Security

CAM4: Data of more than 4 million French people leaked by a porn site

CAM4

Notably known for streaming webcams and free sex chats, the pornographic site CAM4 was recently the victim of a significant data leak. Indeed, this is the personal data of no less than 4 million French people who are thus found in nature… This is not an isolated case and many websites have been victims of a data leak at one

Read More »

Ransomware: Dark assessment for this hospital targeted by a cyberattack

photo d'un microscope

Sad results for this new cyberattack. Targeted by ransomware, the hospital located in Germany was unable to provide the care necessary to treat a patient. The latter was urgently transferred to another establishment but the journey was fatal. In the history of ransomware attacks, this is my first time that the human toll was so catastrophic. Indeed, the recent attack

Read More »

DUCKDUCKGO: A search engine that respects your privacy

duckduckgo

DUCKDUCKGO stands out from other search engines on the market, this tool effectively preserves your personal data. Here is everything you need to know about this exceptional tool. Against all expectations, GAFAM are taking advantage of the place they occupy on the internet to collect data on a large scale. Moreover, these companies are no longer content with collecting sensitive

Read More »

TOR: A network that protects your identity and personal data?

tor

Drawing on a vast peer-to-peer network combined with ingenious data encryption, TOR is often presented as a reliable browser that can guarantee your anonymity on the Web. At a time when many threats weigh on your digital life, TOR constitutes an interesting alternative for securing your data. However, recent revelations highlight the flaws of this tool. Flaws that malicious people

Read More »

COVID-19: Are tracking apps really safe?

photo de l'application stop covid

In order to limit the spread of the epidemic, the government is now encouraging the public to use health applications. Covid-19 monitoring derived from Big Data. However, like all medical and healthcare applications, 71% of them have a security vulnerability. These tools, although very popular, therefore constitute easy prey for cybercriminals. To produce this report, Intertrust analyzed more than 100

Read More »

Robinhood: the famous hacked trading application!

illustration de l'application mobile robinhood

Long considered one of the safest trading applications, Robinhood recently experienced its first hack. Result ? Thousands of users have seen their accounts completely liquidated. Robinhood: one of the trading giants across the Atlantic Robinhood was a real little revolution when it came out. This is one of the first applications of its kind. It does not only allow stock

Read More »

Impots.gouv: a clone of the official site steals your banking data

impots.gouv

Remember it was already two years ago, a group of hackers had put online a clone of the official site of impots.gouv.fr, a fraud which did not go unnoticed because thousands of people have their banking details stolen. A look back at an episode that is unfortunately not isolated. The scam was short-lived but before the alert was given by

Read More »

Google commits to fighting DDOS attacks with machine learning

google machine learning

Google intends to leave its mark in the field of cybersecurity. Last July, the Vermont giant launched a new service designed to thwart DDOS attacks. Small particularity of this system which aims to be innovative, it is based on machine learning. Cloud Armor Adaptive Protection: a service to protect against denial of service attacks Google engineers have just unveiled Cloud

Read More »

Camaïeu victim of a cyber attack

camaieu

Camaïeu, the ready-to-wear giant, was the target of a cyberattack last June. After remaining silent about this event, Ous Ouzzani, the general manager responsible for digital marketing, admits that the attack did take place. The manager, however, wanted to reassure Internet users and affirm that measures have been taken to strengthen the group’s IT security. A dark day for the

Read More »

Commerce: issues linked to private security

visuel securite commerce

After the confinement due to the covid-19 pandemic, between March and May 2020, the number of burglaries (household and professional sector) increased by 114%. These are in fact the figures revealed by the Minister of the Interior. This is also why traders, individuals and administrators believe that it is important to use the services of a private security agency to

Read More »

How to check if your email address has been hacked?

adresse email pirate

The information is sensational to say the least: the FBI has just dismantled a vast network of servers infested with the Emonet botnet. This malware specializes in intruding into email inboxes. This malicious program contributes to the mining of personal data. Read on instead. Almost no one is safe from hacking The Federal Bureau of Investigation (FBI) recently deployed an

Read More »

How to effectively protect your connected devices?

protection virus informatique

For several years, it has been impossible for us to do without our connected devices. Smartphones, laptops, tablets and even smartwatches are now an integral part of our daily lives, and for the geeks that we are, it is difficult to imagine doing without them. It must also be said that the ease with which it is possible to order

Read More »

These toys that spy on us

jouets espion

Toys bring joy to little ones, but can also be real sources of worry for adults. In addition to the risk of being poisoned by the manufacturing materials, there is also the possibility of being spied on. Find out more through these brief paragraphs. A connected toy can be a spy Researchers have recently discovered that certain connected toys are

Read More »

Alibaba victim of colossal data leak

alibaba leak

1 billion: this is the estimated number of data leaked from Alibaba, the Chinese online sales giant. According to the Wall Street Journal, the breach was mainly at Taobao, the subsidiary of the group founded by Jack Ma. This is essentially personal information of the multinational’s customers. For the moment, the information has not yet been published on the Web.

Read More »