Last week, T-Mobile revealed that hackers had stolen records for “approximately” 15 million people. How approximate? If history is any guide, very approximate.
Source : Never trust the first number announced in a data breach – Quartz
Last week, T-Mobile revealed that hackers had stolen records for “approximately” 15 million people. How approximate? If history is any guide, very approximate.
Source : Never trust the first number announced in a data breach – Quartz
A man handed six years for threatening a local Georgia court clerk that he would post a sex tape of her on Facebook had his conviction overturned by the state’s Supreme Court. The justices ruled Monday that the Facebook postings did not constitute criminality or a « true threat » under the law, because the defendant did not express an « intent to commit an act of unlawful violence. »
Source : Threatening to post sex tape on Facebook is not a crime, court rules | Ars Technica
La croyance partagée que toutes les installations nucléaires sont isolées de l’Internet public est un mythe
Source : Les risques de cyberattaques contre les centrales nucléaires se multiplient
Les administrateurs se sentent en sécurité sous TOR, mais ce sont des amateurs qui ne maîtrisent pas la technologie.
Source : Plusieurs sites de vente de drogue du « Deep Web » français piratés
On Thursday T-Mobile revealed that hackers had breached Experian’s network and stolen a trove of T-Mobile’s data, which the carrier had sent to Experian to perform credit checks on potential customers seeking financing for phones or cellular plans. The data stolen from those 15 million victims includes their names, addresses, and birthdates, as well as encrypted social security numbers, drivers’ license ID numbers, and passport ID numbers.
Source : Hack Brief: Hackers Steal 15M T-Mobile Customers’ Data From Experian | WIRED
Lenovo seems to be testing the boundaries of trust.
Source : Lenovo collects usage data on ThinkPad, ThinkCentre and ThinkStation PCs | Computerworld
The environmental and public health cost of VW’s fraud is significant, but it’s easy to imagine industries and scenarios where it’d be much worse. Perhaps the best we can hope for is that the avoidance of regulatory frameworks on Internet of Things won’t have the kind of occasional systemic impact that large-scale financial misconduct has accustomed us to.
Source : The price of the Internet of Things will be a vague dread of a malicious world
Un million d’euros. C’est la somme qu’a promise, lundi 21 septembre, l’entreprise Zerodium à qui trouvera une faille informatique dans iOS 9, le nouveau logiciel qui équipe les iPhones. Zerodium est une nouvelle venue sur le marché de la sécurité informatique, mais pas une inconnue. Emanation de l’entreprise française Vupen, elle est spécialisée dans les failles dites « zero day », qu’elle achète à des hackers puis revend au plus offrant, le plus souvent de grandes agences de renseignement occidentales qui cherchent un moyen d’espionner leurs cibles – Vupen, puis Zerodium, ont affirmé ne pas travailler avec des régimes autoritaires.
Source : Le business des « zero day », ces failles inconnues des fabricants de logiciel
We’re reminded of this sad truism every time there’s a major leak—like the 2012 dump of passwords belonging to LinkedIn users, for example. Now researchers who have cracked more than 11 million Ashley Madison passwords have released the top 100 choices users of that site picked. It won’t come as a shock to hear that the passcodes are no better.
Source : Top 100 list shows Ashley Madison passwords are just as weak as all the rest | Ars Technica
The security of Internet-connected baby monitors got a failing grade from researchers who found critical vulnerabilities in all nine of the models they reviewed.
Source : 9 baby monitors wide open to hacks that expose users’ most private moments | Ars Technica
© 2026 no-Flux
Theme by Anders Noren — Up ↑