Travailler sur ses fichiers Adobe Illustrator depuis Pixelmator Pro ? C’est possible !
Après la prise en charge complète du HDR, Pixelmator Pro est désormais compatible avec deux nouveaux formats de fichiers Adobe Illustrator (AI) et Illustrator EPS, l’ancien format d’Illustrator.
Remote Encryption Attacks Surge: How One Vulnerable Device Can Spell Disaster
Ransomware groups are increasingly switching to remote encryption in their attacks, marking a new escalation in tactics adopted by financially motivated actors to ensure the success of their campaigns. « Companies can have thousands of computers connected to their network, and with remote ransomware, all it takes is one underprotected device to compromise the entire network, » […]
Social engineering et réseaux sociaux : comment sensibiliser les collaborateurs ?
Protéger nos organisations des cyberattaques sur les réseaux sociaux nécessite une sensibilisation et une vigilance de tous les collaborateurs.
Ce voleur d’iPhone donne une interview sur la sécurité
Dans la série faits divers, un voleur vient de révéler comment il arrivait à tromper ses victimes et les pousser à lui donner le code de leur iPhone !
Vous risquez d’être déçu par les bracelets de l’Apple Watch X !
Enfin, l’année prochaine l’Apple Watch devrait fêter son dixième anniversaire. Apparemment, Apple a prévu quelques nouveautés après des années de vaches maigres mais l’une d’entre elles aurait un petit inconvénient !
New Go-Based JaskaGO Malware Targeting Windows and macOS Systems
A new Go-based information stealer malware called JaskaGO has emerged as the latest cross-platform threat to infiltrate both Windows and Apple macOS systems. AT&T Alien Labs, which made the discovery, said the malware is « equipped with an extensive array of commands from its command-and-control (C&C) server. » Artifacts designed for macOS were first observed in July
3,500 Arrested in Global Operation HAECHI-IV Targeting Financial Criminals
A six-month-long international police operation codenamed HAECHI-IV has resulted in the arrests of nearly 3,500 individuals and seizures worth $300 million across 34 countries. The exercise, which took place from July through December 2023, took aim at various types of financial crimes such as voice phishing, romance scams, online sextortion, investment fraud, money laundering
Alert: Chinese-Speaking Hackers Pose as UAE Authority in Latest Smishing Wave
The Chinese-speaking threat actors behind Smishing Triad have been observed masquerading as the United Arab Emirates Federal Authority for Identity and Citizenship to send malicious SMS messages with the ultimate goal of gathering sensitive information from residents and foreigners in the country. « These criminals send malicious links to their victims’ mobile devices through SMS or
Product Explained: Memcyco’s Real-Time Defense Against Website Spoofing
Hands-On Review: Memcyco’s Threat Intelligence Solution Website impersonation, also known as brandjacking or website spoofing, has emerged as a significant threat to online businesses. Malicious actors clone legitimate websites to trick customers, leading to financial scams and data theft causing reputation damage and financial losses for both organizations and customers. The Growing Threat of
La cybersécurité, nouvelle discipline olympique ?
Les Jeux Olympiques attirent tout autant les amateurs de sports du monde entier que les cybercriminels les plus belliqueux. Or, ces derniers ne sont pas tous à ranger dans le même panier et nous pouvons distinguer trois types de cybercriminels : les activistes, les hackers et les criminels.