What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
NetworkWorld.webp 2016-08-24 09:48:00 Startup IDVector anonymizes like Tor (lien direct) A pair of former defense industry cyber security contractors is launching IDVector, a service that creates encrypted connections through an anonymizing network to shield users' locations and to protect their machines from internet-borne attacks.IDVector Network passes customer traffic through a multi-node encrypted path before dropping it onto the open internet at locations removed from customers' actual geographical locations.That tunneling makes it difficult for eavesdroppers to snoop content and identify where customers are located, making it possible for customers to use public Wi-Fi safely, say the company's founders, CEO Ben Baumgartner and CTO Andrew Boyce.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2016-08-24 04:34:00 19% of shoppers would abandon a retailer that\'s been hacked (lien direct) Nearly a fifth of shoppers would avoid at a retailer that has been a victim of a cybersecurity hack, according to a survey.The 2016 KPMG Consumer Loss Barometer report surveyed 448 consumers in the U.S. and found that 19% would abandon a retailer entirely over a hack. Another 33% said that fears their personal information would be exposed would keep them from shopping at the breached retailer for more than three months.The study also looked at 100 cybersecurity executives and found that 55% said they haven't spent money on cybersecurity in the past yearand 42% said their company didn't have a leader in charge of information security.To read this article in full or to leave a comment, please click here Guideline
NetworkWorld.webp 2016-08-24 04:26:00 (Déjà vu) Who gets to telecommute once Zika\'s bite comes closer? (lien direct) Florida's announcement Tuesday that a locally transmitted Zika case turned up Pinellas County, which includes St. Petersburg, moves reported cases of the virus a little closer to Georgia. That's where Maria Stephens, who is pregnant, works as a senior data research analyst.Stephens was initially skeptical about Zika and paid little attention to the headlines about it.“I don't really respond to dramatization and felt that things were possibly being blown out of proportion,” said Stephens. “I'm a statistician at heart and only listen to numbers, so when my quant-minded OB-GYN shared the figures with me, this threat became a lot more real."To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2016-08-24 04:22:00 A deeper look at business impact of a cyberattack (lien direct) Few would dispute that cyberattacks are increasing in frequency and in intensity, and most organizations confirm they have now suffered at least one cyber incident. But do those organizations have a true sense of the full impact on the organization? After all, the direct costs commonly associated with a data breach are far less significant than the “hidden costs” incurred.Indeed, the “hidden” costs can amount to 90 percent of the total business impact on an organization, and will most likely be experienced two years or more after the event. These are among the findings of a recent study by Deloitte Advisory entitled, “Beneath the Surface of a Cyberattack: A Deeper Look at the Business Impacts.”To read this article in full or to leave a comment, please click here Deloitte
NetworkWorld.webp 2016-08-23 23:27:36 NYT says Moscow bureau was targeted by cyberattack (lien direct) The Moscow bureau of The New York Times was the target of a cyberattack, though there are no indications yet that the hackers were successful, according to the newspaper.The hackers are believed to be Russian, the newspaper said Tuesday evening. It quoted a spokeswoman for the newspaper as saying that it had not hired outside firms to investigate the attempted breach.Earlier in the day, CNN reported that the FBI and other U.S. security agencies were investigating attacks by hackers, thought to be working for Russian intelligence, that targeted reporters at the New York Times and other U.S. news organizations. CNN quoted unnamed U.S. officials briefed on the matter.To read this article in full or to leave a comment, please click here ★★★★★
NetworkWorld.webp 2016-08-23 14:42:20 Ashley Madison misled users with a fake security award (lien direct) It's never a good sign when a website markets itself with a phony security award. But that's what Ashley Madison did prior to last year's massive data breach.On Monday, privacy officials in Canada and Australia found that the Canadian adultery website used deceptive and confusing practices to make customers think the service was secure.Privacy authorities from both countries have been investigating Ashley Madison following last year's hack, which exposed personal data on 36 million users, including names, credit card numbers, and in some cases, their sexual fantasies. To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2016-08-23 04:36:00 Imperva: Application layer DDoS attacks are on the rise. (lien direct) Application layer DDoS attacks are becoming more common, perhaps because they cost less for malicious actors to execute and can more effectively evade defenses than network layer attacks, Imperva says.One such attack generated 8.7Gbps at its peak, “unheard of in relation to application layer assaults,” in an effort to thread its way through the DDoS mitigations that had been set up to defend against such attacks, according to Imperva's “DDoS Threat Landscape Report 2015-2016” released today.Application layer attacks can be measured in responses per second required from the application targeted, and they generally require less volume than network layer attacks to succeed, the report says. That means they require fewer botnet resources, if botnets are the platform from which the attack is launched.