Google has been hit by a record-breaking $5 billion antitrust fine by the European Union regulators for abusing the dominance of its Android mobile operating system and thwarting competitors. That’s the largest ever antitrust penalty. Though Android is an open-source and free operating system, device manufacturers still have to obtain a license, with certain conditions, from Google to


Source de l’article sur The Hacker News

Microsoft today launched a new bug bounty program for bug hunters and researchers finding security vulnerabilities in its « identity services. » Hacking into networks and stealing data have become common and easier than ever but not all data holds the same business value or carries the same risk. Since new security today depends on the collaborative communication of identities and identity data


Source de l’article sur The Hacker News

In a legal extradition tug-of-war between the United States and Russia, it seems France has won the game, surprisingly. A Greek court has ruled to extradite the Russian cybercrime suspect and the former operator of now-defunct BTC-e crypto exchange to France, instead of the United States or to his native Russia, according to multiple Russian news outlets. Alexander Vinnik, 38, has been


Source de l’article sur The Hacker News

A 21-year-old New Jersey woman has been charged with hacking into the email accounts of pop star and actress Selena Gomez, stealing her personal photos, and then leaked them to the Internet. Susan Atrach of Ridgefield Park was charged Thursday with 11 felony counts—five counts of identity theft, five counts of accessing and using computer data to commit fraud or illegally obtain money,


Source de l’article sur The Hacker News

As it was speculated that the author of LuminosityLink RAT was arrested last year, a plea agreement made available to the public today confirmed the news. Back in September last year, Europol’s European Cybercrime Centre (EC3) and National Crime Agency began the crackdown on the LuminosityLink RAT, targeting sellers and users of the malware, which resulted in the seizure of a considerable


Source de l’article sur The Hacker News

Pour soutenir l’augmentation continue du trafic aérien, avec des mouvements d’aéronefs et de passagers chaque jour plus nombreux, le secteur du transport aérien se numérise. En conséquence, et à l’instar de l’ensemble des activités technologiques, ce secteur est exposé aux risques numériques.

Source : Une coopération renforcée entre l’ANSSI et la Direction de la sécurité de l’aviation civile (DSAC)

Les petites et moyennes entreprises (PME) sont devenues une cible facile, lucrative et croissante pour les cyberattaquants…. L’article COMMENT SÉCURISER LES PETITES ET MOYENNES ENTREPRISES (PME) ? est apparu en premier sur Data Security Breach .

Source : Comment SéCuriser Les Petites Et Moyennes Entreprises (Pme) ?

The US Justice Department has announced criminal indictments against 12 Russian intelligence officers tied to the hack of the Democratic National Committee (DNC) during the 2016 US presidential election campaign. The charges were drawn up as part of the investigation of Russian interference in the 2016 US presidential election by Robert Mueller, the Special Counsel, and former FBI director.


Source de l’article sur The Hacker News

Security researchers have uncovered a « highly targeted » mobile malware campaign that has been operating since August 2015 and found spying on 13 selected iPhones in India. The attackers, who are also believed to be operating from India, were found abusing mobile device management (MDM) protocol—a type of security software used by large enterprises to control and enforce policies on devices


Source de l’article sur The Hacker News

Google has by default enabled a security feature called « Site Isolation » in its web browser with the release of Chrome 67 for all desktop users to help them protect against many online threats, including Spectre and Meltdown attack. Site Isolation is a feature of the Google Chrome web browser that adds an additional security boundary between websites by ensuring that different sites are always


Source de l’article sur The Hacker News