What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
NetworkWorld.webp 2017-04-14 13:47:00 Microsoft begins denying updates to some Windows 7 users (lien direct) Microsoft this week began blocking Windows 7 and 8.1 PCs equipped with the very newest processors from receiving security updates, making good on a policy it announced but did not implement last year.But the company also refused to provide security fixes to Windows 7 systems that were powered by AMD's "Carrizo" CPUs, an architecture that was supposed to continue receiving patches.The decree that led to the update bans, whether allowable or not under Microsoft's new policy, was revealed in January 2016, when the company said making Windows 7 and Windows 8.1 run on the latest processors was "challenging." Microsoft then ruled that Windows 10 would be the only supported edition on seventh-generation and later CPUs and simultaneously dictated a substantial shortening of support of both editions.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-14 11:56:00 New NSA leak may expose its bank spying, Windows exploits (lien direct) A hacking group has released suspected U.S. government files that show the National Security Agency may have spied on banks across the Middle East.Numerous Windows hacking tools are also among the new batch of files the Shadow Brokers dumped Friday. In recent months, the mysterious group has been releasing hacking tools allegedly taken from the NSA, and security researchers say they actually work.Friday's leak includes an archive describing the internal architecture at EastNets, a Dubai-based anti-money laundering company that also offers services related to SWIFT, the financial banking network.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-14 10:17:25 Samsung taps DOD tech veteran to head enterprise push (lien direct) Samsung Electronics has appointed the former CIO of the U.S. Department of Defense to help a global push to expand its mobile enterprise business.Terry Halvorsen served as chief information officer at the Pentagon from 2015 until this year. Before that, he served as deputy commander of the Navy Cyber Forces and deputy commander of the Naval Network Warfare Command.At Samsung, he will be an executive vice president and global enterprise advisor to J.K. Shin, president of Samsung's Mobile Communications division.Samsung said it wants Halvorsen to help expand its business in the corporate, government, and regulated industries space, where there are higher demands on security.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-14 08:39:00 SOAPA services opportunities abound (lien direct) Security operations is changing, driven by a wave of diverse data types, analytics tools and new operational requirements. These changes are initiating an evolution from monolithic security technologies to a more comprehensive event-driven software architecture (along the lines of SOA 2.0) where disparate security technologies connect via enterprise-class middleware for things like data exchange, message queueing and risk-driven trigger conditions. ESG refers to this as a Security Operations and Analytics platform architecture or SOAPA.    When speaking or writing about SOAPA, I often compare this evolution to an analogous IT trend in the 1990s. Way back then, large organizations abandoned stand-alone departmental applications in favor or a more integrated software architecture, ERP. This transition resulted in a new generation of business applications acting as a foundation for greater automation, efficiency and profitability.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-14 05:59:29 How will future cars stay up-to-date? Make them open like a PC (lien direct) The future seems bright for the automobile. A whole host of technologies -- including self-driving systems – is set to reinvent the auto industry, making cars more computerized than ever.But not everyone shares a rosy outlook.  “I know what is going to happen in the future and I don't like it,” said Bruce Perens, a leading open source advocate.  “And I would like to guide it in a somewhat different direction.”His fear is that consumers who buy next-generation cars will face obstacles to modifying or repairing them -- like purchasing a smartphone, only far more expensive, with manufacturers in sole control over the tech upgrades.To read this article in full or to leave a comment, please click here Guideline
NetworkWorld.webp 2017-04-13 19:57:00 Cisco runs out two “critical” security warnings for IOS, Apache Struts (again) (lien direct) Cisco today issued two “critical” security advisories, one for Cisco IOS and Cisco IOS XE Software, the other for the ongoing discovery of problems with Apache Struts2.The IOS vulnerability is in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software which could let an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges, Cisco stated.+More on Network World: Cisco targets digital business transformation with new certifications+To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-13 14:15:00 Unpatched vulnerability exposes Magento online shops to hacking (lien direct) An unpatched vulnerability in the Magento e-commerce platform could allow hackers to upload and execute malicious code on web servers that host online shops.The flaw was discovered by researchers from security consultancy DefenseCode and is located in a feature that retrieves preview images for videos hosted on Vimeo. Such videos can be added to product listings in Magento.The DefenseCode researchers determined that if the image URL points to a different file, for example a PHP script, Magento will download the file in order to validate it. If the file is not an image, the platform will return a "Disallowed file type" error, but won't actually remove it from the server.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-13 11:36:00 Security researcher blasts Tizen: \'May be the worst code I\'ve ever seen\' (lien direct) Samsung has had enough struggles with Tizen, the open-source operating system it is positioning as an alternative to Android. But now Tizen is being blasted by a security expert for being full of egregious security flaws and sloppy programming.Israeli researcher Amihai Neiderman, who heads the research department for Equus Software, spoke at Kaspersky Lab's Security Analyst Summit and later to Motherboard, the tech site run by Vice.com. Neiderman said Tizen's code "may be the worst code I've ever seen. Everything you can do wrong there, they do it."To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-13 10:31:00 14% off APC 11-Outlet Surge Protector with USB Charging Ports and SurgeArrest - Deal Alert (lien direct) Be it a lightning strike that destroys a home entertainment center or consistently fluctuating power that degrades the performance and shortens the life of your electronics – surges, lightning, and other power disturbances can have a devastating impact on the valuable electronics you rely on every day. The P11U2 from APC offers guaranteed surge protection. Connect and protect up to 11 electronics, and conveniently charge your mobile devices via 2 additional USB ports. Installation is convenient and easy with a 180-degree rotating power cord and right-angle plug. Lastly, three LED indicators inform you if there is any overload, unit, or wall wiring issues. The P11U2 averages 4.5 out of 5 stars from over 1,500 people on Amazon (read reviews), where its typical list price of $34.99 is discounted 14% to $29.99. See this deal on Amazon.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-13 09:41:00 Travelers enlists Symantec to advise cyber insurance customers (lien direct) The Travelers insurance company has teamed up with Symantec to give policyholders cyber security assessments and consultation in order to help them manage risks.The self-assessment consists of filling out a 25-question survey and getting a written report of how well their network and data protection stacks up. If they want to, they can talk to a consultant who walks them through the results and recommends steps they could take to remediate risks.+More on Network World: Synack: Hackers wanted after firm gets $21.25M funding from Microsoft, HPE+To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-13 07:30:00 How secure is your supply chain? (lien direct) Today's global supply chains carry risks that run the gamut from pirates off the coast of East Africa to bad guys tampering with goods in transit. And international supply chains also put companies at risk of violating legislation and policies mandating corporate social responsibility. How can your company make responsible decisions for your supply chain under these conditions?Improving the security of the global supply chain system is a key part of the strategy. With billions of dollars of goods at stake, many companies are working at solving the problem. Blockchain firms like Skuchain have developed ways to secure supply chain information to improve tracking. Other firms like CNL Software and Esri focus on improving the security process at key facilities like ports and warehouses. And firms such as Fleetmatics, Shaw Tracking and Optical Lock are working on securing the “moving supply chain” of trucks, railways, ships and planes. Whether your supply chain includes service providers, software services or goods, there are important risks to be mitigated.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-13 03:30:00 IDG Contributor Network: Can Google\'s Key Transparency make encrypted email ubiquitous? (lien direct) Today I'm going to talk about a topic that has gained a lot of attention since the presidential election: encrypted email.Services such as ProtonMail-a secure email system with end-to-end encryption-have reported record signup numbers in recent months. This parallels the increasing adoption and provision of encrypted instant messaging services such as Signal, Telegram, iMessage and WhatsApp. As someone who works in security, I applaud this; more people communicating via encrypted messaging can only be a good thing.+ Also on Network World: Enterprise encryption adoption up, but the devil's in the details + However, there is a big problem with encrypted email, which is that it mostly sucks. The problem lies in the open nature of email itself. Unlike proprietary messaging systems like WhatsApp, email is based on open-standards. Anyone can run their own email server, and you can send an email to anyone in the world just by knowing their email address using any software you like.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-12 13:24:00 Synack: Hackers wanted after firm gets $21.25M funding from Microsoft, HPE (lien direct) Penetration testing provider Synack is getting an infusion of $21.25 million from the investment arms of Microsoft and HP, among others, and some of it will be used to hire more security analysts to fuel what it calls its hacker-powered intelligence platform.The investment is the Series C round of funding and is led by Microsoft Ventures, but also includes Hewlett Packard Enterprise and Singtel Innov8 to bring total investment in the company to $55 million.+More on Network World: 6 vulnerabilities to watch for on the factory floor+To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-12 13:03:00 Shadow Brokers dump contained Solaris hacking tools (lien direct) After the Shadow Brokers group opened up its archive of exploits allegedly stolen from the United States National Security Agency, security experts found a nasty surprise waiting for Solaris administrators.The Register reported that the dumped Shadow Broker files reference two programs, EXTREMEPARR and EBBISLAND, that would let attackers obtain root access remotely over the network on Solaris boxes running versions 6 to 10 on x86 and SPARC architectures.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-12 12:05:00 Major zero-day flaw found in Microsoft Word (lien direct) McAfee security researchers are warning of a new zero-day vulnerability in Microsoft Word being exploited via attached .rtf files since at least January.The exploit allows a Word document to install malware onto your PC without you ever knowing it, giving the attackers full access to your machine. According to McAfee, the exploit works by connecting to a remote server controlled by the hackers, which will download a file that runs as a .hta file, a dynamic HTML file that is used in Word. Security firm FireEye also noted similar malicious .rtf files in its own alert. Both firms say the flaws are within Microsoft's Object Linking and Embedding (OLE) technology and affects all versions of Office, including Office 2016 for Windows 10.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-12 11:02:53 Microsoft Word exploit linked to cyberspying in Ukraine conflict (lien direct) A previously unknown Microsoft Office vulnerability was recently used to deliver spyware to Russian-speaking targets, in a possible case of cyberespionage.Security firm FireEye noticed the intrusion attempt, which taps a critical software flaw that hackers are using to craft malicious Microsoft Word documents.On Wednesday, FireEye said it uncovered one attack that weaponized a Russian military training manual. Once opened, the malicious document will deliver FinSpy, a surveillance software that's been marketed to governments.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-12 11:01:00 6 vulnerabilities to watch for on the factory floor (lien direct)  Industrial control systems (ICS) that run the valves and switches in factories may suffer from inherent weaknesses that cropped up only after they were installed and the networks they were attached to became more widely connected.Sean McBride FireEye iSIGHT Intelligence Sean McBride The problems are as far ranging as hard-coded passwords that are publicly available to vulnerabilities in Windows operating systems that are no longer supported but are necessary to run the aging gear, says Sean McBride, attack-synthesis lead analyst at FireEye iSIGHT Intelligence and author of “What About the Plant Floor? Six subversive concerns for industrial environments.”To read this article in full or to leave a comment, please click here Guideline
NetworkWorld.webp 2017-04-12 09:17:00 Researchers developing autonomous robot surveillance (lien direct) Oh, now this is peachy. Thanks to a four-year, $1.7 million grant from the U.S. Office of Naval Research, Cornell University researchers plan to develop a robot surveillance system that would involve robots sharing “information as they move around, and if necessary, interpret what they see. This would allow the robots to conduct surveillance as a single entity with many eyes.” This would be done allegedly to “protect you from danger.”According to the robot surveillance project paper "Convolutional-Features Analysis and Control for Mobile Visual Scene Perception,” researchers want to develop a surveillance method that could do more than any surveillance to date, as it would “operate autonomously and robustly under unknown, and possibly disconnected, topologies.”To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-12 07:21:00 Face-off: Cisco vs. Fortinet for enterprise firewalls (lien direct) Firewalls have been on the front lines of network security for 25 years. Over time they've evolved beyond simple packet filtering to take on a wider and deeper variety of tasks to block modern threats. Today, two of the top enterprise firewalls are Cisco's Adaptive Security Appliance (ASA) and Fortinet's Fortigate, according to reviews by users in the IT Central Station community.One reviewer, a manager of engineering at a retailer, says Cisco's ASA is “a solid, stable and consistent firewall platform,” but there's room for improvement when the enterprise needs to manage multiple firewalls from a central point. “Cisco's answer is Cisco Security Manager (CSM). Unfortunately, this is a suite of applications that is in much need of an overhaul. It is riddled with bugs and lacks the intuitive experience found in competing vendor offerings.”To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-12 06:42:38 Microsoft fixes 45 flaws, including three actively exploited vulnerabilities (lien direct) Microsoft released its monthly security-patch bundle Tuesday, fixing 45 unique vulnerabilities, three of which are publicly known and targeted by hackers.The top priority this month should be given to the Microsoft Office security update because one of the fixed flaws has been actively exploited by attackers since January to infect computers with malware. Over the past few days this vulnerability, tracked as CVE-2017-0199, has seen widespread exploitation.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-12 06:29:00 Hacked Dallas sirens get extra encryption to fend off future attacks (lien direct) Dallas city officials have added extra encryption and other security measures to the outdoor warning sirens hacked early Saturday.The hack also prompted the city to evaluate critical systems for potential vulnerabilities, City Manager T.C. Broadnax said in a statement late Monday. City officials are reviewing security for financial systems, a flood warning system, police-fire dispatch and the 911/311 system.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-12 06:19:00 Can AI and ML slay the healthcare ransomware dragon? (lien direct) It's common knowledge that healthcare organizations are prime – and relatively easy – targets for ransomware attacks. So it is no surprise that those attacks have become rampant in the past several years. The term “low-hanging fruit” is frequently invoked.But according to at least one report, and some experts, it doesn't have to be that way. ICIT – the Institute for Critical Infrastructure Technology – contends in a recent whitepaper that the power of artificial intelligence and machine learning (AI/ML) can “crush the health sector's ransomware pandemic.”To read this article in full or to leave a comment, please click here Guideline
NetworkWorld.webp 2017-04-12 03:20:00 Detecting insider threats is easier than you think (lien direct) When it came to the physical plant, it used to be easy with surveillance cameras and access badges to tell if an insider was up to no good. Now with a more virtual network, you can't always know if the person sitting in the next cubicle is gaining access to confidential documents. While the insider threat still connotes an employee of the company, the intruder is no longer someone located within the confines of the building. Accessing the network can happen from such public places as the local coffee shop. “For companies today, where old corporate lines are disappearing more frequently, the challenges only increase. Enterprises need to adapt their policies and procedures to prevent threats by securing corporate end-point equipment and the right tools that protect and allow users to do their work,” said Matias Brutti, a hacker at Okta. “Work environments are constantly changing, so monitoring is difficult on a corporate level.”To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-11 21:00:00 Privacy and the common man (or the FBI director) (lien direct) CSO's Joan Goodchild and Steve Ragan discuss some of the latest security news, including how the FBI director inadvertently (or on purpose?) revealed his Twitter ID and what the new regulations regarding ISPs being able to sell your private data without your consent really entails.
NetworkWorld.webp 2017-04-11 14:30:00 Fortinet upgrades for better cloud, SD-WAN protection (lien direct) Fortinet has rolled out a new version of its FortiOS operating system that gives customers the ability to manage security capabilities across their cloud assets and software-defined wide area networking (SD-WAN) environments.With FortiOS 5.6, the company's Fortinet Security Fabric gives a view of customers' public and private clouds – including Amazon Web Services and Azure – as well as assets on and their software-defined WANs, says John Maddison, Fortinet's senior vice president of products.+More on Network World: DARPA to eliminate “patch & pray” by baking chips with cybersecurity fortification+To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-11 12:33:00 Microsoft kicks security bulletins to the curb in favor of security update guide (lien direct) Forget about security bulletins; Microsoft is so done with them. Now, it's all about the Security Update Guide – something Microsoft claimed customers wanted back in November 2016. Bulletins were supposed to bite the dust starting in January 2017, but it appears as if they did starting in April 2017. This new era for patching Microsoft is great, if you really like clicking again and again. If not, I suppose that is too bad, so sad.The release notes are slightly more informative than the Microsoft Security Response Center post about the April patches. The latter simply stated, “Today we released security updates to provide additional protections against malicious attackers.” Microsoft recommends turning on automatic updates, but probably not to stop the upcoming migraine for the click-fest you will have to endure to find out about the security updates.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-11 10:30:00 What it takes to become a chief information security officer (CISO) (lien direct) download Career Tracker: What it takes to be a chief information security officer CSO Jeff Foltz did not set out to be an information security professional. He arrived at his current role as CISO at Fidelity National Financial by making the most of a series of opportunities and constantly building his skillset. His degree in psychology and philosophy would also prove more useful in his CISO job than one might think.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-11 08:58:39 DNS record will help prevent unauthorized SSL certificates (lien direct) In a few months, publicly trusted certificate authorities will have to start honoring a special Domain Name System (DNS) record that allows domain owners to specify who is allowed to issue SSL certificates for their domains.The Certification Authority Authorization (CAA) DNS record became a standard in 2013 but didn't have much of a real-world impact because certificate authorities (CAs) were under no obligation to conform to them.The record allows a domain owner to list the CAs that are allowed to issue SSL/TLS certificates for that domain. The reason for this is to limit cases of unauthorized certificate issuance, which can be accidental or intentional, if a CA is compromised or has a rogue employee.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-11 08:24:00 IDG Contributor Network: 7 steps to avoid getting hooked by phishing scams (lien direct) High-profile hacking attacks might dominate the headlines, but one of the biggest risks to your security isn't software vulnerabilities or malware-it's phishing attacks. There were more than 1.2 million phishing attacks last year alone, up 65 percent over 2015, according to the Anti-Phishing Working Group (APWG).+ Also on Network World: 25% to 30% of users struggle with identifying phishing threats, study says + Phishing attacks usually come in the form of a fake email that appears to be from a legitimate source, such as your bank, employer or a website you use frequently. The idea is to get you to hand over the keys to your accounts by prompting you to type your login details and password into a fake website front. Victims click the link in an email and get taken to a website that looks just like the real thing, but in reality, it has been created to steal information.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-11 07:38:00 People, process and technology challenges with security operations (lien direct) These days, it's tough for any organization to keep up with cybersecurity operations. Why? Well, the bad guys are pretty persistent for starters, launching a blitzkrieg of attacks and new types of exploits all the time. OK, hackers are relentless, but we've always know this, and their behavior isn't likely to change anytime soon. What's really disturbing, however, is that a lot of problems associated with cybersecurity are based upon our own intransigence. And organizations aren't struggling with one issue, rather cybersecurity operations challenges tend to be spread across people, processes and technology. When it comes to security operations, it's kind of a "death by a thousand cuts" situation. To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-11 06:37:28 Dridex gang uses unpatched Microsoft Word exploit to target millions (lien direct) The gang behind the Dridex computer trojan has adopted an unpatched Microsoft Word exploit and used it to target millions of users.The exploit's existence was revealed Friday by security researchers from antivirus vendor McAfee, but targeted attacks using it have been happening since January. After McAfee's limited public disclosure, researchers from FireEye confirmed having tracked the attacks for several weeks as well.The exploit takes advantage of a logic bug in the Windows Object Linking and Embedding (OLE) feature of Microsoft Office. It allows attackers to embed malicious code inside of Microsoft Word documents, with the code automatically executed when those files are opened.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-11 03:30:00 IDG Contributor Network: When phone systems attack (lien direct) A telephony denial of service (TDoS) attack is a specific type of DDoS attack that originates from or is directed towards a telephone system with the intent of bringing down the targeted system. These attacks commonly focus on commercial businesses and may often include ransomware requests. In reality, these attacks can affect anyone, including our nation's 911 infrastructure, because even it is not isolated from or immune from these types of attacks. And based on its mission, in many ways, it is more fragile.Unintentional TDoS attack Just last year, 911 centers across the country, including a site in Phoenix, Arizona, were the targets of allegedly unintentional 911 TDoS attacks when some malicious JavaScript code was published on a web page. The code, once loaded on a smartphone browser, would cause some devices to automatically dial 911 repeatedly without user intervention and without the user's knowledge. To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-10 15:33:02 US dismantles Kelihos botnet after Russian hacker\'s arrest (lien direct) The arrest last week of a Russian man in Spain was apparently for his role in a massive spam botnet and not related to an ongoing investigation into foreign tampering with last year's U.S. election.The botnet, called Kelihos, has enslaved hundreds of thousands of computers, and distributed spam and malware to users across the globe. However, the U.S. has taken action to dismantle the illegal operation, the Department of Justice said on Monday.The arrest of 36-year-old Peter Yuryevich Levashov, the botnet's alleged operator, was at first thought to be related to the ongoing U.S. investigation of presidential election-related hacking, but the DOJ said on Monday that wasn't the case.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-10 13:42:52 Latest Shadow Brokers exploit dump poses little threat (lien direct) A group of hackers that has been trying to sell exploits and malware allegedly used by the U.S. National Security Agency decided to make the data available for free over the weekend.The security community was expecting the password-encrypted archive that the Shadow Brokers group unlocked Saturday to contain previously unknown and unpatched exploits -- known in the industry as zero-days. That was not the case.As researchers started to analyze the exploits inside, it became clear that while some of them were technically interesting, the large majority were for old and publicly known vulnerabilities. Some appeared to have actually been sourced from public information and affect software versions that are several years old.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-10 11:32:00 DARPA to eliminate “patch & pray” by baking chips with cybersecurity fortification (lien direct) In an IT world where security software patches seem to be a dime a dozen, the researchers at the Defense Advanced Research Projects Agency want to take a different approach – bake cybersecurity right into the circuitry.The research outfit will this month detail a new program called System Security Integrated Through Hardware and Firmware (SSITH) that has as one of its major goals to develop new integrated circuit architectures that lack the current software-accessible points of criminal entry, yet retain the computational functions and high-performance the integrated circuits were designed to deliver. Another goal of the program is the development of design tools that would become widely available so that hardware-anchored security would eventually become a standard feature of integrated circuit in both Defense Department and commercial electronic systems, DARPA stated.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-10 10:36:43 Suspected CIA spying tools linked to hacks in 16 countries (lien direct) The suspected CIA spying tools exposed by WikiLeaks have been linked to hacking attempts on at least 40 targets in 16 countries, according to security firm Symantec.The tools share “close similarities” with the tactics from an espionage team called Longhorn, Symantec said in a Monday post. Longhorn has been active since at least 2011, using Trojan programs and previously unknown software vulnerabilities to hack targets.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-10 10:24:00 Anthem to data breach victims: Maybe the damages are your own darned fault (lien direct) Insurance giant Anthem has effectively scared off possible victims of a 2015 data breach by asking to examine their personal computers for evidence that their own shoddy security was to blame for their information falling into the hands of criminals.Some of the affected Anthem customers sued for damages they say resulted from the breach but then withdrew their suits after Anthem got a court order allowing the exams.The examiners would be looking only for evidence that their credentials or other personal data had been stolen even before the Anthem hack ever took place, according to a blog by Chad Mandell, an attorney at LeClairRyan.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-10 10:06:00 Cisco\'s first big developers conference to zero in on IoT, cloud (lien direct) Cisco initially scheduled its inaugural DevNet Create developers' conference in San Francisco for what turned out to be the same week in May as Google's wildly popular I/O event in Mountain View (that coy old Google didn't reveal its show dates until late January). So Cisco wound up bumping its new event to the following week “to make sure we don't take audience away from Google I/O. Okay okay - maybe it's the other way around…” quipped Susie Wee, VP & CTO of Cisco DevNet Innovations in a recent blogpost.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-10 07:26:18 Email-based attacks exploit unpatched vulnerability in Microsoft Word (lien direct) Attackers have been exploiting an unpatched vulnerability in Microsoft Word for the past few months to compromise computers and infect them with malware.The first report about the attacks came Friday from antivirus vendor McAfee after the company's researchers analyzed some suspicious Word files spotted a day earlier. It turned out that the files were exploiting a vulnerability that affects "all Microsoft Office versions, including the latest Office 2016 running on Windows 10."The flaw is related to the Windows Object Linking and Embedding (OLE) feature in Microsoft Office that allows documents to embed references and links to other documents or objects, the McAfee researchers said in a blog post.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-10 07:24:00 Spain arrests accused Russian spammer at US request (lien direct) A Russian man long connected with sending spam emails has been arrested and is being held in Spain, with a law enforcement source contracting news reports saying he was involved with a computer virus linked to U.S. President Donald Trump's recent election victory.The arrest of Piotr Levashov at the Barcelona airport on Friday was not tied to Russian interference in the 2016 U.S. election, said the source, who is close to the investigation. That contradicts news reports from Agence France-Presse and other news outlets, which said Levashov's wife, Maria Levachova, was told his arrest was connected to Trump's election.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-10 07:19:00 Ticked at President Trump, Shadow Brokers dump password for NSA hacking tools (lien direct) Ticked at President Trump, the Shadow Brokers hacking group released the password for the NSA hacking tools they previously tried to sell.In an open letter to President Donald Trump, the group asked, “Respectfully, what the f**k are you doing?” In broken English, they accused the president of “abandoning 'your base,' 'the movement,' and the peoples who getting you elected.”After a “quick review” of the tools unlocked with the password, Edward Snowden noted that “it's nowhere near the full library, but there's still so much here that NSA should be able to instantly identify where this set came from and how they lost it. If they can't, it's a scandal.”To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-10 06:44:00 How to improve Dynamic Lock in Windows 10 Creators Update (lien direct) When Microsoft released Build 15031 of the Windows 10 Insider Preview on February 8, 2017, it added a new OS feature for Bluetooth-equipped devices. It's called Dynamic Lock, and lets you control access to your PCs based on how close they - and your Bluetooth-paired phones - are to them. That is, if the phone you've paired with your PC (it works for laptops, notebooks, tablets and desktops) is not found within radio range of your PC, Windows 10 turns off the screen and locks the PC after 30 seconds have elapsed. Thus, Dynamic Lock makes a dandy new security feature in Creators Update, one that most business users (or their IT departments) will find worth turning on and using.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-10 06:22:00 Predictive analytics can stop ransomware dead in its tracks (lien direct) This past February marks the two-year anniversary when Livingston County, Michigan, was hit by ransomware. The wealthiest county in the state had three years' worth of tax information possibly at the mercy of cybercriminals.As a local government, county CIO Rich C. Malewicz said they have been a target of ransomware, but in this instance they had backups at the ready. He said the most memorable ransomware attack was a result of a watering hole campaign using malvertizing to infect users visiting a local news website. “This attack was very clever in that all you had to do to get infected was visit the website, you didn't even have to click on the page. Once the user went to the local news website, they were immediately redirected to a site hosting exploit code and the infamous page appeared demanding a ransom with instructions,” he said.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-10 06:19:00 How to deal with the bot crisis on Twitter (lien direct) You may have run into these bots a few times. What looks like an actual human being could have been a bot sending you Twitter spam...or even worse.During the last election cycle and over the past few months in particular, it's now widely known that Twitter bots -- many with zero followers -- promoted fake news stories. Often, the goal was to stir up dissension among voters, influence political viewpoints, and (more importantly) generate revenue when people viewed banner ads. Some would argue these bots helped elect President Trump or at least influenced people on social media to vote one way or another.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-10 06:00:00 IDG Contributor Network: Authentic8 wants to protect users from bad websites (lien direct) Many of us have experienced that moment of terror when clicking on a potentially risky link: Will it all be fine or will I start a torrent of bad outcomes from my action?But bad stuff sometimes happens and, sad as it sounds, sometimes the links we click on take us to dark places with bad outcomes. Authentic8 wants to limit those impacts by reducing the blast area of bad content.RELATED: Machine learning offers new hope against cyber attacks Authentic8, the vendor that created the secure, virtual browser Silo, today announced that its browser will enable organizations to selectively redirect particular URLs for safe rendering within an isolated browser. The idea of this approach is that rather than trying to block any suspect content, organizations can let it through, secure in the knowledge that it can do no widespread harm. Authentic8 was founded by the team from Postini (an email security product acquired by Google).To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-10 03:45:00 The IoT of bricks: Someone is bricking insecure IoT devices (lien direct) I can't justify the vigilantism, but someone is bricking vulnerable IoT devices. I ponder the morality of it all. It's called BrickerBot. It finds IoT devices with dubious security and simply bricks/disables them.Insecure dishwashers, teapots, refrigerators, security cameras-all become part of vast botnets. The botnets can do many things, and we've seen them become the armies behind the largest internet attacks in history. How to cleanse these devices has become the crux of many cries, including numerous ones in this space.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-10 03:32:00 Fight firewall sprawl with AlgoSec, Tufin, Skybox suites (lien direct) New and innovative security tools seem to be emerging all the time, but the frontline defense for just about every network in operation today remains the trusty firewall. They aren't perfect, but if configured correctly and working as intended, firewalls can do a solid job of blocking threats from entering a network, while restricting unauthorized traffic from leaving.The problem network administrators face is that as their networks grow, so do the number of firewalls. Large enterprises can find themselves with hundreds or thousands, a mix of old, new and next-gen models, probably from multiple vendors -- sometimes accidentally working against each other. For admins trying to configure firewall rules, the task can quickly become unmanageable.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-10 03:05:00 (Déjà vu) New products of the week 4.10.17 (lien direct) New products of the weekNew products of the weekImage by Illusive NetworksOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.VM Backup version 7altaroImage by altaroTo read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-09 23:19:48 Angry Shadow Brokers release password for suspected NSA hacking tools (lien direct) Annoyed with the U.S. missile strike last week on an airfield in Syria, among other things, hacker group Shadow Brokers resurfaced on Saturday and released what they said was the password to files containing suspected National Security Agency tools they had earlier tried to sell.“Is appearing you are abandoning 'your base', 'the movement', and the peoples who getting you elected,” the group wrote in broken English in a letter to U.S. President Donald Trump posted online on Saturday.The hacker group, believed by some security experts to have Russian links, released in January an arsenal of tools that appeared designed to spy on Windows systems, after trying to to sell these and other supposedly Windows and Unix hacking tools for bitcoin.To read this article in full or to leave a comment, please click here
NetworkWorld.webp 2017-04-09 15:04:00 Arista gets important win over Cisco in patent battle (lien direct) In yet another twist to the ongoing patent and copyright infringement case between Cisco and Arista, Arista has landed a significant win that will let it once again import redesigned products to the US that have been under import embargo since January.Specifically, according to a post on Arista's site, on “April 7, 2017, U.S. Customs and Border Protection (“CBP”) completed its review and once again ruled that Arista's redesigned products do not infringe the '592, '145, or '537 patents that were the subject of a limited exclusion order and cease and desist order issued by the United States International Trade Commission (ITC) in Investigation No. 337-TA-944 and that Arista may resume importing its redesigned products into the United States.”To read this article in full or to leave a comment, please click here
Last update at: 2024-04-29 01:07:45
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter