www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-14T04:37:40+00:00 www.secnews.physaphae.fr Network World - Magazine Info Obama\'s cybersecurity legacy: Good intentions, good efforts, limited results didn't accomplish the goal of making either government or the private sector more secure.The most recent, stark illustration was the series of leaks, enabled by hacks that US intelligence agencies attribute to Russia, that undermined both the credibility of Democratic presidential candidate Hillary Clinton and the election itself.To read this article in full or to leave a comment, please click here]]> 2017-01-31T05:44:00+00:00 http://www.networkworld.com/article/3163424/security/obamas-cybersecurity-legacy-good-intentions-good-efforts-limited-results.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=302939 False None None None Network World - Magazine Info F5 Networks taps versatile Ciena higher-up to take over as CEO announced that Ciena SVP and COO Francois Locoh-Donou will succeed him on April 3.McAdam joined F5 in 2000 and served as CEO and President until July 2015, when he handed the reins to Manuel Rivelo. But Rivelo stepped down in December of that year for unspecified personal conduct issues, and McAdam jumped back into the fray at the Seattle company, which he has helped to build into an application delivery powerhouse generating about $2B in annual revenue.  To read this article in full or to leave a comment, please click here]]> 2017-01-30T14:07:00+00:00 http://www.networkworld.com/article/3163244/leadership-management/f5-networks-taps-versatile-ciena-higher-up-to-take-over-as-ceo.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=302440 False Guideline None None Network World - Magazine Info Harbinger of The Great Internet Wall arrives non-U.S. citizens' data is in jeopardy. An executive order by President Trump could hurt a data transfer framework that allows EU citizens' personal information to be transmitted to the U.S. for processing with the promise that the data would have the same privacy protection in the U.S. as it has in the EU. That's because a section of the order says, “Agencies shall, to the extent consistent with applicable law, ensure that their privacy policies exclude persons who are not United States citizens or lawful permanent residents from the protections of the Privacy Act regarding personally identifiable information.” To read this article in full or to leave a comment, please click here]]> 2017-01-30T12:45:00+00:00 http://www.networkworld.com/article/3163204/security/harbinger-of-the-great-internet-wall-arrives.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=302441 False None None None Network World - Magazine Info Facebook tries to revamp password recovery by supplanting email To read this article in full or to leave a comment, please click here]]> 2017-01-30T12:37:18+00:00 http://www.networkworld.com/article/3162943/security/facebook-tries-to-revamp-password-recovery-by-supplanting-email.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=302442 False None None None Network World - Magazine Info DARPA picks 30 contenders to battle in wireless spectrum competition Spectrum Collaboration Challenge (SC2) whose goal is to get mobile devices more intelligent access to the ever-tightening wireless spectrum.+More on Network World: Intelligence agency opens $325,000 advanced, automated fingerprint gathering competition+ The defense research agency last March announced Spectrum Collaboration Challenge and said the primary goal of the contest was to infuse radios with “advanced machine-learning capabilities so they can collectively develop strategies that optimize use of the wireless spectrum in ways not possible with today's intrinsically inefficient approach of pre-allocating exclusive access to designated frequencies.”To read this article in full or to leave a comment, please click here]]> 2017-01-30T12:33:00+00:00 http://www.networkworld.com/article/3163166/mobile-wireless/darpa-picks-30-contenders-to-battle-in-wireless-spectrum-competition.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=302443 False None None None Network World - Magazine Info IDG Contributor Network: How to practice cybersecurity (and why it\'s different from IT security) Recruiting and retaining cybersecurity talent + In cybersecurity, the defenders acknowledge that highly motivated and creative adversaries are launching sophisticated attacks. There's also the realization that when software is used as a weapon, building a stronger or taller wall may not necessarily keep out the bad guys. To them, more defensive measures provide them with additional opportunities to find weak spots and gain access to a network.To read this article in full or to leave a comment, please click here]]> 2017-01-30T10:38:00+00:00 http://www.networkworld.com/article/3162996/security/how-to-practice-cybersecurity-and-why-its-different-from-it-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=302456 False None None None Network World - Magazine Info Spear phishing tough to block, even when using automation tools GreatHorn.The company makes software that seeks out phishing attempts and can autonomously block them, but even its customers don't switch on all the features, according to GreatHorn's study of how customers dealt with just over half a million spear phishing attempts.The most common autonomous action, taken a third of the time against suspicious emails, was to alert an admin when a policy was violated and let them decide what to do. This option is also chosen in order to create a record of potential threats, the company says. Another 6% of emails trigger alerts to the recipients so they can be on the lookout for similar attempts.To read this article in full or to leave a comment, please click here]]> 2017-01-30T09:25:00+00:00 http://www.networkworld.com/article/3162936/security/spear-phishing-tough-to-block-even-when-using-automation-tools.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=302457 False None None None Network World - Magazine Info Cisco fosters Blockchain protocol development, IBM shows why technology could relieve security anxiety blockchain that could secure Internet of Things applications and more while new study by IBM shows why the technology could become invaluable for businesses worldwide.Reports from Reuters and a press release from the group said that Cisco has teamed up with Bank of New York Mellon, Foxconn, Gemalto and blockchain startups Consensus Systems (ConsenSys), BitSE and Chronicled to form a blockchain consortium that said it will develop a shared blockchain protocol for aimed at IoT products.To read this article in full or to leave a comment, please click here]]> 2017-01-30T09:05:00+00:00 http://www.networkworld.com/article/3163044/cisco-subnet/cisco-fosters-blockchain-protocol-development-ibm-shows-why-technology-could-relieve-security-anxie.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=302458 False None None None Network World - Magazine Info Ransomware disrupts Washington DC\'s CCTV system reported Saturday. Each of these devices is used to store video footage captured by up to four cameras installed in public spaces.To read this article in full or to leave a comment, please click here]]> 2017-01-30T08:25:34+00:00 http://www.networkworld.com/article/3162719/security/ransomware-disrupts-washington-dcs-cctv-system.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=302459 False None None None Network World - Magazine Info German consumer groups sue WhatsApp over privacy policy changes Facebook acquired WhatsApp in October 2014, but it wasn't until August 2016 that WhatsApp said it would modify its privacy policy to allow it to share lists of users' contacts with Facebook. The move made it possible to match WhatsApp accounts with Facebook ones where users had registered a phone number, giving the parent company more data with which to make new friend suggestions and another way to target advertising.To read this article in full or to leave a comment, please click here]]> 2017-01-30T07:12:54+00:00 http://www.networkworld.com/article/3163024/private-cloud/german-consumer-groups-sue-whatsapp-over-privacy-policy-changes.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=302460 False None None None Network World - Magazine Info Cops use pacemaker data to charge homeowner with arson, insurance fraud Fifth Amendment of the U.S. Constitution protects a person from being forced to incriminate themselves.Nonetheless, that's what happened after a house fire in Middletown, Ohio.WCPO Cincinnati caught video of the actual fire, as well delivered news that the owner's cat died in the fire. As a pet owner, it would be hard to believe that a person would set a fire and leave their pet to die in that fire. The fire in question occurred back in September 2016; the fire department was just starting an investigation to determine the cause of the blaze.To read this article in full or to leave a comment, please click here]]> 2017-01-30T07:08:00+00:00 http://www.networkworld.com/article/3162740/security/cops-use-pacemaker-data-as-evidence-to-charge-homeowner-with-arson-insurance-fraud.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=302461 False None None None Network World - Magazine Info Questions to ask your recovery vendor before you buy 2017-01-30T06:15:00+00:00 http://www.networkworld.com/video/73435/questions-to-ask-your-recovery-vendor-before-you-buy#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=302462 False None None None Network World - Magazine Info Managing risk by understanding attack surfaces 2017-01-30T06:14:00+00:00 http://www.networkworld.com/video/73395/managing-risk-by-understanding-attack-surfaces#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=302464 False None None None Network World - Magazine Info How most hackers get into systems 2017-01-30T06:14:00+00:00 http://www.networkworld.com/video/73415/how-most-hackers-get-into-systems#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=302463 False None None None Network World - Magazine Info How to eliminate insider threats Image by ThinkstockFor years, the primary security objective has been to protect the perimeter-the focus on keeping outsiders from gaining access and doing harm. But statistics prove that more risk exists within an organization. Indeed, many compliance regulations require monitoring of systems to identify and eliminate insider threat. According to Forrester, 58 percent of breaches are caused from internal incidents or with a business partner's organization. And 55 percent of attacks are originated by an insider as cited in the 2015 IBM Cyber Security Intelligence Index.To read this article in full or to leave a comment, please click here]]> 2017-01-30T05:32:00+00:00 http://www.networkworld.com/article/3162749/security/how-to-eliminate-insider-threats.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=302095 False None None None Network World - Magazine Info IDG Contributor Network: TechDemocracy: Helping execs and boards ensure cybersafety TechDemocracy, a global cyberrisk assurance solution provider, is trying to solve with its Intellicta platform.To read this article in full or to leave a comment, please click here]]> 2017-01-30T04:00:00+00:00 http://www.networkworld.com/article/3161907/security/techdemocracy-helping-execs-and-boards-ensure-cybersafety.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=302097 False None None None Network World - Magazine Info IDG Contributor Network: Hackers could use hidden mal-audio to attack Google Now Amazon Echo devices that took it upon themselves to order expensive doll houses from the ecommerce retailer all because a news show host uttered the phrase “Alexa ordered me a dollhouse” on air. The machines heard it from the TV switched on in the room.Researchers say it's not an unlikely scenario. They say not only can attackers issue mal-audio voice commands to any AI listening device that is in audible range, but they can also do it using hidden voice commands. Those are commands that might not even be noticed by the user.To read this article in full or to leave a comment, please click here]]> 2017-01-30T04:00:00+00:00 http://www.networkworld.com/article/3162425/internet-of-things/hackers-could-use-hidden-mal-audio-to-attack-google-now.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=302096 False None None None Network World - Magazine Info IDG Contributor Network: 6 ways to launch a targeted cyberattack according to Microsoft. Most successful targeted attacks follow six steps or stages, though it's important to remember that these steps often run in parallel. Multifaceted attacks are common, so a robust threat response plan should address all six steps and avoid jumping to conclusions.To read this article in full or to leave a comment, please click here]]> 2017-01-30T04:00:00+00:00 http://www.networkworld.com/article/3161549/security/6-ways-to-launch-a-targeted-cyberattack.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=302098 False None None None Network World - Magazine Info New products of the week 1.30.17 Image by NSSOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Blue Medora vRealize Operations Management Pack for Amazon Aurorabluemedora amazonauroraImage by bluemedoraTo read this article in full or to leave a comment, please click here]]> 2017-01-30T03:25:00+00:00 http://www.networkworld.com/article/3162444/cloud-computing/new-products-of-the-week-1-30-17.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=302111 True None None None Network World - Magazine Info How to remove malware 2017-01-29T21:00:00+00:00 http://www.networkworld.com/video/73695/how-to-remove-malware#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=302470 False None None None Network World - Magazine Info Ransomware locked hotel out of its electronic key lock system Romantik Seehotel Jaegerwirt, admitted to bowing to extortion after ransomware locked up the computer running the hotel's electronic key lock system.This was not the first time that cyber thugs attacked the hotel. During one of the attacks, the hackers reportedly left a backdoor into the system.The third attack occurred during the opening weekend of the winter season. The computer hit with ransomware controlled the electronic key lock system, the reservation system and the cash desk system.Guests, who paid about nearly $300 a night for a room, could not open their rooms with their existing keycards; new keycards could not be programmed. Arriving guests couldn't have their reservations confirmed.To read this article in full or to leave a comment, please click here]]> 2017-01-29T07:31:00+00:00 http://www.networkworld.com/article/3162764/security/ransomware-locked-hotel-out-of-its-electronic-key-lock-system.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=301677 False None None None Network World - Magazine Info LeakedSource\'s shutdown is a blow to amateur hackers allegedly confiscated its servers, and now some hackers are wondering if customers of LeakedSource might be next.  “All the people who used PayPal, credit card, etc. to buy membership, the FBI now have your email, payment details and lookup history,” wrote one user on HackForums.net.To read this article in full or to leave a comment, please click here]]> 2017-01-27T13:09:51+00:00 http://www.networkworld.com/article/3162493/security/leakedsources-shutdown-is-a-blow-to-amateur-hackers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=301678 False None None None Network World - Magazine Info Five arrested for hacking into ATMs and stealing $3.2 million To read this article in full or to leave a comment, please click here]]> 2017-01-27T11:45:00+00:00 http://www.networkworld.com/article/3162457/security/five-arrested-for-hacking-into-atms-and-stealing-32-million.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=301679 False None None None Network World - Magazine Info Trump, May agree to take on ISIS in cyberspace To read this article in full or to leave a comment, please click here]]> 2017-01-27T11:17:45+00:00 http://www.networkworld.com/article/3162061/government/trump-may-agree-to-take-on-isis-in-cyberspace.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=301680 False Guideline None None Network World - Magazine Info Intelligence agency opens $325,000 advanced, automated fingerprint gathering competition Nail to Nail (N2N) Fingerprint Challenge” – which offers $325,000 worth of prizes – is to develop a system that allows for more distinguishing data to be collected from fingerprint biometrics but also eliminates the time and cost associated with using human operators, IARPA said. N2N fingerprints capture the entire fingerprint from the edge of one finger nail bed to the other.To read this article in full or to leave a comment, please click here]]> 2017-01-27T10:27:00+00:00 http://www.networkworld.com/article/3162407/security/intelligence-agency-opens-325-000-advanced-automated-fingerprint-gathering-competition.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=301693 False None None None Network World - Magazine Info Compliance focus, too much security expertise hurts awareness programs security awareness program," said Lance Spitzner, director of the Securing the Human Program at the SANS Institute, looking back at what the industry learned in 2016. "Yet we continue to have problems."To read this article in full or to leave a comment, please click here]]> 2017-01-27T09:21:00+00:00 http://www.networkworld.com/article/3162424/it-skills-training/compliance-focus-too-much-security-expertise-hurts-awareness-programs.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=301694 False None None None Network World - Magazine Info Trump\'s executive order won\'t destroy Privacy Shield, says EU Enhancing Public Safety in the Interior of the U.S.," one of several he has issued since taking office on Jan. 20. Such executive orders are used by U.S presidents to manage the operations of the federal government.To read this article in full or to leave a comment, please click here]]> 2017-01-27T09:20:00+00:00 http://www.networkworld.com/article/3162023/security/trump-s-executive-order-won-t-destroy-privacy-shield-says-eu.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=301695 False None None None Network World - Magazine Info Cisco starts patching critical flaw in WebEx browser extension released a patched version of the extension -- 1.0.7 -- for Google Chrome on Thursday and is working on similar patches for the Internet Explorer and Mozilla Firefox versions. The vulnerability was found by Google security researcher Tavis Ormandy and stemmed from the fact that the WebEx extension exposed functionality to any website that had "cwcsf-nativemsg-iframe-43c85c0d-d633-af5e-c056-32dc7efc570b.html" in its URL or inside an iframe. Some of that WebEx functionality allowed for the execution of arbitrary code on computers.To read this article in full or to leave a comment, please click here]]> 2017-01-27T07:59:00+00:00 http://www.networkworld.com/article/3162012/security/cisco-starts-patching-critical-flaw-in-webex-browser-extension.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=301696 False None None None Network World - Magazine Info AI-based typing biometrics might be authentication\'s next big thing TypingDNA.To read this article in full or to leave a comment, please click here]]> 2017-01-27T06:00:24+00:00 http://www.networkworld.com/article/3162007/security/ai-based-typing-biometrics-might-be-authentications-next-big-thing.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=301697 False None None None Network World - Magazine Info Are you a Reckless Rebel or a Nervous Nellie when it comes to online privacy? To read this article in full or to leave a comment, please click here]]> 2017-01-27T05:51:00+00:00 http://www.networkworld.com/article/3162387/security/are-you-a-reckless-rebel-or-a-nervous-nellie-when-it-comes-to-online-privacy.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=301316 False None None None Network World - Magazine Info How to protect your data, your vehicles, and your people against automotive cyber threats? To read this article in full or to leave a comment, please click here]]> 2017-01-27T05:50:00+00:00 http://www.networkworld.com/article/3162404/mobile-security/how-to-protect-your-data-your-vehicles-and-your-people-against-automotive-cyber-threats.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=301317 False None None None Network World - Magazine Info That Hearbleed problem may be more pervasive than you think report posted by Shodan, the Heartbleed vulnerability first exposed in April 2014 was still found in 199,594 internet-accessible devices during a scan it performed last weekend.But according to open-source security firm Black Duck, about 11% of more than 200 applications it audited between Oct. 2015 and March 2016 contained the flaw, which enables a buffer overread that endangers data from clients and servers running affected versions of OpenSSL.To read this article in full or to leave a comment, please click here]]> 2017-01-27T05:46:00+00:00 http://www.networkworld.com/article/3162232/security/that-hearbleed-problem-may-be-more-pervasive-than-you-think.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=301318 False None None None Network World - Magazine Info Trump administration is giving us a good lesson on Twitter security To read this article in full or to leave a comment, please click here]]> 2017-01-26T17:57:42+00:00 http://www.networkworld.com/article/3162052/security/trump-administration-is-giving-us-a-good-lesson-on-twitter-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=300631 False None None None Network World - Magazine Info U.S. companies spending millions to satisfy Europe\'s GDPR says Jay Cline, PwC's U.S. privacy leader.Cline says PwC 'slatest survey showed that fear remains the biggest motivator for U.S. CIOs, who are “connecting the dots” after watching data breaches lead to lost revenues, regulatory fines and the erosion of consumer trust. “U.S. companies see the connection between doing privacy well and greater revenues and consumer trust,” says Cline, who surveyed 200 CIOs, CISOs and other C-suite executives.To read this article in full or to leave a comment, please click here]]> 2017-01-26T13:58:00+00:00 http://www.networkworld.com/article/3162105/security/article.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=300632 False Guideline None None Network World - Magazine Info Gmail will block JavaScript attachments, a common source of malware To read this article in full or to leave a comment, please click here]]> 2017-01-26T11:59:44+00:00 http://www.networkworld.com/article/3162034/security/gmail-will-block-javascript-attachments-a-common-source-of-malware.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=300633 False None None None Network World - Magazine Info Commuting Chelsea Manning\'s sentence was just and proper To read this article in full or to leave a comment, please click here]]> 2017-01-26T10:25:00+00:00 http://www.networkworld.com/article/3161923/security/commuting-chelsea-manning-s-sentence-was-just-and-proper.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=300634 False None None None Network World - Magazine Info Chrome, Firefox start warning users when websites use insecure HTTP logins Ars Technica first pointed out.MORE ON NETWORK WORLD: 6 simple tricks for protecting your passwords HTTP uses an open, unencrypted connection between you and the website you're visiting that could be intercepted by anyone monitoring traffic between you and the site. For that reason, it's never a good idea to share login or credit card information over an HTTP connection. Most major sites offer the encrypted version-HTTPS-but every now and then you'll come across a site that doesn't.To read this article in full or to leave a comment, please click here]]> 2017-01-26T09:33:00+00:00 http://www.networkworld.com/article/3161748/software/chrome-firefox-start-warning-users-when-websites-use-insecure-http-logins.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=300647 False None None None Network World - Magazine Info Face-off: Oracle vs. CA for identity management IT Central Station, an online community where IT professionals review enterprise products.Both products have their fans who say the sophisticated software helps them handle routine access tasks … without paperwork. But users also note that there are areas where the products have room for improvement - areas such as the user interface, initial setup and vendor tech support, according to reviews at IT Central Station. Plus, several users said the vendors need to migrate these products to the cloud.To read this article in full or to leave a comment, please click here]]> 2017-01-26T09:30:00+00:00 http://www.networkworld.com/article/3161794/security/face-off-oracle-vs-ca-for-identity-management.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=300635 False None None None Network World - Magazine Info IDG Contributor Network: Thales Data Threat Report: Security spending up, but so are breaches Thales' new Data Threat Report (pdf). Thales is a huge vendor that employs over 60,000 people across 56 countries. With multibillion euro revenue, it makes sense for the company to increase the perception that it is a thought leader in its field. And Thales' field is a big one. It is a systems integrator, equipment supplier and service provider in the aerospace, transport, defense and security markets. A major part of the company's offering lies around cybersecurity. This report is, therefore, very much in its wheelhouse.To read this article in full or to leave a comment, please click here]]> 2017-01-26T09:00:00+00:00 http://www.networkworld.com/article/3159597/security/thales-data-threat-report-security-spending-up-but-so-are-breaches.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=300649 False Guideline None None Network World - Magazine Info Top data breach trends in 2016 - Phishing, skimming rise; hacking holds ground data breach at Yahoo, it was met with a collective “This, again? Didn't they just report a breach?” The company had, in fact, reported a record-breaking breach of 500 million user accounts three months earlier, but it was dwarfed by the December breach, which impacted over 1 billion records.That pair of record breaking breaches was a fitting way to cap off a year marked by massive data breaches. As security intelligence provider Risk Based Security (RBS) points out in its newly-released 2016 Data Breach Trends report, “six 2016 breaches have taken their place on the Top 10 List of All Time Largest Breaches.”To read this article in full or to leave a comment, please click here]]> 2017-01-26T05:32:00+00:00 http://www.networkworld.com/article/3161894/security/top-data-breach-trends-in-2016-phishing-skimming-rise-hacking-holds-ground.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=300356 False None Yahoo None Network World - Magazine Info Self-protection is key to Linux kernel security International Space Station run Linux.The fact that Linux is everywhere makes kernel security the highest priority. An issue in the kernel can easily create ripples that are felt by practically everyone. Finding and fixing vulnerabilities in the kernel is only one aspect of Linux security; enabling the kernel to withstand attacks is even more vital.To read this article in full or to leave a comment, please click here]]> 2017-01-26T05:26:00+00:00 http://www.networkworld.com/article/3161943/security/self-protection-is-key-to-linux-kernel-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=300357 False None None None Network World - Magazine Info A new service for the less techie criminals Image by ThinkstockYou've heard of big business owners like Jeff Bezos, Larry Page and Warren Buffet. However, did you know there's a long list of business owners, all of who have access to millions of dollars at their fingertips, that you'll never hear about. These people are the owners of crimeware-as-a-service (CaaS) businesses. For underground cybercriminals, CaaS provides a new dimension to cybercrime by making it more organized, automated and accessible to criminals with limited technical skills. Today, cybercriminals can develop, advertise and sell anything from a botnet to a browser exploit pack or DDoS attack toolkits. Aditya K Sood, director of security and cloud threat labs at Blue Coat Systems, a part of Symantec, details how cybercriminals can obtain sensitive data, like credit card numbers, names and addresses, with just a couple of clicks and a payment.To read this article in full or to leave a comment, please click here]]> 2017-01-26T05:18:00+00:00 http://www.networkworld.com/article/3161940/security/a-new-service-for-the-less-techie-criminals.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=300358 False None None None Network World - Magazine Info Password-free security uses voice, user behavior to verify identity Yahoo, LinkedIn and Dropbox all reported major data breaches involving account details such as email addresses and hashed passwords.  To read this article in full or to leave a comment, please click here]]> 2017-01-25T18:28:59+00:00 http://www.networkworld.com/article/3161925/security/password-free-security-uses-voice-user-behavior-to-verify-identity.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=299948 False None Yahoo None Network World - Magazine Info Get 72% off NordVPN Virtual Private Network Service For a Limited Time - Deal Alert access deal here). This is a special deal available for a limited time.To read this article in full or to leave a comment, please click here]]> 2017-01-25T18:12:00+00:00 http://www.networkworld.com/article/3154838/virtual-private-network/get-72-off-nordvpn-virtual-private-network-service-for-a-limited-time-deal-alert.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=299949 False None None None Network World - Magazine Info Trump fence-sitting on encryption backdoors can\'t last urged a boycott of Apple for refusing to help the FBI crack an iPhone used by the terrorist who attacked in San Bernardino, Calif., which indicated he favored backdoors. But that was last year. The latest comes from Sen. Jeff Sessions, Trump's nominee for attorney general, who says he favors strong encryption but also favors law enforcement being able to “overcome encryption” when necessary.To read this article in full or to leave a comment, please click here]]> 2017-01-25T14:48:00+00:00 http://www.networkworld.com/article/3161041/security/trump-fence-sitting-on-encryption-backdoors-can-t-last.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=299950 False None None None Network World - Magazine Info US Park Service tweets were result of old Twitter passwords it said on Saturday.To read this article in full or to leave a comment, please click here]]> 2017-01-25T12:02:19+00:00 http://www.networkworld.com/article/3161715/government/us-park-service-tweets-were-result-of-old-twitter-passwords.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=299951 False None None None Network World - Magazine Info What to ask IDaaS vendors before you buy Gartner) included Okta, Microsoft and Centrify, with OneLogin, Ping Identity, SailPoint, Covisint, Salesforce, Lighthouse Security (IBM) and EMC/RSA figuring prominently as well. Although each company offers IDaaS, differences in feature sets and capabilities can make one solution preferable over the others for a particular organization.To read this article in full or to leave a comment, please click here]]> 2017-01-25T10:02:00+00:00 http://www.networkworld.com/article/3161707/security/10-questions-to-ask-idaas-vendors-before-you-buy.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=299964 False Guideline None None Network World - Magazine Info Ransomware makes California nursing school feel ill To read this article in full or to leave a comment, please click here]]> 2017-01-25T10:00:00+00:00 http://www.networkworld.com/article/3161706/security/ransomware-makes-california-nursing-school-feel-ill.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=299965 False None None None Network World - Magazine Info 41% off Netgear Arlo Security System Wireless HD Camera, Indoor/Outdoor, Night Vision - Deal Alert read reviews) and its list price of $219.99 is currently discounted 41% to $129.99.To read this article in full or to leave a comment, please click here]]> 2017-01-25T07:54:00+00:00 http://www.networkworld.com/article/3161182/cameras/41-off-netgear-arlo-security-system-wireless-hd-camera-indooroutdoor-night-vision-deal-alert.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=299966 False None None None Network World - Magazine Info Kaspersky Lab employee reportedly arrested in Russia on treason charges According to Russian newspaper Kommersant, Ruslan Stoyanov, the head of the computer incidents investigation team at Kaspersky, was arrested in December as part of an investigation that also targeted Sergei Mikhailov, the deputy head of the Information Security Center at the FSB, Russia's internal security service. Russian authorities are investigating Mikhailov in connection to the receipt of money from a foreign organization, an unnamed source close to the FSB reportedly told the newspaper.To read this article in full or to leave a comment, please click here]]> 2017-01-25T07:10:20+00:00 http://www.networkworld.com/article/3161178/security/kaspersky-lab-employee-reportedly-arrested-in-russia-on-treason-charges.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=299967 False Guideline None None Network World - Magazine Info Russia\'s FSB arrests Kaspersky\'s top cybercrime investigator for treason Kommersant that Ruslan Stoyanov may be linked to an investigation into Sergei Mikhailov, a deputy chief of the FSB's Center for Information Security. Both men were arrested in December.Kaspersky Lab confirmed the report of Stoyanov's arrest in Kommersant, then tweeted the following statement: “The case against this employee does not involve Kaspersky Lab. The employee, who is Head of the Computer Incidents Teams, is under investigation for a period predating his employment at Kaspersky Lab. We do not possess details of the investigation.”To read this article in full or to leave a comment, please click here]]> 2017-01-25T07:05:00+00:00 http://www.networkworld.com/article/3161199/security/russias-fsb-arrests-kasperskys-top-cybercrime-investigator-allegedly-for-treason.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=299968 False None None None Network World - Magazine Info Four lesser-known Wi-Fi security threats and how to defend against them ALSO ON NETWORK WORLD: 9 tips for speeding up your business Wi-Fi Once you've protected your network with Wi-Fi Protected Access 2 (WPA2), here are four other vulnerability scenarios you should guard against.To read this article in full or to leave a comment, please click here]]> 2017-01-25T05:08:00+00:00 http://www.networkworld.com/article/3161492/wi-fi/four-lesser-known-wi-fi-security-threats-and-how-to-defend-against-them.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=299573 False None None None Network World - Magazine Info That online job candidate may be carrying a virus To read this article in full or to leave a comment, please click here]]> 2017-01-25T05:06:00+00:00 http://www.networkworld.com/article/3161018/security/that-online-job-candidate-may-be-carrying-a-virus.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=299574 False None None None Network World - Magazine Info Cisco scrambling to fix a remote-code-execution problem in WebEx 10 of the latest craziest and scariest things the TSA found on your fellow travelers+To read this article in full or to leave a comment, please click here]]> 2017-01-25T05:01:00+00:00 http://www.networkworld.com/article/3161491/security/cisco-scrambling-to-fix-a-remote-code-execution-problem-in-webex.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=299575 False None None None Network World - Magazine Info Cyber criminals avoid fraud within their own ranks with new site To read this article in full or to leave a comment, please click here]]> 2017-01-24T16:12:38+00:00 http://www.networkworld.com/article/3161121/security/cyber-criminals-avoid-fraud-within-their-own-ranks-with-new-site.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=298623 False None None None Network World - Magazine Info GPG Suite updated for secure email on OSX Sierra GPG Tools website.It adds support for the OpenPGP encryption standard, which is an open-source version of the PGP encryption package first developed in 1991.Four software apps are contained in the package:-- GPG Mail is a plugin for Apple Mail that allows users to encrypt, decrypt, sign, and verify mails sent using OpenPGP.To read this article in full or to leave a comment, please click here]]> 2017-01-24T13:30:32+00:00 http://www.networkworld.com/article/3160943/encryption/gpg-suite-updated-for-secure-email-on-osx-sierra.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=298624 False None None None Network World - Magazine Info Severe vulnerability in Cisco\'s WebEx extension for Chrome leaves PCs open to easy attack Cisco WebEx extension for Chrome should update to the latest version pronto. Google security researcher Tavis Ormandy recently discovered a serious vulnerability in the Chrome extension that leaves PCs wide open to attack.In older versions of the extension (before version 1.0.3) malicious actors could add a “magic string” to a web address or file hosted on a website. The magic string was designed to remotely activate the WebEx browser extension. Once the extension was activated the bad guys could execute malicious code on the target machine. To read this article in full or to leave a comment, please click here]]> 2017-01-24T10:25:00+00:00 http://www.networkworld.com/article/3161108/software/severe-vulnerability-in-ciscos-webex-extension-for-chrome-leaves-pcs-open-to-easy-attack.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=298625 False None None None Network World - Magazine Info Saudi Arabia again hit with disk-wiping malware Shamoon 2 35,000 computers at Saudi Aramco in 2012, is back; the Shamoon variant prompted Saudi Arabia to issue a warning on Monday.An alert from the telecoms authority, seen by Reuters, warned all organizations to be on the lookout for the variant Shamoon 2. CrowdStrike VP Adam Meyers told Reuters, “The Shamoon hackers were likely working on behalf of the Iranian government in the 2012 campaign and the more-recent attacks. It's likely they will continue.”To read this article in full or to leave a comment, please click here]]> 2017-01-24T08:53:00+00:00 http://www.networkworld.com/article/3161146/security/saudi-arabia-again-hit-with-disk-wiping-malware-shamoon-2.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=298626 False None None None Network World - Magazine Info Court denies US government appeal in Microsoft overseas email case 4-4 decision Tuesday, declined to rehear its July decision that denied the DOJ access to the email of a drug trafficking suspect stored on a Microsoft server in Ireland. Microsoft has been fighting DOJ requests for the email since 2013.To read this article in full or to leave a comment, please click here]]> 2017-01-24T07:52:59+00:00 http://www.networkworld.com/article/3161130/security/court-denies-us-government-appeal-in-microsoft-overseas-email-case.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=298639 False None None None Network World - Magazine Info 6 tips to protect your home network Image by ThinkstockThe rise of malware targeting unsecured IoT endpoints, like the Mirai strain used as part of October's DDoS attack on Dyn, mean it's more important than ever to make security a priority. Remote workers who use their home office as their primary office are arguably at even more of a risk since they may be exposing corporate assets as well as personal assets. Untangle recommends the following best practices to secure your home network.To read this article in full or to leave a comment, please click here]]> 2017-01-24T06:47:00+00:00 http://www.networkworld.com/article/3160911/security/6-tips-to-protect-your-home-network.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=298640 False None None None Network World - Magazine Info Why you need a data protection officer Information Security Forum (ISF), a global, independent information security body that focuses on cyber security and information risk management."The GDPR is putting data protection practices at the forefront of business agendas worldwide," Durbin said in a statement earlier this month. "Its scope is unmatched by any other international law, and we estimate that more than 98 percent of ISF members will be affected by its requirements because they process the personal data of EU residents, or are based in the EU. For most organizations, the next 18 months will be a critical time for their data protection regimes as they determine the applicability of the GDPR and the controls and capabilities they will need to manage their compliance and risk obligations."To read this article in full or to leave a comment, please click here]]> 2017-01-24T06:40:00+00:00 http://www.networkworld.com/article/3160834/techology-business/why-you-need-a-data-protection-officer.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=298641 False None None None Network World - Magazine Info Study: 62% of security pros don\'t know where their sensitive data is HBR article, data is “becoming a centerpiece of corporate value creation.”“Today most organizations are data-driven to one degree or another. Data contributes not only to brand equity, but to what constitutes product and service delivery in globally connected and hyper-competitive markets,” the pair wrote.But the value of data security is still largely defined “in terms of risk, cost, and regulatory compliance,” notes Forrester Research in the executive summary of a new report commissioned by data protection software provider Varonis Systems.To read this article in full or to leave a comment, please click here]]> 2017-01-24T06:38:00+00:00 http://www.networkworld.com/article/3161105/security/study-62-of-security-pros-dont-know-where-their-sensitive-data-is.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=298642 False None None None Network World - Magazine Info Pompeo sworn in as CIA chief amid opposition from surveillance critics was administered to him after the Senate voted in favor of his confirmation in a 66-32 vote.Critics of Pompeo, a Republican representative from Kansas, are concerned that he may weigh in with the government on a rollback of many privacy reforms, including restrictions on the collection of bulk telephone metadata from Americans by the National Security Agency under the USA Freedom Act. There are also concerns that the new director may try to introduce curbs on the use of encryption and bring in measures to monitor the social media accounts of people.To read this article in full or to leave a comment, please click here]]> 2017-01-23T23:35:24+00:00 http://www.networkworld.com/article/3161064/security/pompeo-sworn-in-as-cia-chief-amid-opposition-from-surveillance-critics.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=298245 False None None None Network World - Magazine Info Yahoo pushes back timing of Verizon deal after breaches statement, without elaborating.Verizon has suggested that the data breaches, and the resulting blow to Yahoo's reputation, might cause it to halt or renegotiate the deal.To read this article in full or to leave a comment, please click here]]> 2017-01-23T15:17:14+00:00 http://www.networkworld.com/article/3160749/security/yahoo-pushes-back-timing-of-verizon-deal-after-breaches.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=297466 False None Yahoo None Network World - Magazine Info Open-source oriented RISELab emerges at UC Berkeley to make apps smarter & more secure RISELab that will focus on enabling apps and machines that can interact with the environment around them securely and in real-time.The RISELab (Real-time Intelligence with Secure Execution) is backed by a slew of big name tech and financial firms: Amazon Web Services, Ant Financial, Capital One, Ericsson, GE Digital, Google, Huawei, Intel, IBM, Microsoft and VMWare. MORE: 7 really cool networking & IT research projectsTo read this article in full or to leave a comment, please click here]]> 2017-01-23T14:35:00+00:00 http://www.networkworld.com/article/3160726/open-source-tools/open-source-oriented-riselab-emerges-at-uc-berkeley-to-make-apps-smarter-more-secure.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=297467 False None None None Network World - Magazine Info 10 of the latest craziest and scariest things the TSA found on your fellow travelers Top 10 Most Unusual Finds which outlines the most “dangerous and often times wacky items” it has kept off commercial airliners. To start, we need to look at guns. The number of guns that traverse or try to traverse the skies in the United States continues to grow at an astounding rate. There was a 28% increase in firearm discoveries from 2015's total of 2,653. The TSA says that in 2016, 3,391 firearms were discovered in carry-ons --averaging more than nine firearms per day.To read this article in full or to leave a comment, please click here]]> 2017-01-23T14:17:00+00:00 http://www.networkworld.com/article/3160627/security/10-of-the-latest-craziest-and-scariest-things-the-tsa-found-on-your-fellow-travelers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=297468 False None None None Network World - Magazine Info China goes after unauthorized VPN access from local ISPs notice.  The announcement is a bit of rarity. The country has usually withheld from openly campaigning against VPN use, even as government censors have intermittently tried to squelch access to them in the past.  To read this article in full or to leave a comment, please click here]]> 2017-01-23T13:08:00+00:00 http://www.networkworld.com/article/3160725/internet/china-goes-after-unauthorized-vpn-access-from-local-isps.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=297469 False None None None Network World - Magazine Info The latest database attacks: Tips of the icebergs MongoDB wasn't the first database hit by ransomware, just a rich target for attacks. Now, ElasticSearch and Hadoop have become ransomware targets. They won't be the last. Were these three database products insanely simple to secure? Yes. Were they secured by their installers? Statistics and BitCoin sales would indicate otherwise. And no, they won't be the last. Every hour of every day, websites get pounded with probes. A few are for actual research. When the probe is a fake logon, like the dozens of hourly WordPress admin fails I get on my various websites, you have some idea that the sender isn't friendly.To read this article in full or to leave a comment, please click here]]> 2017-01-23T12:43:00+00:00 http://www.networkworld.com/article/3160624/security/the-latest-database-attacks-tips-of-the-icebergs.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=297482 False None None None Network World - Magazine Info The essential guide to anti-malware tools To read this article in full or to leave a comment, please click here]]> 2017-01-23T10:55:00+00:00 http://www.networkworld.com/article/3160532/security/the-essential-guide-to-anti-malware-tools.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=297483 False None None None Network World - Magazine Info IBM Security to buy risk-visualization firm Agile 3 Solutions Agile 3 Solutions, which makes software for visualizing data risk for analysis by senior executives.The deal is expected to close within weeks, but the financial terms were not released. It will include the purchase of Ravy Technologies, an Agile 3 subcontractor based in India.Agile 3's software identifies risks to business programs and assets, and enables actions to head off possible exploits that could affect business processes. It provides a dashboard for measuring compliance with regulations and legislation.NEWSLETTERS: Get the latest tech news sent directly to your in-box IBM Security customers will be able to buy Agile 3 technology as a service through IBM Data Security Services or as features rolled into IBM Guardian, the company's data-protection software. The company says the addition of the software will help identify and protect critical data.To read this article in full or to leave a comment, please click here]]> 2017-01-23T09:27:00+00:00 http://www.networkworld.com/article/3160529/security/ibm-security-to-buy-risk-visualization-firm-agile-3-solutions.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=297484 False None None None Network World - Magazine Info Top 25 worst-of-the-worst, most common passwords used in 2016 SplashData, the list is based on over 5 million leaked passwords used by users in North America and Western Europe that were posted for sale online.I thought it might be interesting to compare SplashData's newest list with the top 25 most common password list released last week by rival firm Keeper Security. According to the two companies, these were the top 25 worst passwords people used in 2016:To read this article in full or to leave a comment, please click here]]> 2017-01-23T08:57:00+00:00 http://www.networkworld.com/article/3160101/security/top-25-worst-of-the-worst-most-common-passwords-used-in-2016.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=297485 False None None None Network World - Magazine Info IDG Contributor Network: Public vs. private cloud: Why the public cloud is a real threat to security To read this article in full or to leave a comment, please click here]]> 2017-01-23T08:14:00+00:00 http://www.networkworld.com/article/3158424/cloud-computing/public-vs-private-cloud-why-the-public-cloud-is-a-real-threat-to-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=297486 False None None None Network World - Magazine Info Many Organizations Still Opt for “Good Enough” Cybersecurity Through the Eyes of Cyber Security Professionals, in collaboration with the Information Systems Security Association (ISSA).  As part of this report, 437 cybersecurity professionals and ISSA members were asked if they'd experienced a number of types of security incidents.  The research revealed that: 39% of organizations experienced one or several security incidents resulting in the need to reimage one or several endpoints or servers. 27% of organizations experienced one or several incidents of ransomware. 20% of organizations experienced one or several incidents resulting in the disruption of a business application. 19% of organizations experienced one or several incidents resulting in the disruption of a business process. It should be noted that between 23% and 30% of the survey population responded “don't know” or “prefer not to say” when asked about different types of security incidents so the percentages represented above are likely much higher.To read this article in full or to leave a comment, please click here]]> 2017-01-23T07:20:00+00:00 http://www.networkworld.com/article/3160490/security/remarkably-many-organizations-still-opt-for-good-enough-cybersecurity.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=297487 False None None None Network World - Magazine Info IDG Contributor Network: New game, new rules: 3 steps to secure your bank in the digital age recent attacks such as the SWIFT hack, and maintaining the security of their systems and customer data will require them to follow new rules and regulations.To read this article in full or to leave a comment, please click here]]> 2017-01-23T06:24:00+00:00 http://www.networkworld.com/article/3157555/security/new-game-new-rules-3-steps-to-secure-your-bank-in-the-digital-age.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=297488 False None None None Network World - Magazine Info How to keep branch offices as secure as corporate HQ Image by PexelsYour gleaming corporate headquarters, filled with brand-new computers, may be what's on the front page of the company website, but we all know that in many large organizations, much of the day-to-day work happens in local branch offices, often small, poorly equipped, and understaffed. And of course, many companies and workers are embracing the flexibility offered by the internet to work at home full time. But these satellite worksites can end up causing big headaches for tech pros tasked with keeping company assets secure. We talked to a number of tech pros to find out more about the dangers-and the solutions.To read this article in full or to leave a comment, please click here]]> 2017-01-23T05:46:00+00:00 http://www.networkworld.com/article/3159683/security/how-to-keep-branch-offices-as-secure-as-corporate-hq.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=297230 False None None None Network World - Magazine Info New products of the week 1.23.17 Image by SonusOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Backblaze Business GroupsBackblaze Business GroupsImage by BackblazeTo read this article in full or to leave a comment, please click here]]> 2017-01-23T03:26:00+00:00 http://www.networkworld.com/article/3159727/cloud-computing/new-products-of-the-week-1-23-17.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=297231 True None None None Network World - Magazine Info 6 steps to secure a home security camera To read this article in full or to leave a comment, please click here]]> 2017-01-23T03:00:00+00:00 http://www.networkworld.com/article/3159470/security/6-steps-to-secure-a-home-security-camera.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=297232 False None None None Network World - Magazine Info REVIEW: Home security cameras fall short on security CAN100USWT from Canary Connect, stood head and shoulders over the field in baking security into its product design. The Canary camera runs no services onboard, removing a whole class of attacks in which intruders try connecting to the device. And users cannot disable its automatic firmware upgrades, something we'd like to see in every device.To read this article in full or to leave a comment, please click here]]> 2017-01-23T03:00:00+00:00 http://www.networkworld.com/article/3159089/security/review-home-security-cameras-fall-short-on-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=297233 False None None None Network World - Magazine Info Admin of anonymous, Tor-friendly email service has electronics seized at US border Vincent Canfield as he was detained by US Customs and Border Protection and had all of his electronics seized by the agency. He is originally from the US, but currently resides in Romania.Canfield, the admin of the cock.li e-mail hosting service, came to vacation in the US after attending the 33rd Chaos Communication Congress held in Germany during December. He claims CBP detained him for over three hours, asking “lots of strange” and “some offensive questions” about his personal life. He refused to comply and instead gave them his attorney's contact information. Agents allegedly demanded that he decrypt his phone so they could “make sure there isn't any bad stuff on there.” Again he refused, so CPB seized the 14 electronic devices that Canfield had with him.To read this article in full or to leave a comment, please click here]]> 2017-01-22T10:22:00+00:00 http://www.networkworld.com/article/3159662/security/admin-of-anonymous-tor-friendly-email-service-has-electronics-seized-at-us-border.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=296671 False None None None Network World - Magazine Info Lavabit developer has a new encrypted, end-to-end email protocol shut down in 2013 when federal agents investigating Snowden demanded access to email messages of his 410,000 customers, including their private encryption keys.To read this article in full or to leave a comment, please click here]]> 2017-01-20T18:04:28+00:00 http://www.networkworld.com/article/3159561/security/lavabit-developer-has-a-new-encrypted-end-to-end-email-protocol.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=296672 False None None None Network World - Magazine Info Researchers propose a way to use your heartbeat as a password To read this article in full or to leave a comment, please click here]]> 2017-01-20T13:46:18+00:00 http://www.networkworld.com/article/3159556/security/researchers-propose-a-way-to-use-your-heartbeat-as-a-password.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=296673 False None None None Network World - Magazine Info The CSO guide to top security conferences To read this article in full or to leave a comment, please click here]]> 2017-01-20T11:24:00+00:00 http://www.networkworld.com/article/3160052/careers/the-cso-guide-to-top-security-conferences.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=296674 False None None None Network World - Magazine Info Trump nominee suggests IRS cybersecurity and staffing boosts expected to be confirmed, and would likely work with Trump to pick the next IRS director.To read this article in full or to leave a comment, please click here]]> 2017-01-20T11:23:00+00:00 http://www.networkworld.com/article/3159997/security/trump-nominee-suggests-irs-cybersecurity-and-staffing-boosts.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=296687 False None None None Network World - Magazine Info Spanish police nab suspected hacker behind Neverquest banking malware statement from the agency. The FBI, however, declined to comment on the man's arrest.Neverquest is designed to steal username and password information from banking customers. Once it infects a PC, the malware can do this by injecting fake online forms into legitimate banking websites to log any information typed in. It can also take screenshots and video from the PC's desktop and steal any passwords stored locally.To read this article in full or to leave a comment, please click here]]> 2017-01-20T11:03:09+00:00 http://www.networkworld.com/article/3159602/security/spanish-police-nab-suspected-hacker-behind-neverquest-banking-malware.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=296688 False None None None Network World - Magazine Info Google pushed developers to fix security flaws in 275,000 Android apps To read this article in full or to leave a comment, please click here]]> 2017-01-20T07:51:38+00:00 http://www.networkworld.com/article/3159967/security/google-pushed-developers-to-fix-security-flaws-in-275000-android-apps.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=296689 False Guideline None None Network World - Magazine Info How to wake the enterprise from IoT security nightmares Marketsandmarkets.com analyst report. Where the cyber security mayhem grows, so flows the security market money. In 2017, experts predict that gaping IoT security holes will lead to the destruction of critical infrastructure and increases in competitive intelligence gathering and intellectual property theft. 2017 will see more DDoS attacks of the magnitude that brought down the Dyn Domain Name System service and many high-profile web domains with it.To read this article in full or to leave a comment, please click here]]> 2017-01-20T05:14:00+00:00 http://www.networkworld.com/article/3159711/internet-of-things/how-to-wake-the-enterprise-from-iot-security-nightmares.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=296383 False Guideline None None Network World - Magazine Info How fortified is your SAP against security breaches? Image by CrisCan you even tell if a breach has occurred? Have you inventoried its vulnerabilities - and taken steps to prevent, for example, a $22 million per minute loss due to a SAP breach as experienced by one Fortune 100 company? Or have you concluded that the scale of SAP ERP implementations makes it just too big to manage? Ask yourself these 10 questions - compiled by David Binny, vice president of product management at Panaya, and gleaned from its analysis of thousands of SAP landscapes - to find out if your SAP is safe.To read this article in full or to leave a comment, please click here]]> 2017-01-20T05:12:00+00:00 http://www.networkworld.com/article/3159633/application-security/how-fortified-is-your-sap-against-security-breaches.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=296384 False None None None Network World - Magazine Info Microsoft\'s standing to sue over secret US data requests in question To read this article in full or to leave a comment, please click here]]> 2017-01-19T23:29:44+00:00 http://www.networkworld.com/article/3159846/security/microsofts-standing-to-sue-over-secret-us-data-requests-in-question.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=296232 False None None None Network World - Magazine Info Assange seeks to discuss his US extradition with the feds webcast on Thursday. "We look forward to having a conversation with the DOJ (U.S. Department of Justice) about what the correct way forward is."Assange previously made his pledge on the condition that President Barack Obama grant clemency to Chelsea Manning, a former U.S. soldier who was jailed for disclosing sensitive documents to WikiLeaks back in 2010.To read this article in full or to leave a comment, please click here]]> 2017-01-19T14:06:31+00:00 http://www.networkworld.com/article/3159764/security/assange-seeks-to-discuss-his-us-extradition-with-the-feds.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=295415 False None None None Network World - Magazine Info Air Force goes after cyber deception technology Prattle system for the Air Force. Galios describes Prattle as a system that generates traffic that misleads an attacker that has penetrated a network: making them doubt what they have learned, or to cause them to make mistakes that increase their likelihood of being detected sooner.To read this article in full or to leave a comment, please click here]]> 2017-01-19T12:38:00+00:00 http://www.networkworld.com/article/3159704/security/air-force-goes-after-cyber-deception-technology.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=295416 False Guideline None None Network World - Magazine Info Encrypted email service ProtonMail is now accessible over Tor To read this article in full or to leave a comment, please click here]]> 2017-01-19T11:17:05+00:00 http://www.networkworld.com/article/3159607/security/encrypted-email-service-protonmail-is-now-accessible-over-tor.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=295417 False None None None Network World - Magazine Info Secdo automates alert investigation with preemptive incident response   here to subscribe.   “We don't receive enough alerts in our security operations center,” said no security analyst ever. The fact is, most SOC teams are overwhelmed with security alerts and they must prioritize which ones to investigate. Many alerts are simply ignored for lack of resources, yet quite often after a data breach it turns out there was an alert pointing at the breach early on. In the case of one prominent breach at a major retailer a few years ago, many sources report that a FireEye tool generated an alert confirming that malicious software showed up on a company system. Because so many of those particular alerts were false positives, it was ignored, which subsequently led to one of the largest and most costly retail data breaches in history.To read this article in full or to leave a comment, please click here]]> 2017-01-19T09:24:00+00:00 http://www.networkworld.com/article/3159123/security/secdo-automates-alert-investigation-with-preemptive-incident-response.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=295418 False None None None Network World - Magazine Info IDG Contributor Network: Data protection and security: What\'s in store for 2017? 2017 breach predictions: The big one is inevitable + But it isn't an easy task. Consumers want the feeling of added security, but they don't want to deal with extra steps to protect themselves. Case in point, you have passwords for apps and logins to bank accounts, credit cards, Starbucks, and more on your phone. Now, with Apple's Touch ID, you can set up access with a single login method-your fingerprint. Is that more or less secure? Or is it simply preferred because of its ease of use? All a hacker needs to do is replicate your fingerprint and they have instant access.To read this article in full or to leave a comment, please click here]]> 2017-01-19T08:05:00+00:00 http://www.networkworld.com/article/3159105/security/data-protection-and-security-whats-in-store-for-2017.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=295431 False None None None Network World - Magazine Info Attackers start wiping data from CouchDB and Hadoop databases the MongoDB and Elasticsearch attacks so far, have also started keeping track of the new Hadoop and CouchDB victims. The two have put together spreadsheets on Google Docs where they document the different attack signatures and messages left behind after data gets wiped from databases.To read this article in full or to leave a comment, please click here]]> 2017-01-19T07:17:55+00:00 http://www.networkworld.com/article/3159524/security/attackers-start-wiping-data-from-couchdb-and-hadoop-databases.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=295432 False None None None Network World - Magazine Info Is antivirus getting worse? KnowBe4, looked at the data published by the Virus Bulletin, a site that tracks anti-virus detection rates. And the numbers didn't look good.Average detection rates for known malware went down a couple of percentage points slightly from 2015 to 2016, he said, while detection rates for zero-days dropped in a big way - from an average of 80 percent down to 70 percent or lower.To read this article in full or to leave a comment, please click here]]> 2017-01-19T06:06:00+00:00 http://www.networkworld.com/article/3159469/computers/is-antivirus-getting-worse.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=295433 False None None None Network World - Magazine Info 7 (more) security TED Talks you can\'t miss Image by Thomas XuThe first list 10 security Ted Talks you can't miss was so popular we decided to serve another. So here is another batch of must see security and privacy videos. In this selection you'll find speakers taking on some of the most pressing, and persistent, security and privacy challenges of our time, from how society can fight the war on terror while maintaining the social values we cherish to Bruce Schneier's talk on how challenging it is for us to evaluate and understand risk. It's a must-see talk. Well, we think they all are, so enjoy.To read this article in full or to leave a comment, please click here]]> 2017-01-19T06:00:00+00:00 http://www.networkworld.com/article/3159199/security/7-more-security-ted-talks-you-can-t-miss.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=295434 False None None None Network World - Magazine Info CIA updates rules for collecting and retaining info on US people To read this article in full or to leave a comment, please click here]]> 2017-01-18T23:38:38+00:00 http://www.networkworld.com/article/3158701/security/cia-updates-rules-for-collecting-and-retaining-info-on-us-people.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=295036 False None None None Network World - Magazine Info Mac malware is found targeting biomedical research blog post on Wednesday.The security firm said that neither it nor Apple have identified how the malware has been spreading. But whoever designed it relied on “ancient” coding functions, dating back before the Mac OS X operating system launch in 2001, said Malwarebytes researcher Thomas Reed in the blog post.To read this article in full or to leave a comment, please click here]]> 2017-01-18T14:37:33+00:00 http://www.networkworld.com/article/3159245/malware/mac-malware-is-found-targeting-biomedical-research.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=294590 False None None None Network World - Magazine Info 10 Cool Security Startups Vying for Glory at RSA Conference Innovation Sandbox Contest for startups.I ran the company descriptions provided in the RSA Conference press release about the contest through a Wordcloud generator and produced the spectacular graphic above that put "data" protection at the heart of what these newcomers are addressing. The biggest shock for me was that machine learning didn't get mentioned in each description...but it did make the cut in three of the 10.To read this article in full or to leave a comment, please click here]]> 2017-01-18T14:30:00+00:00 http://www.networkworld.com/article/3159133/security/10-cool-security-startups-vying-for-glory-at-rsa-conference.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=294591 False None None None Network World - Magazine Info Fraud for online holiday sales spikes by 31% To read this article in full or to leave a comment, please click here]]> 2017-01-18T13:15:00+00:00 http://www.networkworld.com/article/3158698/security/fraud-for-online-holiday-sales-spikes-by-31.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=294592 False None None None