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2016-08-22 16:34:25 Republicans subpoena three tech companies over Clinton emails (lien direct) Republicans in Congress have subpoenaed three technology companies that declined to hand over documents about former U.S. Secretary of State Hillary Clinton's private email server.On Monday, Datto, SECNAP Network Security and Platte River Networks received subpoenas from U.S. Rep. Lamar Smith, a Texas Republican.Smith is demanding documents from the companies as two congressional committees from the House and Senate investigate the Democratic presidential nominee's use of a private email server while she was secretary of state.All three companies either sold products used in Clinton's email server or were hired to maintain it, Smith said in the subpoenas. For example, Datto provided an online backup system that eventually began storing Clinton's emails off site.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2016-08-21 08:33:00 Researchers create 3D faces from online photos to defeat face authentication systems (lien direct) Security researchers continue to find ways around biometric-based security features, including a new attack which can defeat face authentication systems.You might be careful about posting photos of yourself online, either refraining from it or setting the images to private, but your “friends” might post pictures of you online. It wouldn't matter if those pictures of you are low quality or there were as few as three publicly available photos of you, researchers from the University of North Carolina have developed a virtual reality-based attack that can reproduce your face well enough to trick face authentication systems.In “Virtual U: Defeating Face Liveness Detection by Building Virtual Models from Your Public Photos” (pdf), the researchers called “the ability of an adversary to recover an individual's facial characteristics through online photos” an “immediate and very serious threat.” The team devised an attack which can bypass “existing defenses of liveness detection and motion consistency.”To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2016-08-19 09:24:59 Shared code in Snowden leaks and NSA breach support hackers\' claims (lien direct) Documents leaked by former National Security Agency contractor Edward Snowden share a malware tracking code with several files released this week by hacking group Shadow Brokers, according to a news report.Shadow Brokers claimed they had hacked a cyberespionage team linked to the U.S. spy agency when they released a group of sample files earlier this week. Similarities between the Shadow Broker files and information in documents leaked by Snowden give credence to the claims by the anonymous hacking group.Fourteen files in the Shadow Brokers leak contain a 16-character string, "ace02468bdf13579," that NSA operatives used to track their use of one malware program, The Intercept reported Friday. That tracking string was described in an NSA manual for implanting malware originally leaked by Snowden, The Intercept reported.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2016-08-18 17:30:10 The NSA\'s hoard of cyber weapons makes some experts nervous (lien direct) The disclosure this week of a cache of files supposedly stolen from the National Security Agency has put a spotlight on secret cyber weapons the NSA has been holding -- and whether they should be disclosed.Security researchers have been poring over a sample set of hacking tools that may have been stolen from the NSA.An anonymous group called the Shadow Brokers has posted the samples online and is auctioning off the rest, claiming they contain cyber weapons that rival the Stuxnet computer worm.Experts say the whole matter points to the danger of the NSA hoarding cyber weapons: they could fall into the wrong hands.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2016-08-17 17:20:50 Alleged NSA data dump contain hacking tools rarely seen (lien direct) A stolen cache of files that may belong to the National Security Agency contains genuine hacking tools that not only work, but show a level of sophistication rarely seen, according to security researchers.That includes malware that can infect a device's firmware and persist, even if the operating system is reinstalled.  “It's terrifying because it demonstrates a serious level of expertise and technical ability,” said Brendan Dolan-Gavitt, an assistant professor at New York University's school of engineering.He's been among the researchers going over the sample files from the cache, after an anonymous group called the Shadow Brokers posted them online.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2016-08-17 05:41:00 Microsoft to end decades-old pick-a-patch practice in Windows 7 (lien direct) Microsoft yesterday announced that beginning in October it will offer only cumulative security updates for Windows 7 and 8.1, ending the decades-old practice of letting customers choose which patches they apply."Historically, we have released individual patches ... which allowed you to be selective with the updates you deployed," wrote Nathan Mercer, a senior product marketing manager, in a post to a company blog. "[But] this resulted in fragmentation where different PCs could have a different set of updates installed leading to multiple potential problems."To read this article in full or to leave a comment, please click here Guideline
NetworkWorld.webp 2016-08-16 06:00:02 Cerber ransomware rakes in cash by recruiting unskilled hackers (lien direct) A ransomware strain has been making a pretty penny by opening its doors to unskilled hackers.  Security firm Check Point gained a rare look at the inner workings of the Cerber ransomware and found that its developers are building a network of partners to attack more targets -- and rake in more cash.  Check Point also warned that because of Cerber, more unskilled cybercriminals might choose to participate in ransomware schemes.  "Even the most novice hacker can easily reach out in closed forums to obtain an undetected ransomware variant," it said in a new report.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2016-08-16 05:50:00 Microsoft\'s .Net Framework will get its own Patch Tuesday (lien direct) Microsoft in October is introducing .Net Framework Monthly Rollup to provide security and quality updates to its programming model for Windows. The move aligns with the Windows Monthly Rollup, which does the same thing for the Windows OS.Both rollups were unveiled on Monday and will be available on Patch Tuesday each month, according to Microsoft.[ Solve your Win10 installation headaches with our Windows 10 Installation Superguide. Download it today! | Stay up on key Microsoft technologies with the Windows newsletter. ] "The .Net Framework Monthly Rollup is a single install that updates each supported .Net Framework version on a machine to its latest respective update level," said Microsoft's Stacey Haffner. "Each monthly rollup supersedes the last one, so you if you've missed the last few months of updates, you only need to install the latest rollup to update to the latest update level." The rollup installs only security and reliability updates, not a new version of .Net Framework.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2016-08-16 05:49:00 How 3 fintech startups are shaking up security (lien direct) Today's financial technology startups (“fintech” for short) are taking on some of today's greatest security challenges. Armed with drive and a need for innovation, these companies have created new services and security approaches that are changing the financial industry. Here's how three such companies are competing based on security.Know your client Proving personal identity is a key component of security for the financial industry. Most major financial institutions require customers to open accounts in person, present government-issued identity documents and wait hours or days to open an account. But customers today expect faster services - including the account opening process.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2016-08-16 05:28:00 RiskSense lands $7M for assessment service (lien direct) RiskSense, software-as-a-service that evaluates the security of corporate networks and generates a risk score, has been self-financed since its launch last year, but now has harnessed venture funding to help boost its R&D and hire marketing and sales staff.The $7 million funding round includes Paladin Capital Group, Sun Mountain Capital, EPIC Ventures, and other strategic and private investors.081616srinivas mukkamala risksense Tim Greene RiskSense CEO Srinivas MukkamalaTo read this article in full or to leave a comment, please click here
NetworkWorld.webp 2016-08-15 11:02:00 Much ado about the ransomware scourge (lien direct) The Federal Trade Commission said it will hold a public workshop about all things ransomware on Sept. 7.“With alarming frequency, ransomware hackers are sneaking into consumer and business computers, encrypting files containing photos, documents and other important data, and then demanding a ransom in exchange for the key needed to decrypt the files. Consumers, businesses, and government agencies are falling prey to these schemes, including hospitals whose servers may contain sensitive patient data. New forms of ransomware encrypt files of website operators, threatening not only their files containing stored data, but the very files needed to operate their websites. Other variants of ransomware are now targeting files on mobile devices,” the FTC wrote.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2016-08-14 20:07:55 HEI Hotels reports point-of-sale terminals breach (lien direct) HEI Hotels & Resorts has reported a possible compromise of payment card information at its point-of-sale terminals, the latest in a string of attacks on such systems at hotels, hospitals and retailers. The company, which manages close to 60 Starwood, Hilton, Marriott, Hyatt and InterContinental properties, said it appears that malicious software was installed on the payment processing systems at certain properties, with the aim of harvesting the card data as it was routed through the systems. The compromise may have possibly affected the personal information of some hotel customers who made payment card purchases at point-of-sale terminals, such as food and beverage outlets, at certain HEI managed properties.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2016-08-12 19:28:35 Guccifer 2.0 takes credit for hacking another Democratic committee (lien direct) The hacker who claims to have breached the Democratic National Committee's computers is now taking credit for hacking confidential files from a related campaign group.Guccifer 2.0 alleged on Friday that he also attacked the servers of the Democractic Congressional Campaign Committee (DCCC). He posted some of the purported files on his blog, and is promising journalists "exclusive materials" if they contact him directly.Although Guccifer 2.0 claims to be a lone hacktivist, some security experts believe he's actually a persona created by Russian government hackers who want to influence the U.S. presidential election.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2016-08-12 05:43:00 IDG Contributor Network: Cybersecurity skills crisis creating vulnerabilities (lien direct) Cybersecurity staffing continues to be a problem, a new report has found. Intel Security says a massive 82 percent of IT professionals that it surveyed are battling a shortage in workers specializing in cybersecurity.It's proving to be a major deficit and is resulting in serious damage. Australia, France, Germany, Israel, Japan, Mexico, U.S. and U.K. are all hurting for hires, the study says.Market research specialist Vanson Bourne performed the survey and interviewed IT decision makers working in cybersecurity in developed countries.+ Also on Network World: Closing the cybersecurity talent gap, one woman at a time +To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2016-08-12 04:42:48 Pakistan cybercrime law scares by its vagueness (lien direct) Pakistan's National Assembly has passed a cybercrime bill that provides for censorship of the internet and could also be misused by the vagueness of some of its provisions.Section 34 of the new Prevention of Electronic Crimes Act gives authorities the power to remove or block access to a variety of content.It provides for such action in “the interest of the glory of Islam or the integrity, security or defence of Pakistan or any part thereof, public order, decency or morality, or in relation to contempt of court or commission of or incitement to an offence under this Act, ” according to a copy of the bill on the website of the Digital Rights Foundation.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2016-08-11 16:45:09 Millions of Volkswagens can be broken into with a wireless hack (lien direct) Millions of Volkswagens built over the past 20 years can be broken into with a hack that exploits the cars' remote control key systems, security researchers have found. Most VWs built since 1995 use one of a handful of electronic “master keys” to remotely open and lock the doors, and those keys can be extracted by reverse engineering the firmware, the researchers wrote in a new paper.  That alone isn't enough to break into a car -- the master key has to be combined with a unique code generated by each remote key device. But the researchers also devised a way to do that, assembling a piece of radio hardware costing around $40.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2016-08-11 10:26:00 \'Golden keys\' that unlock Windows\' Secure Boot protection discovered (lien direct) Microsoft just offered a masterclass on why building back doors into secure systems are a bad idea. Two security researchers who go by the handles @never_released and @TheWack0lian on Twitter recently announced in a blog post that malicious actors can bypass Windows' Secure Boot feature on vulnerable machines, as first reported by ZDNet.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2016-08-11 10:22:00 Four free tools for handling Amazon Web Services security incident response (lien direct) Responding to security incidents that involve deployments within Amazon Web Services is a lot different from responding to incidents that happen on corporate-owned gear, and two researchers have come up with free tools to make that process easier.Obtaining forensic evidence is different, primarily because security pros can't obtain physical access to the machines on which their AWS instances are running.+More on Network World: Black Hat: 9 free security tools for defense & attacking+To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2016-08-11 05:27:00 Twitter is not liable for ISIS activity on its service, judge rules (lien direct) Twitter is not liable for providing material support to the Islamic State group, also referred to as the ISIS, by allowing its members to sign up and use accounts on its site, a federal judge in California ruled Wednesday.The lawsuit against Twitter filed by the familes of two victims of a terror attack in Jordan is similar to another filed by the father of a victim of the Paris attack in November against Twitter, Google and Facebook for allegedly providing material support to terrorists by providing them a forum for propaganda, fund raising and recruitment.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2016-08-11 05:18:00 6 shocking gaps in your data security strategy (lien direct) Crumbling wallsdata security strategyImage by Steve TraynorDespite billions of dollars invested in cybersecurity, businesses lose critical data daily. We've secured our organizations like fortresses, building layers of walls around networks, applications, storage containers, identity, and devices. But when an unhappy employee moves high-value designs onto a USB drive or sends important email attachment outside the “secure” network, those walls crumble the moment we need them the most.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2016-08-11 05:16:00 Samsung both denies and admits mobile payment vulnerability (lien direct) Security researcher Salvador Mendoza demonstrated a flaw in Samsung Pay at Black Hat last week, in which the tokens used to secure transactions could be predicted, and used to authorize fraudulent payments. Samsung responded with a statement calling the report "simply not true." "Samsung Pay is safe, secure and consumers can be assured that there is no known risk associated to using our payment service," the company said. But then, in a separate, more detailed document, Samsung admitted that it is possible to capture a token, but said that it was extremely difficult to do so.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2016-08-11 03:00:00 Developers need secure coding environments (lien direct) InfoWorld talks with White Ops' Dan Kaminsky about how we can help developers code more securely without killing their will to innovate
NetworkWorld.webp 2016-08-10 16:15:28 In terms of spam, Donald Trump is beating Hillary Clinton hands down (lien direct) As the U.S. presidential election nears, Donald Trump is emerging as the clear winner -- at least when it comes to having his name used in spam messages.Spammers and cyber attackers are using Trump's name far more than Hillary Clinton's in emails pushing get rick quick schemes or phishing for personal information, according to an analysis from Proofpoint.The security firm scanned the subject line of emails received by its customers in June and July looking for occurrences of "trump" or "clinton," and found that the Republican nominee appeared in 169 times as many emails as his Democratic opponent.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2016-08-09 00:00:00 Install Windows 10 with privacy settings (lien direct) The Express settings option will make your installation go faster, but you might inadvertently agree to conditions you wouldn't choose for yourself.
NetworkWorld.webp 2016-08-04 10:56:00 How to prevent potential HTTPS URL hijacking (lien direct) When a computer connects to a public Wi-Fi network or an untrusted LAN, a malicious actor could potentially compromise a browser's HTTPS connection and eavesdrop on URLs such as Dropbox, Google Drive URLs or Password reset URLs.The fix is easy for a consumer: un-checking the automatic detect setting. But an enterprise user might need to ask the IT department to eliminate this risk. Windows, Mac and Linux computers are all at risk.Windows: How to reduce the risk of URL hijack To prevent this HTTPS URL hijack on a Windows computer, open the Control Panel and select Internet Properties. Then select the Connections Tab, and in it the LAN settings button. Un-check Automatically detect settings.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2016-07-14 10:02:00 How to prepare for a data breach   (lien direct) This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  Michael Bruemmer's team is busy these days, and that's both good news and bad news for companies like yours. Bruemmer heads up the Data Breach Resolution group at Experian. This team provides the call center, notification and identity theft protection services to clients following a data breach.Over a span of 12 years, this arm of Experian has serviced nearly 17,000 breaches. In 2015, the group serviced 3,550 different incidents, from small breaches that affected just a few hundred people, to the headline-making breaches that affected tens of millions. The fact that Experian has been involved in responding to so many breaches is the bad news I alluded to.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2016-07-13 05:21:00 Review: Promisec goes the extra step to secure PCs (lien direct) In the past year we've seen an influx of endpoint detection and response (EDR) tools that promise to bring order, through greater visibility, to the wild west of endpoints within a large organization. The scenario is all too common: IT security usually doesn't know all of the hardware and software assets that need to be protected, yet has to protect them. Even as we struggle to put security controls in place for prevention, we know that many of these endpoints are already compromised by active threats that need to be detected, assessed, quarantined, and remediated.EDR tools are built for detection and response (hence the category name), and most leave it at that. Promisec adds sophisticated remediation to Promisec Endpoint Manager (PEM), which is precisely why I was interested in getting a close look at the product. Like other EDR products, PEM can scan endpoints on a schedule to detect anomalies or abnormalities and verify that security controls -- such as required applications, patches, settings, and so on -- are in place. Unlike other products in the category, PEM can also launch scripts on the endpoints to take corrective action.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2016-07-08 11:03:12 How to secure your router and home network (lien direct) Many computer users don't realize it, but for most people their internet router is the most important electronic device in their home. It links most of their other devices together and to the world, so it has a highly privileged position that hackers can exploit.Unfortunately many consumer and small-business routers come with insecure default configurations, have undocumented backdoor accounts, expose legacy services and have firmware that is riddled with basic flaws. Some of these problems can't be fixed by users, but there are many actions that can be taken to at least protect these devices from large-scale, automated attacks.Don't let your router be a low-hanging fruit for hackers.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2016-07-07 10:03:00 4 tools for managing firewall rules (lien direct) Firewall devices are only as good as the hundreds, or even thousands, rules that govern them. Misconfigurations, unused rules and conflicting rules can cause firewalls to fail in their crucial missions. Firewall security management products can help security managers monitor compliance, orchestrate device policies, optimize rules and manage firewall changes. According to the IT Central Station user community, the most important criteria to consider when choosing firewall security management software are visibility for network devices, scalability, and ensured security and compliance.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2016-07-07 09:17:00 How to remove your Windows 10 password (lien direct) Windows 10 wants you to enter your password all the time. You can remove your password, or reduce how often you have to enter one, but there are security risks to doing so.
NetworkWorld.webp 2016-07-05 07:26:00 8 ingredients of an effective disaster recovery plan (lien direct) Earlier this month, a monkey caused a nationwide power outage in Kenya. Millions of homes and businesses were without electricity. Which just goes to show that “not all disasters come in the form of major storms with names and categories,” says Bob Davis, CMO, Atlantis Computing.“Electrical fires, broken water pipes, failed air conditioning units [and rogue monkeys] can cause just as much damage,” he says. And while “business executives might think they're safe based on their geographic location,” it's important to remember that “day-to-day threats can destroy data [and] ruin a business,” too, he says. That's why it is critical for all businesses to have a disaster recovery (DR) plan.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2016-07-05 03:00:00 10 cutting-edge tools that take endpoint security to a new level (lien direct) The days of simple endpoint protection are over. Scanning and screening for malware has become a very complex process, and most traditional anti-malware tools only find a small fraction of potential infections. Nowadays there are numerous advanced endpoint detection and response (EDR) tools, all claiming to find and block the most subtle attacks, even ones that don't leave many fingerprints. As we wrote last fall in our review of Carbon Black and Cylance, there are two basic approaches: hunting (looking for some odd behavior) and sifting and gathering particular trends or activities (which has its roots in traditional anti-virus).To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2016-07-05 03:00:00 7 trends in advanced endpoint protection (lien direct) After extensive testing of 10 advanced endpoint protection products, we have identified a series of broad industry trends:1. Virus signatures are passé. Creating a virus with a unique signature is child's play, thanks to the nearly automated virus construction kits that have filled the internet over the past several years. Instead, many of today's advanced endpoint protection products make use of security news feeds that report on the latest attacks such as VirusTotal.com and other reputation management services. Some, like CrowdStrike, have a long list of integrations with security and log management tools to make them more effective at spotting attack trends.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2016-07-05 03:00:00 10 advanced endpoint protection tools (lien direct) Endpoint protectionendpoint protection 1The days of simple endpoint protection based on traditional anti-malware tools are over. There are now advanced endpoint detection and response (EDR) tools that go beyond proactive monitoring and endpoint protection. They evaluate threats in a larger ecosystem, combining the best aspects from network intrusion detection and examining the individual process level on each computer. That is a tall order, and the 10 products tested are all very capable. However, no one product does everything. You will have to make compromises, depending on what other security tools you already have installed and the skill levels of your staff. Here are capsule reviews of 10 advanced endpoint protection products (see the full review):To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2016-07-05 03:00:00 How to buy endpoint security products (lien direct) In our testing of 10 endpoint security products, we found that no one product does everything. You will have to make compromises, depending on what other security tools you already have installed and the skill levels of your staff. While there is no single product that can suit all situations, endpoint configurations and IT requirements, there are a few key things to consider in your purchase:1. Going agent or agentless. A few of the products we tested don't require endpoint agents, but the trade off is that you will need to setup LDAP or clean up your Active Directory domain and make use of network switch SNMP management and other connections to your network fabric.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2016-06-23 03:36:00 A look inside the Microsoft Local Administrator Password Solution (lien direct) Windows administrators have a problem -- passwords. Specifically, administrator passwords that lurk out there, identical across machines, just ready to be compromised. But there is finally a solution at the right price that mitigates this problem almost completely. Interested? Let's dive in.The scenario The issue at hand is simple: Every Windows NT-based box, as far back as Windows 2000 and up to Windows 10, including all of the server releases, has a local administrator account. This account, sometimes called the "500" account after the group ID number it has within the bowels of the Windows operating system, has full control over the machine on which it is located. It does not by default have any domain privileges. (Domain administrator accounts, of course, also have by default full control over local machines that are members of the domain -- but this can generally be scoped to a more limited set of permissions if necessary.)To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2016-06-16 14:15:00 Five signs an attacker is already in your network (lien direct) This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach. According to some estimates, attackers have infiltrated 96% of all networks, so you need to detect and stop them before they have time to escalate privileges, find valuable assets and steal data.  The good news is an attack doesn't end with an infection or a take-over of an endpoint; that is where it begins. From there an attack is highly active, and the attacker can be identified and stopped if you know how to find them. These five strategies will help. * Search for the telltale signs of a breach.  Look for port scans, excessive failed log-ins and other types of reconnaissance as an attacker tries to map out your network.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2016-06-02 13:04:00 How to embrace the benefits of shadow IT (lien direct) The terms shadow IT conjures up negative images in the minds of most IT organizations. Yet non-IT enterprise functions and lines of business are buying more of their own IT systems than ever before, particularly product, operations and external customer-facing groups and highly dynamic services areas. “As business functions seek to realize the benefits from these non-traditional channels of IT enablement, the shadow IT organizations are growing aggressively in order to help orchestrate and aggregate services into business consumable offerings,” says Craig Wright, managing director of outsourcing and technology consultancy Pace Harmon.[ Related: 4 ways to apply SLAs to shadow IT ]To read this article in full or to leave a comment, please click here Guideline ★★
NetworkWorld.webp 2016-06-02 13:01:00 How millennial tech grads should tailor their resumes (lien direct) You've recently graduated and now it's time to start applying to jobs -- but what skills and experience should you highlight on your resume? To help you decide, CompTIA released the results of its 2016 IT Industry Outlook report, which surveyed 673 IT industry companies in the U.S., Canada and the U.K., and found that millennials have certain skills businesses are clamoring for in the coming year.“Recent grads have grown up in an age of evolving technologies, particularly the Internet Age. They've not only developed a unique way of problem solving and critical thinking, but they are also acutely aware of new technologies that may increase operational efficiency in a business,” says Gene Richardson, COO of Experts Exchanges.To read this article in full or to leave a comment, please click here ★★★
NetworkWorld.webp 2016-05-25 09:58:00 IDG Contributor Network: How to use Anycast to provide high availability to a RADIUS server (lien direct) After months of issues, they have finally restored my access to my blog! After such a hiatus, it is my pleasure to bring this particular post. I'm certain many will find it at the very least cool in an "I'm a network geek" kind of a way, or even better: you will find it very educational and even leverage it in your own world.  This is a solution I have been wanting to write about for a long time now, and let's be clear-it is not mine. This entire post is owed to a long-time personal friend of mine who is also one of the most talented and gifted technologists roaming the earth today. His name is Epaminondas Peter Karelis, CCIE #8068 (Pete). Pete designed this particular high-availability solution for a small ISE deployment that had two data centers, as is crudely illustrated by me in the below figure. To read this article in full or to leave a comment, please click here ★★★★
Last update at: 2024-07-16 01:08:42
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter