claims_w0rm_punts_stolen_data/
Kali Linux 1.0.8 Released with EFI Boot Support
The long awaited Kali Linux USB EFI boot support feature has been added to our binary ISO builds, which has prompted this early Kali Linux 1.0.8 release.
http://www.kali.org/news/kali-1-0-8-released-uefi-boot-support/
Keeping Spies Out: German Ratchets Up Counterintelligence Measures
Officials in Berlin were long in denial that their closest allies were spying on Germany. Now, ministries are undertaking measures to improve security and counterintelligence. They’re anticipating frosty relations with the US for some time to come.
http://www.spiegel.de/international/world/germany-increases-counterintelligence-in-response-to-us-spying-a-982135.html
BlackHat USA 2014 : les outils d’anonymisation doivent-ils s’inquiéter ?
La conférence Black Hat USA commencera le 2 aout à Las Vegas. De nombreuses conférences sur la cyber sécurité sont attendues, mais en amont de cet événement, plusieurs annonces jettent un doute sur la fiabilité des outils de protection de la vie privée.
http://www.zdnet.fr/actualites/blackhat-usa-2014-les-outils-d-anonymisation-doivent-ils-s-inquieter-39804137.htm#xtor=RSS-1
Les Forces Terrestres et le cyberespace comme nouveau champ de bataille (étude)
Mai 2014 – La cyberdéfense constituant désormais une dimension importante dans les conflits actuels, il devient nécessaire de s’interroger sur les vulnérabilités propres aux forces terrestres dans le contexte de la montée en puissance de la conduite d’opérations militaires dans le cyberespace.
http://www.cdef.terre.defense.gouv.fr/a-la-une/les-ft-et-le-cyberespace
The Challenge Of Keeping Tabs On The NSA’s Secretive Work
Here’s a question with no easy answer: How do you hold the nation’s spy agencies accountable — when they control the secrets? Former National Security Agency contractor Edward Snowden apparently thought the answer was to blow the lid off some of the NSA’s highly classified programs.
http://www.npr.org/2014/07/23/333925796/the-challenge-of-keeping-tabs-on-the-nsas-secretive-work
Here’s How To Invent A Person Online
As an artist, I’ve long been interested in identity and the ways it is represented. My first serious body of work, Springfield, used the concept of a Midwestern nowhere to explore representations of middle-American sprawl.
http://www.businessinsider.com/how-to-invent-a-person-online-2014-7
Apple Posts Q&A Addressing ‘Backdoor’ Concerns
The iPhone manufacturer posted small descriptions of what com.apple.mobile.pcapd, com.apple.mobile.file_relay, and com.apple.mobile.
http://gadgets.ndtv.com/mobiles/news/apple-posts-qa-addressing-backdoor-concerns-563581
—
Vous pouvez également vous abonner à cette veille #Cybersécurité via un flux RSS dédié :
https://www.cyber-securite.fr/category/veille-cyber/feed
Vous aimerez aussi cet article: