www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-14T14:59:01+00:00 www.secnews.physaphae.fr Network World - Magazine Info Can government really fix the IoT mess? To read this article in full or to leave a comment, please click here]]> 2017-01-06T05:29:00+00:00 http://www.networkworld.com/article/3155247/internet-of-things/can-government-really-fix-the-iot-mess.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=286842 False None None None Network World - Magazine Info When anti-malware vendors get into a slap fight, users lose To read this article in full or to leave a comment, please click here]]> 2017-01-06T04:30:00+00:00 http://www.networkworld.com/article/3155113/security/when-anti-malware-vendors-get-into-a-slap-fight-users-lose.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=286843 False None None None Network World - Magazine Info FBI dispute with DNC over hacked servers may fuel doubt on Russia role skepticism over whether the U.S. properly arrived at its conclusion that Russian cyberspies were responsible for the breach.To read this article in full or to leave a comment, please click here]]> 2017-01-05T19:28:43+00:00 http://www.networkworld.com/article/3155163/security/fbi-dispute-with-dnc-over-hacked-servers-may-fuel-doubt-on-russia-role.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=286367 False None None None Network World - Magazine Info KillDisk cyber sabotage tool evolves into ransomware To read this article in full or to leave a comment, please click here]]> 2017-01-05T16:19:29+00:00 http://www.networkworld.com/article/3155147/security/killdisk-cyber-sabotage-tool-evolves-into-ransomware.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=286368 False None None None Network World - Magazine Info FTC goes after D-Link for shoddy security in routers, cameras said in a complaint filed against the Taiwanese manufacturer charging D-Link with repeatedly failing to take reasonable measures to secure the products.The action comes as hackers have been hijacking poorly secured internet-connected products to launch massive cyberattacks that can force websites offline. Recently, a notorious malware known as Mirai has been found infecting routers, cameras, and DVRs built with weak default passwords.To read this article in full or to leave a comment, please click here]]> 2017-01-05T13:02:44+00:00 http://www.networkworld.com/article/3154815/security/ftc-goes-after-d-link-for-shoddy-security-in-routers-cameras.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=286369 False None None None Network World - Magazine Info FTC takes D-Link to court citing lax product security, privacy perils has filed a complaint against network equipment vendor D-Link saying inadequate security in the company's wireless routers and Internet cameras left consumers open to o hackers and privacy violations. +More on Network World: Top 10 Google searches of 2016 in pictures+ The FTC, in a complaint filed in the Northern District of California charged that “D-Link failed to take reasonable steps to secure its routers and Internet Protocol (IP) cameras, potentially compromising sensitive consumer information, including live video and audio feeds from D-Link IP cameras.”To read this article in full or to leave a comment, please click here]]> 2017-01-05T11:53:00+00:00 http://www.networkworld.com/article/3154899/security/ftc-takes-d-link-to-court-citing-lax-product-security-privacy-perils.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=286370 False None None None Network World - Magazine Info 7 tips for better security awareness training sessions Image by ThinkstockAt their worst, security awareness training sessions are boring wastes of time, both for employees and the IT people responsible for them. At their best, however, they are interactive, discussion-driven, and genuinely helpful opportunities to raise security issues and lay the groundwork for better habits.To read this article in full or to leave a comment, please click here]]> 2017-01-05T11:48:00+00:00 http://www.networkworld.com/article/3154734/it-skills-training/7-tips-for-better-security-awareness-training-sessions.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=286383 False None None None Network World - Magazine Info Plone dismisses claim that flaw in its CMS was used to hack FBI a post on Pastebin Monday that he didn't find the Plone vulnerability himself, but he was asked to test it out by the person who did.To read this article in full or to leave a comment, please click here]]> 2017-01-05T10:39:00+00:00 http://www.networkworld.com/article/3155104/security/plone-dismisses-claim-that-flaw-in-its-cms-was-used-to-hack-fbi.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=286384 False None None None Network World - Magazine Info Mozilla: \'IoT will be the first big battle of 2017,\' calls for responsible IoT Hair Coach, the world's first smart hairbrush and companion app. It is just one of the many products that leaves me asking WHY?Microphone in Hair Coach - the world's first smart hairbrush L'Orea Screenshot from L'Oreal videoTo read this article in full or to leave a comment, please click here]]> 2017-01-05T09:21:00+00:00 http://www.networkworld.com/article/3154938/security/mozilla-iot-will-be-the-first-big-battle-of-2017-calls-for-responsible-iot.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=286385 False None None None Network World - Magazine Info 2017: The year of cybersecurity scale To read this article in full or to leave a comment, please click here]]> 2017-01-05T08:34:00+00:00 http://www.networkworld.com/article/3154813/security/2017-the-year-of-cybersecurity-scale.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=286386 False Guideline None None Network World - Magazine Info Spy chief: US should use all tools to counter Russian hacking told a Senate committee. "We currently cannot put a lot of stock ... in cyber deterrence. Unlike nuclear weapons, cyber capabilities are difficult to see and evaluate and are ephemeral."To read this article in full or to leave a comment, please click here]]> 2017-01-05T08:30:00+00:00 http://www.networkworld.com/article/3154808/security/spy-chief-us-should-use-all-tools-to-counter-russian-hacking.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=286387 False None None None Network World - Magazine Info Why companies offer a hacking bounty listing on HackerOne spells everything out: Hackers will receive a cash payment for discovering a vulnerability in the system, which does let gamers make purchases and stores private information like your age and gender. There's a range for this, of course -- some discoveries will pay $100. Also, anyone who files a report must follow the exact template.It makes you wonder -- why would a major Japanese corporation offer a reward like this? Why is it even worth the expense, especially when you know they have internal security researchers?To read this article in full or to leave a comment, please click here]]> 2017-01-05T04:45:00+00:00 http://www.networkworld.com/article/3154833/security/why-companies-offer-a-hacking-bounty-and-why-there-are-challenges.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=285996 False None None None Network World - Magazine Info Ransomware took in $1 billion in 2016--improved defenses may not be enough to stem the tide phishing threats, better antivirus technology, more industry-wide information sharing and cross-border efforts by law enforcement authorities will combine to turn the tide against ransomware this year, according to some security experts, but others expect the attacks to continue to increase.According to a security expert who requested anonymity, ransomware cybercriminals took in about $1 billion last year, based on money coming into ransomware-related Bitcoin wallets.That includes more than $50 million each for three wallets associated with the Locky ransomware, and a fourth one that processed close to $70 million. Cryptowall brought in close to $100 million before it was shut down this year. CryptXXX gathered in $73 million during the second half of 2016, and Cerber took in $54 million, the expert said.To read this article in full or to leave a comment, please click here]]> 2017-01-05T04:43:00+00:00 http://www.networkworld.com/article/3154832/security/ransomware-took-in-1-billion-in-2016-improved-defenses-may-not-be-enough-to-stem-the-tide.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=285997 False Guideline None None Network World - Magazine Info DDoS-for-hire services thrive despite closure of major marketplace shut down its "Server Stress Testing" section, amid concerns that hackers were peddling DDoS-for-hire services through the site for as little as US$10 a month.According to security experts, the section was the largest open marketplace for paid DDoS attacks -- a notorious hacking technique that can disrupt access to internet services or websites. But since the section's closure, the attacks remain rampant.To read this article in full or to leave a comment, please click here]]> 2017-01-04T12:58:19+00:00 http://www.networkworld.com/article/3154725/security/ddos-for-hire-services-thrive-despite-closure-of-major-marketplace.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=285112 False None None None Network World - Magazine Info HTTPS scanning in Kaspersky antivirus exposed users to MITM attacks To read this article in full or to leave a comment, please click here]]> 2017-01-04T09:01:18+00:00 http://www.networkworld.com/article/3154604/security/https-scanning-in-kaspersky-antivirus-exposed-users-to-mitm-attacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=285113 False None None None Network World - Magazine Info TCL targets Apple, Samsung with new BlackBerry handset To read this article in full or to leave a comment, please click here]]> 2017-01-04T08:15:01+00:00 http://www.networkworld.com/article/3154496/smartphones/tcl-targets-apple-samsung-with-new-blackberry-handset.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=285114 False None None None Network World - Magazine Info \'I will eliminate passwords\' in 2017 Image by ThinkstockLike anyone else, security experts set up resolutions they hope to conquer in the new year. Now the question will remain, will they be able to follow through on them or -- like that diet people promised to hold to – will they go back to the same old habits.To read this article in full or to leave a comment, please click here]]> 2017-01-04T08:00:00+00:00 http://www.networkworld.com/article/3154467/security/i-will-eliminate-passwords-in-2017.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=285115 False None None None Network World - Magazine Info Hacker wiping unprotected MongoDB installs and holding data for ransom warned that there were 684.8 TB of data exposed due to publicly accessible MongoDB instances. Yet there are still people don't who bother to learn how to lock it down and so now a hacker is targeting and erasing those MongoDB installations, replacing the data with a ransom demand.Security researcher Victor Gevers, aka @0xDUDE and co-founder of the GDI Foundation, has personally been notifying owners of exposed MongoDB for years. But near the end of 2016, he came across an open MongoDB server that had the database contents replaced with a ransom note.To read this article in full or to leave a comment, please click here]]> 2017-01-04T07:03:00+00:00 http://www.networkworld.com/article/3154536/security/hacker-wiping-unprotected-mongodb-installs-and-holding-data-for-ransom.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=285128 False None None None Network World - Magazine Info FTC sets $25,000 prize for automatic IoT patching to be published Wednesday in the Federal Register.The tool, at a minimum, will "help protect consumers from security vulnerabilities caused by out-of-date software," said the FTC.The government's call for help cites the use of internet-enabled cameras as a platform for a distributed denial of service (DDoS) attack last October. Weak default passwords were blamed.To read this article in full or to leave a comment, please click here]]> 2017-01-04T04:51:00+00:00 http://www.networkworld.com/article/3154491/security/ftc-sets-25-000-prize-for-automatic-iot-patching.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=284890 False None None None Network World - Magazine Info Uncertainty clouds debate on Russia\'s suspected role in election hacks To read this article in full or to leave a comment, please click here]]> 2017-01-03T20:07:58+00:00 http://www.networkworld.com/article/3154429/security/uncertainty-clouds-debate-on-russias-suspected-role-in-election-hacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=284035 False None None None Network World - Magazine Info Top 10 Ethical Dilemmas & Policy Issues in Science & Tech fourth annual list of emerging ethical dilemmas and policy issues in science and technology, and it contains some doozies. It might have seemed tough to top some of 2016's issues, from lethal cyberweapons to bone conduction for marketing, but no sweat. Of course the Notre Dame center's researchers hope to be able help address some of these new concerns.To read this article in full or to leave a comment, please click here]]> 2017-01-03T12:09:00+00:00 http://www.networkworld.com/article/3153936/cloud-computing/top-10-ethical-dilemmas-policy-issues-in-science-tech.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=284036 False None None None Network World - Magazine Info IDG Contributor Network: How mainframes prevent data breaches To read this article in full or to leave a comment, please click here]]> 2017-01-03T11:25:00+00:00 http://www.networkworld.com/article/3154085/hardware/how-mainframes-prevent-data-breaches.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=284037 False None Yahoo None Network World - Magazine Info Review: Microsoft Windows Defender comes up short To read this article in full or to leave a comment, please click here]]> 2017-01-03T09:48:00+00:00 http://www.networkworld.com/article/3154267/security/review-microsoft-windows-defender-comes-up-short.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=284038 False None None None Network World - Magazine Info Security data growth drives SOAPA evolutionary trend I see happening around cybersecurity analytics and operations technology. Historically, large enterprises have relied on SIEM products to anchor their security operations centers (SOCs). This will continue, but I see SIEM becoming part of a more global cybersecurity software architecture called SOAPA (security operations and analytics platform architecture). To read this article in full or to leave a comment, please click here]]> 2017-01-03T09:29:00+00:00 http://www.networkworld.com/article/3154090/security/security-data-growth-drives-security-operations-and-analytics-platform-architecture-soapa.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=284051 False None None None Network World - Magazine Info Ransomware on smart TVs is here and removing it can be a pain infect his own TV with an Android ransomware application to highlight the threat. While that infection was just a demonstration, this Christmas, the owner of an LG Electronics TV experienced the real deal.To read this article in full or to leave a comment, please click here]]> 2017-01-03T08:50:02+00:00 http://www.networkworld.com/article/3154161/security/ransomware-on-smart-tvs-is-here-and-removing-it-can-be-a-pain.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=284052 False None None None Network World - Magazine Info Security Without Borders: Free security help for dissidents To read this article in full or to leave a comment, please click here]]> 2017-01-03T08:33:00+00:00 http://www.networkworld.com/article/3154188/security/security-without-borders-free-security-help-for-dissidents.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=284053 False None None None Network World - Magazine Info Cisco talks 2017 SD-WAN predictions Gartner wrote that spending on SD-WAN products will rise from $129 million in 2016 to $1.24 billion in 2020. “While WAN architectures and technologies tend to evolve at a very slow pace - perhaps a new generation every 10 to 15 years - the disruptions caused by the transformation to digital business models are driving adoption of SD-WAN at a pace that is unheard of in wide-area networking,” Gartner wrote.To read this article in full or to leave a comment, please click here]]> 2017-01-03T08:05:00+00:00 http://www.networkworld.com/article/3153951/security/cisco-talks-2017-sd-wan-predictions.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=284054 False None None None Network World - Magazine Info Donald Trump offers cybersecurity warning: \'No computer is safe\' To read this article in full or to leave a comment, please click here]]> 2017-01-02T10:00:08+00:00 http://www.networkworld.com/article/3153969/security/donald-trump-offers-cybersecurity-warning-no-computer-is-safe.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=283661 False None None None Network World - Magazine Info Cops to increasingly use digital footprints from IoT devices for investigations told the Times.The police are being trained to look for “digital footprints” – IoT gadgets that “track or record activities” which might prove or disprove alibis and witness statements as well as record what occurred during a murder victim's final moments.Cops will be relying on evidence from smart devices which spy on you – such as internet connected refrigerators, light bulbs, washing machines, vacuum cleaners, coffee makers and voice-controlled robotic assistants.To read this article in full or to leave a comment, please click here]]> 2017-01-02T06:24:00+00:00 http://www.networkworld.com/article/3154064/security/cops-to-increasingly-use-digital-footprints-from-iot-devices-for-investigations.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=283662 False None None None Network World - Magazine Info How to handle business continuity in a crisis Image by ThinkstockMost businesses are critically reliant upon their IT systems. If these systems go down due to a natural disaster, temporary power outage, loss of data center, ransomware or hacker attack, lost or corrupted files, or an application failure due to a software virus, the results can inflict significant financial harm. In the worst case, the business will be unable to continue functioning.To read this article in full or to leave a comment, please click here]]> 2017-01-02T04:32:00+00:00 http://www.networkworld.com/article/3153968/business-continuity/how-to-handle-business-continuity-in-a-crisis.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=283503 False None None None Network World - Magazine Info 4 information security threats that will dominate 2017 Information Security Forum (ISF), a global, independent information security body that focuses on cyber security and information risk management, forecasts businesses will face four key global security threats in 2017."2016 certainly lived up to expectations," says Steve Durbin, managing director of the ISF. "We saw all sorts of breaches that just seemed to get bigger and bigger. We lurched from one to another. We always anticipate some level of it, but we never anticipate the full extent. I don't think anybody would have anticipated some of the stuff we've seen of late in terms of the Russians getting involved in the recent elections."To read this article in full or to leave a comment, please click here]]> 2016-12-30T04:45:00+00:00 http://www.networkworld.com/article/3153826/security/4-information-security-threats-that-will-dominate-2017.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=282840 False None None None Network World - Magazine Info Tech outages of 2016 and how to prevent them in 2017 Image by Thinkstock2016 has seen major downtime events lead to lost revenue for a number of highly-recognizable brands and caused a severe knock to their reputation and consumer confidence. One of the most common causes of outages is unplanned configuration changes to a system, often when an immediate fix for a bug or potential system vulnerability unintentionally creates a much larger problem.To read this article in full or to leave a comment, please click here]]> 2016-12-30T04:37:00+00:00 http://www.networkworld.com/article/3153723/security/tech-outages-of-2016-and-how-to-prevent-them-in-2017.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=282841 False Guideline None None Network World - Magazine Info The US has sanctioned Russia over election hacking released a detailed assessment by the Federal Bureau of Investigation (FBI) and Department of Homeland Security (DHS) of the cyber attacks.To read this article in full or to leave a comment, please click here]]> 2016-12-29T13:53:56+00:00 http://www.networkworld.com/article/3153727/election-hacking/the-us-has-sanctioned-russia-over-election-hacking.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=281876 False None None None Network World - Magazine Info New year\'s resolution for IoT vendors: Start treating LANs as hostile infect Belkin WeMo smart plugs with malware. The flaw was located in a configuration protocol that worked over the local area network and didn't require any authentication.In 2015, when researchers from vulnerability intelligence firm Rapid7 analyzed nine Internet-connected baby monitors, they found hardcoded credentials in four of them. Those backdoor accounts provided administrative access to the devices over the local network.To read this article in full or to leave a comment, please click here]]> 2016-12-29T10:19:00+00:00 http://www.networkworld.com/article/3153711/security/new-years-resolution-for-iot-vendors-start-treating-lans-as-hostile.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=281877 False None None None Network World - Magazine Info It\'s 2017 and changing other people\'s flight bookings is incredibly easy presented their findings Tuesday at the 33rd Chaos Communications Congress in Hamburg.To read this article in full or to leave a comment, please click here]]> 2016-12-29T10:13:50+00:00 http://www.networkworld.com/article/3153689/security/its-2017-and-changing-other-peoples-flight-bookings-is-incredibly-easy.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=281878 False None None None Network World - Magazine Info 5 signs we\'re finally getting our act together on security ransomware has surged in the last year. Although that kind of malware has been around for years, the current model of encrypting user files to hold data hostage came about just recently. Infections quadrupled in 2016, with the FBI estimating an average of 4,000 attacks a day. A recent IBM survey of 600 business leaders in the United States found that one in two had experienced a ransomware attack in the workplace, and that companies paid the ransom 70 percent of the time. As a result, criminals are on track to make nearly $1 billion this year from ransomware, IBM X-Force said.To read this article in full or to leave a comment, please click here]]> 2016-12-29T04:36:00+00:00 http://www.networkworld.com/article/3153620/security/5-signs-were-finally-getting-our-act-together-on-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=281637 False Guideline None None Network World - Magazine Info What to do if your data is taken hostage report that in part describes how to deal with criminals when they are holding your data hostage. The report talks of what to do once a breach has been found.To read this article in full or to leave a comment, please click here]]> 2016-12-29T04:29:00+00:00 http://www.networkworld.com/article/3153241/security/what-to-do-if-your-data-is-taken-hostage.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=281638 False None None None Network World - Magazine Info Critical flaw in PHPMailer library puts millions of websites at risk was found by a security researcher named Dawid Golunski and an initial fix was included in PHPMailer 5.2.18, which was released Saturday. However, it turns out that the patch was incomplete and can be bypassed.To read this article in full or to leave a comment, please click here]]> 2016-12-28T07:55:40+00:00 http://www.networkworld.com/article/3153684/security/critical-flaw-in-phpmailer-library-puts-millions-of-websites-at-risk.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=281192 False None None None Network World - Magazine Info Thwarting cybersecurity threats with behavioral analytics in 2017 To read this article in full or to leave a comment, please click here]]> 2016-12-28T04:49:00+00:00 http://www.networkworld.com/article/3153593/analytics/thwarting-cybersecurity-threats-with-behavioral-analytics-in-2017.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=281034 False None None None Network World - Magazine Info 9 technologies that IT needed but didn\'t get in 2016 To read this article in full or to leave a comment, please click here]]> 2016-12-28T04:46:00+00:00 http://www.networkworld.com/article/3153502/servers/9-technologies-that-it-needed-but-didnt-get-in-2016.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=281035 False None None None Network World - Magazine Info Encryption in 2016: Small victories add up InfoWorld's Deep Dive technology reports and Computerworld's career trends reports. GET A 15% DISCOUNT through Jan.15, 2017: Use code 8TIISZ4Z. ] Some of those changes began shortly after Edward Snowden's disclosures of the U.S. government's extensive surveillance apparatus. Others are the natural result of cryptographic ideas reaching the marketplace, says Brent Waters, an associate professor at the University of Texas at Austin and the recipient of the Association for Computing Machinery's 2015 Grace Murray Hopper Award.To read this article in full or to leave a comment, please click here]]> 2016-12-28T04:42:00+00:00 http://www.networkworld.com/article/3153591/security/encryption-in-2016-small-victories-add-up.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=281036 False None None None Network World - Magazine Info Ransomworm: the next level of cybersecurity nastiness Report).Corey Nachreiner, CTO at WatchGuard Technologies, predicts that 2017 will see the first ever ransomworm, causing ransomware to spread even faster.To read this article in full or to leave a comment, please click here]]> 2016-12-27T04:39:00+00:00 http://www.networkworld.com/article/3153238/security/ransomworm-the-next-level-of-cybersecurity-nastiness.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=280055 False None None None Network World - Magazine Info IDG Contributor Network: Will networks and security converge in 2017? Zeus Kerravala looked into his crystal bowl for the networking space, and Taylor Armeriding did the same for security. We went rummaging through our fortune cookies and came up with this Yoda-like one for 2017:Security shall networking become.What did that really mean? Our Yoda translator was of no help. Could networking replace security (or vice versa) in 2017? Should CIOs and CISOs prepare themselves for the inevitable assimilation (head nod to you aging Trekies)? How should, then, security and networking personnel prepare themselves for the inevitable onslaught?To read this article in full or to leave a comment, please click here]]> 2016-12-27T04:20:00+00:00 http://www.networkworld.com/article/3153259/lan-wan/will-networks-and-security-converge-in-2017.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=280056 False None None None Network World - Magazine Info Using big data for security only provides insight, not protection To read this article in full or to leave a comment, please click here]]> 2016-12-27T01:59:00+00:00 http://www.networkworld.com/article/3153209/security/using-big-data-for-security-only-provides-insight-not-protection.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=279929 False None None None Network World - Magazine Info New products of the week 12.26.16 Image by DabkicksOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Cumulus Linux 3.2cumulusImage by Cumulus NetworksTo read this article in full or to leave a comment, please click here]]> 2016-12-26T06:00:00+00:00 http://www.networkworld.com/article/3152714/mobile-wireless/new-products-of-the-week-12-26-16.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=279727 True None None None Network World - Magazine Info Corporate boards aren\'t prepared for cyberattacks Yahoo announced the largest-ever data breach, involving more than 1 billion customer accounts.Despite the scale and potential harm from such attacks, there's wide recognition that corporate leaders, especially boards of directors, aren't taking the necessary actions to defend their companies against such attacks. It's not just a problem of finding the right cyber-defense tools and services, but also one of management awareness and security acumen at the highest level, namely corporate boards.To read this article in full or to leave a comment, please click here]]> 2016-12-26T04:51:00+00:00 http://www.networkworld.com/article/3153409/security/corporate-boards-arent-prepared-for-cyberattacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=279728 False Guideline Yahoo None Network World - Magazine Info What fake news means for IT-and how IT security can help fight it fake pro-Trump news stories in order to harvest ad clicks, it triggered a serious feeling of déjà vu among those who work in cybersecurity.Scrappy bands of shady Eastern Europeans entrepreneurs taking advantages of weaknesses in our tech infrastructure to make a buck, and maybe fulfill sinister more designs? The debate over fake news is roiling the political world, but elements of it look very familiar to tech veterans-and represent a potentially new attack vector that IT needs to worry about.To read this article in full or to leave a comment, please click here]]> 2016-12-23T10:48:00+00:00 http://www.networkworld.com/article/3153367/security/what-fake-news-means-for-it-and-how-it-security-can-help-fight-it.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=279353 False None None None Network World - Magazine Info Apple gives iOS app developers more time to encrypt communications To read this article in full or to leave a comment, please click here]]> 2016-12-23T05:25:11+00:00 http://www.networkworld.com/article/3153351/security/apple-gives-ios-app-developers-more-time-to-encrypt-communications.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=279167 False None None None Network World - Magazine Info US collects social media handles from select visitors enter information associated with your online presence-Provider/Platform-Social media identifier,” which visitors can fill optionally.To read this article in full or to leave a comment, please click here]]> 2016-12-22T21:34:39+00:00 http://www.networkworld.com/article/3152707/security/us-collects-social-media-handles-from-select-visitors.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=278753 False None None None Network World - Magazine Info Black market medical record prices drop to under $10, criminals switch to ransomware TrapX, the company that produced the report.That down a bit since this summer, when a hacker offered 10 million patient records for about $820,000 -- or about $12 per record -- and even a bigger drop from 2012, when the World Privacy Forum put the street value of medical records at around $50 each.To read this article in full or to leave a comment, please click here]]> 2016-12-22T13:16:00+00:00 http://www.networkworld.com/article/3153265/malware-cybercrime/black-market-medical-record-prices-drop-to-under-10-criminals-switch-to-ransomware.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=278754 False None None None Network World - Magazine Info The group that hacked the DNC infiltrated Ukrainian artillery units To read this article in full or to leave a comment, please click here]]> 2016-12-22T11:51:45+00:00 http://www.networkworld.com/article/3153022/security/the-group-that-hacked-the-dnc-infiltrated-ukrainian-artillery-units.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=278755 False None APT 28 None Network World - Magazine Info Looking Back to Look Forward on Cybersecurity Bruce Schneier, and ESG also published a video where I exchanged cybersecurity prophecies with my colleague Doug Cahill (note: I am an ESG employee).Yup, prognosticating about the future of cybersecurity has become a mainstream activity, but rather than simply guess at what will happen next year, I think it is useful to review what actually happened over the past few years and extrapolate from there.To read this article in full or to leave a comment, please click here]]> 2016-12-22T10:45:00+00:00 http://www.networkworld.com/article/3153184/security/looking-back-to-look-forward-on-cybersecurity.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=278756 False None None None Network World - Magazine Info Encrypted messaging app Signal uses Google to bypass censorship started being censored in Egypt and the United Arab Emirates. Some users reported that VPNs, Apple's FaceTime and other voice-over-IP apps were also being blocked.To read this article in full or to leave a comment, please click here]]> 2016-12-22T07:06:00+00:00 http://www.networkworld.com/article/3152765/security/encrypted-messaging-app-signal-uses-google-to-bypass-censorship.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=278769 False None None None Network World - Magazine Info What the infosec jobs sector will look like in 2017 Image by EthanMany reports touted the fact that there are not enough workers with the proper cybersecurity skills necessary to fill all the vacant jobs. Forrester suggests looking to external expertise and automation for a quarter of the work. The complexity curve facing enterprises hasn't reached its peak yet, which leaves security stuck solving problems of capacity and capability with limited resources already burdened with too many technologies, too many alerts, and too much to do. This combined spending will include security outsourcing, managed security services, security consultants and integrators, and security automation technologies.To read this article in full or to leave a comment, please click here]]> 2016-12-22T05:31:00+00:00 http://www.networkworld.com/article/3152661/careers/what-the-infosec-jobs-sector-will-look-like-in-2017.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=278445 False None None None Network World - Magazine Info Free security tools to support cyber security efforts To read this article in full or to leave a comment, please click here]]> 2016-12-22T05:30:00+00:00 http://www.networkworld.com/article/3153055/security/free-security-tools-to-support-cyber-security-efforts.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=278446 False None None None Network World - Magazine Info Experts split on how soon quantum computing is coming, but say we should start preparing now To read this article in full or to leave a comment, please click here]]> 2016-12-22T05:28:00+00:00 http://www.networkworld.com/article/3152660/security/experts-split-on-how-soon-quantum-computing-is-coming-but-say-we-should-start-preparing-now.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=278447 False None None None Network World - Magazine Info Top 5 VPN services for personal privacy and security coworking space.A plethora of modern VPN services, with dedicated connectivity apps, have put an end to the maddening manual configuration VPNs once required. No two VPN offerings are alike, however, and it can be a challenge to find the right VPN. Here's a look at some of the top VPNs for privacy and security.To read this article in full or to leave a comment, please click here]]> 2016-12-22T05:26:00+00:00 http://www.networkworld.com/article/3153054/security/top-5-vpn-services-for-personal-privacy-and-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=278448 False None None None Network World - Magazine Info IDG Contributor Network: Don\'t make risk and compliance the enemy of financial services innovation and reinvention Financial services firm adopts agile for digital development + On the other hand, there is a constant challenge around juggling changes. In an era when financial institutions are more highly regulated than ever before, risk and compliance mandates add an entirely new level of complexity.To read this article in full or to leave a comment, please click here]]> 2016-12-22T04:30:00+00:00 http://www.networkworld.com/article/3152454/cloud-computing/dont-make-risk-and-compliance-the-enemy-of-financial-services-innovation-and-reinvention.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=278461 False None None None Network World - Magazine Info IoT product development is broken – 6 ways developers and manufacturers can fix it Gartner estimates that over 4 billion IoT devices will be installed by the end of 2016, with that number rising to 20 billion by 2020. In a market where connected devices or “things” in the enterprise will drive spending to more than $868 billion in this year alone, the impact – and risks – of IoT adoption are already becoming apparent.To read this article in full or to leave a comment, please click here]]> 2016-12-21T13:55:00+00:00 http://www.networkworld.com/article/3153047/internet-of-things/iot-product-development-is-broken-6-ways-developers-and-manufacturers-can-fix-it.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=277975 False None None None Network World - Magazine Info Nmap security scanner gets new scripts, performance boosts New features in Nmap 7.40 include Npcap 0.78r5, for adding driver signing updates to work with Windows 10 Anniversary Update; faster brute-force authentication cracking; and new scripts for Nmap Script Engine, the project's maintainer Fyodor wrote on the Nmap mailing list.[ Give yourself a technology career advantage with InfoWorld's Deep Dive technology reports and Computerworld's career trends reports. GET A 15% DISCOUNT through Jan.15, 2017: Use code 8TIISZ4Z. ] The de facto standard network mapping and port scanning tool, Nmap (Network Mapper) Security Scanner is widely used by IT and security administrators for network mapping, port-scanning, and network vulnerability testing. Administrators can run Nmap against the network to find open ports, determine what hosts are available on the network, identify what services those hosts are offering, and detect any network information leaked, such as the type of packet filters and firewalls in use.To read this article in full or to leave a comment, please click here]]> 2016-12-21T10:06:00+00:00 http://www.networkworld.com/article/3152854/security/nmap-security-scanner-gets-new-scripts-performance-boosts.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=277976 False None None None Network World - Magazine Info Protect your privacy with surveillance-defeating sunglasses Reflectacles on Kickstarter a few weeks ago, but since this is likely my last article of 2016, I wanted to make sure you know about these surveillance-defeating glasses as well.The glasses are the brainchild of Scott Urban who claims that wearing Reflectables ensures "you're noticed and anonymous at the same time.” The anonymous portion is due to light-reflecting frames that can end up looking like a big, shiny blur when captured by CCTV. Since the wearer's face can't be seen in any detail behind the bright glare of the glasses, it renders facial recognition tech useless.To read this article in full or to leave a comment, please click here]]> 2016-12-21T09:19:00+00:00 http://www.networkworld.com/article/3152618/security/protect-your-privacy-with-surveillance-defeating-sunglasses.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=277977 False None None None Network World - Magazine Info IDG Contributor Network: Lax IoT device security threatens to pollute the internet DDoS attack that brought down Twitter, Netflix and other major websites for a large portion of the U.S. was launched by a botnet comprised of Web cameras, printers and other IoT devices.+ Also on Network World: 2017 security predictions + And while having those sites offline was an inconvenience, the results of that attack weren't devastating. But future DDoS attacks that throw terabits of data at servers could have more disastrous results. Instead of going after an internet traffic management company, the attackers could target a hospital or a utility provider. Not being able to binge-watch Netflix shows pales in seriousness when compared to cities not having electricity or a doctor being unable to access electronic medical records.To read this article in full or to leave a comment, please click here]]> 2016-12-21T09:14:00+00:00 http://www.networkworld.com/article/3152073/internet-of-things/lax-iot-device-security-threatens-to-pollute-the-internet.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=277978 False None None None Network World - Magazine Info VMware removes hard-coded root access key from vSphere Data Protection support article, the vSphere Data Protection (VDP) appliance contains a static SSH private key with a known password. This key allows interoperability with EMC Avamar, a deduplication backup and recovery software solution, and is pre-configured on the VDP as an AuthorizedKey.To read this article in full or to leave a comment, please click here]]> 2016-12-21T08:01:40+00:00 http://www.networkworld.com/article/3152844/security/vmware-removes-hard-coded-root-access-key-from-vsphere-data-protection.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=277991 False None None None Network World - Magazine Info How to improve your security grade in 2017 To read this article in full or to leave a comment, please click here]]> 2016-12-21T04:42:00+00:00 http://www.networkworld.com/article/3152594/security/cybersecurity-confidence-gets-a-c-how-to-improve-your-grade-in-2017.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=277679 False None None None Network World - Magazine Info To beat cyber extortionists, enterprises need to punch above their weight class IBM Security's report on Ransomware (pdf – sign in required): “Almost one in two executives (46 percent) has some experience with ransomware attacks in the workplace, and 70 percent of that 46 percent have paid to get data back."To read this article in full or to leave a comment, please click here]]> 2016-12-21T03:30:00+00:00 http://www.networkworld.com/article/3152350/security/to-beat-cyber-extortionists-enterprises-need-to-punch-above-their-weight-class.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=277680 False None None None Network World - Magazine Info Tech companies like Privacy Shield but worry about legal challenges Digital Rights Ireland and French civil liberties group La Quadrature du Net have also challenged Privacy Shield in court, saying the new framework doesn't adequately protect Europeans' privacy.To read this article in full or to leave a comment, please click here]]> 2016-12-21T03:00:06+00:00 http://www.networkworld.com/article/3152555/security/tech-companies-like-privacy-shield-but-worry-about-legal-challenges.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=277681 False None None None Network World - Magazine Info IDG Editors predict tech trends for 2017 2016-12-21T03:00:00+00:00 http://www.networkworld.com/video/72615/idg-editors-predict-tech-trends-for-2017#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=277694 False None None None Network World - Magazine Info Congressional report sides with Apple on encryption debate year-end report, advising the U.S. to explore other solutions to the encryption debate.“Any measure that weakens encryption works against the national interest,” the report said.The congressional panel formed back in March, amid the FBI's public battle with Apple over trying to gain access to a locked iPhone belonging to the San Bernardino shooter.To read this article in full or to leave a comment, please click here]]> 2016-12-20T16:55:05+00:00 http://www.networkworld.com/article/3152548/security/congressional-report-sides-with-apple-on-encryption-debate.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=277234 False None None None Network World - Magazine Info The 15 best job markets for IT security specialists Image by ThinkstockInformation technology budgets are not expected to grow substantially in the New Year, but one area where organizations continue to invest is in information security. That's a good thing, when you consider that virtually every organization can now expect to experience a security incident of some kind, says nearly every recent study.To read this article in full or to leave a comment, please click here]]> 2016-12-20T12:47:00+00:00 http://www.networkworld.com/article/3152508/careers/the-15-best-job-markets-for-it-security-specialists.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=277235 False None None None Network World - Magazine Info Google researchers help developers test cryptographic implementations released on GitHub, contains more than 80 test cases for widely used cryptographic algorithms, including RSA, AES-GCM, AES-EAX, Diffie-Hellman, Elliptic Curve Diffie-Hellman (ECDH), and the digital signature algorithm (DSA).Google's researchers have developed these tests by implementing some of the most common cryptographic attacks. So far, the tests have helped them uncover more than 40 security bugs in cryptographic libraries, and they have been reported to affected vendors.To read this article in full or to leave a comment, please click here]]> 2016-12-20T11:30:47+00:00 http://www.networkworld.com/article/3152382/security/google-researchers-help-developers-test-cryptographic-implementations.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=277236 False None None None Network World - Magazine Info Use virtual containers to isolate ransomware To read this article in full or to leave a comment, please click here]]> 2016-12-20T11:16:00+00:00 http://www.networkworld.com/article/3152449/security/use-virtual-containers-to-isolate-ransomware.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=277237 False None None None Network World - Magazine Info High-demand cybersecurity skills in 2017 Information Systems Security Association (ISSA) indicates that many currently employed cybersecurity professionals are overworked, not managing their careers proactively, and not receiving the proper amount of training to stay ahead of increasingly dangerous threats. Yikes!So, the skills deficit is clear, but which types of cybersecurity skills are in the highest demand? In the recently published ESG/ISSA research report, Through the Eyes of Cybersecurity Professionals, 371 cybersecurity professionals were asked to identify areas where the organizations they worked for had the biggest skills gaps. The results are as follows:To read this article in full or to leave a comment, please click here]]> 2016-12-20T10:11:00+00:00 http://www.networkworld.com/article/3152023/security/high-demand-cybersecurity-skills-in-2017.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=277250 False None None None Network World - Magazine Info BlackBerry counts on cars to reverse decline in revenue To read this article in full or to leave a comment, please click here]]> 2016-12-20T08:16:49+00:00 http://www.networkworld.com/article/3152406/internet-of-things/blackberry-counts-on-cars-to-reverse-decline-in-revenue.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=277251 False None None None Network World - Magazine Info No porn for you, South Carolina, if newly proposed bill becomes law bill doesn't make it any clearer. However, the bill sponsors-Reps. Bill Chumley (R-Spartanburg) and Mike Burns (R-Greenville)-wrote that porn is a “public health hazard” and viewing porn online has impacted the “demand for human trafficking and prostitution.”To read this article in full or to leave a comment, please click here]]> 2016-12-20T07:18:00+00:00 http://www.networkworld.com/article/3152365/security/no-porn-for-you-south-carolina-if-newly-proposed-bill-becomes-law.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=277252 False None None None Network World - Magazine Info 5 technologies that will shake things up in 2017 2016-12-20T07:17:00+00:00 http://www.networkworld.com/video/72595/5-technologies-that-will-shake-things-up-in-2017#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=277253 False None None None Network World - Magazine Info The year ransomware became one of the top threats to enterprises To read this article in full or to leave a comment, please click here]]> 2016-12-20T06:53:03+00:00 http://www.networkworld.com/article/3152388/security/the-year-ransomware-became-one-of-the-top-threats-to-enterprises.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=277254 False None None None Network World - Magazine Info Identity verification: The New Turing Test To read this article in full or to leave a comment, please click here]]> 2016-12-20T06:36:00+00:00 http://www.networkworld.com/article/3152346/security/identity-verification-the-new-turing-test.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=277255 False None None None Network World - Magazine Info Cyberattack suspected in Ukraine power outage a post on Facebook. Full power was restored to all affected areas in about an hour and 15 minutes.To read this article in full or to leave a comment, please click here]]> 2016-12-20T06:24:30+00:00 http://www.networkworld.com/article/3152007/security/cyberattack-suspected-in-ukraine-power-outage.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=277256 False None None None Network World - Magazine Info Fraud detection firm outs $1b Russian ad-fraud gang and its robo-browsing Methbot White Ops is releasing data today that will enable online advertisers and ad marketplaces to block the efforts of the group, which is cashing in on its intimate knowledge of the automated infrastructure that controls the buying and selling of video ads.The group has been ramping up its activities since October so that it now reaps roughly $3 million to $5 million per day from unsuspecting advertisers and gives them nothing in return, says White Ops, which discovered the first hints of the scam in September.To read this article in full or to leave a comment, please click here]]> 2016-12-20T06:00:00+00:00 http://www.networkworld.com/article/3152005/security/fraud-detection-firm-outs-1b-russian-ad-fraud-gang-and-its-robo-browsing-methbot.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=277257 False None None None Network World - Magazine Info Google open-sources test suite to find crypto bugs serious security problems. To help developers check their code for implementation errors and find weaknesses in cryptographic software libraries, Google has released a test suite as part of Project Wycheproof."In cryptography, subtle mistakes can have catastrophic consequences, and mistakes in open source cryptographic software libraries repeat too often and remain undiscovered for too long," Google security engineers Daniel Bleichenbacher and Thai Duong, wrote in a post announcing the project on the Google Security blog.To read this article in full or to leave a comment, please click here]]> 2016-12-20T05:33:00+00:00 http://www.networkworld.com/article/3152364/security/google-open-sources-test-suite-to-find-crypto-bugs.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=276971 False None None None Network World - Magazine Info IDG Contributor Network: IoT could be our downfall according to Gartner. But the enthusiasm for all things IoT has blinded us to the potential risks. Too many companies, keen to gain a foothold in the market, have rushed out products that lack basic security protocols. The risks here are enormous.To read this article in full or to leave a comment, please click here]]> 2016-12-20T04:00:00+00:00 http://www.networkworld.com/article/3151912/internet-of-things/iot-could-be-our-downfall.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=276972 False None None None Network World - Magazine Info How to get more from your security budget how long they stay in it).This isn't meant to be all doom and gloom however; clever CISOs/CSOs and CIOs understand they have to resource more carefully in today's economically challenging times. For CISOs, that involves using money effectively, and making do with solutions they already have, in order to protect the assets they truly care about. It can also involve upskilling staff, and rolling out cost effective security awareness campaigns.To read this article in full or to leave a comment, please click here]]> 2016-12-20T03:37:00+00:00 http://www.networkworld.com/article/3152038/security/how-to-get-more-from-your-security-budget.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=276973 False None None None Network World - Magazine Info Privacy groups complain to FTC over Google\'s \'deceptive\' policy change “super-profiles” as it can track user activity on Android mobile phones, with an 88 percent market share of smartphones worldwide, "and from any website that uses Google Analytics, hosts YouTube videos, or displays ads served by DoubleClick or AdSense."To read this article in full or to leave a comment, please click here]]> 2016-12-19T22:24:15+00:00 http://www.networkworld.com/article/3152032/security/privacy-groups-complain-to-ftc-over-googles-deceptive-policy-change.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=276442 False None None None Network World - Magazine Info Stingray use could be unconstitutional, finds House report To read this article in full or to leave a comment, please click here]]> 2016-12-19T13:12:19+00:00 http://www.networkworld.com/article/3151854/security/stingray-use-could-be-unconstitutional-finds-house-report.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=276443 False None None None Network World - Magazine Info Cisco execs foretell key 2017 enterprise networking trends 5 enterprise technologies that will shake things up in 2017+First up was Cisco's Jeff Reed, Senior Vice President Enterprise Infrastructure and Solutions Group who had a blog on the top 10 list for future 2017 network trends. It reads as follow:To read this article in full or to leave a comment, please click here]]> 2016-12-19T12:10:00+00:00 http://www.networkworld.com/article/3151922/cisco-subnet/cisco-execs-foretell-key-2017-enterprise-networking-trends.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=276444 False None None None Network World - Magazine Info On being a 24/7 organization and the 2016 leap second leap seconds are coming. Why? Because among other things, Kerberos time synchronization mandates pretty accurate timing. We're about to insert a leap second into your life on western New Year's Day. You may have zones that celebrate other years, but to be in sync with the time standards in the United States, there will be an extra second. The earth is slowing down. To read this article in full or to leave a comment, please click here]]> 2016-12-19T10:54:00+00:00 http://www.networkworld.com/article/3151893/security/on-being-a-247-organization-and-the-2016-leap-second.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=276445 False None None None Network World - Magazine Info Medical data: Accessible and irresistible for cyber criminals Dark Web – the underground online marketplace for cyber criminals – electronic health records (EHR) are not even close to premium goods.McAfee, now a division of Intel Security, reported recently that the price for an individual medical record ranges from a fraction of a cent to $2.50, while a so-called “fullz” record – name, Social Security number plus financial account information from a credit or debit card can fetch $14 to $25.To read this article in full or to leave a comment, please click here]]> 2016-12-19T10:04:00+00:00 http://www.networkworld.com/article/3151924/security/medical-data-accessible-and-irresistible-for-cyber-criminals.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=276458 False None None None Network World - Magazine Info Mobile banking trojans adopt ransomware features To read this article in full or to leave a comment, please click here]]> 2016-12-19T09:51:04+00:00 http://www.networkworld.com/article/3151872/security/mobile-banking-trojans-adopt-ransomware-features.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=276459 False None None None Network World - Magazine Info IDG Contributor Network: 5 most common data privacy misconceptions To read this article in full or to leave a comment, please click here]]> 2016-12-19T08:30:00+00:00 http://www.networkworld.com/article/3150713/security/5-most-common-data-privacy-misconceptions.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=276460 False None None None Network World - Magazine Info Senators call for special committee to investigate Russian election hacking urged Majority Leader Mitch McConnell not to allow an investigation into Russian interference of the election to become a partisan issue. It's an issue which “should alarm every American.”That same day, President-elect Donald Trump blew off the idea that the intelligence community had a clue as to whom was behind the hacks. His transition team later added, “These are the same people that said Saddam Hussein had weapons of mass destruction.”To read this article in full or to leave a comment, please click here]]> 2016-12-19T07:44:00+00:00 http://www.networkworld.com/article/3151537/security/senators-call-for-special-committee-to-investigate-russian-election-hacking.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=276461 False Guideline None None Network World - Magazine Info Cisco ONE simplifies security purchasing What to expect from Cisco in 2017 + More security vendors doesn't make companies more secure. It just makes things more complex. Despite the number of point products, finding a breach still takes well over 100 days. Think of the damage that can happen in over three months. A persistent threat can make its way around the company network, map out the whole environment and provide a blueprint for hackers to take whatever data they want. To read this article in full or to leave a comment, please click here]]> 2016-12-19T06:59:00+00:00 http://www.networkworld.com/article/3150870/security/cisco-one-simplifies-security-purchasing.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=276462 False None None None Network World - Magazine Info The new rulers of the cybersecurity realm: Automation, Analytics Artificial Intelligence 5 enterprise technologies that will shake things up in 2017+Just take a look at some recent Gartner assessments of the security situation: By 2020, 60% of digital businesses will suffer major service failures, due to the inability of IT security teams to manage digital risk. By 2020, 60% of enterprise information security budgets will be allocated for rapid detection and response approaches, which is an increase from less than 30% in 2016. By 2018, 25% of corporate data traffic will flow directly from mobile devices to the cloud, bypassing enterprise security controls. Through 2018, over 50% of IoT device manufacturers will not be able to address threats from weak authentication practices. So what technologies are going to change this scenario back in favor of IT? The new security AAA: Automation, analytics and artificial intelligence say proponents.To read this article in full or to leave a comment, please click here]]> 2016-12-19T06:34:00+00:00 http://www.networkworld.com/article/3151498/security/the-new-rulers-of-the-cybersecurity-realm-automation-analytics-artificial-intelligence.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=276463 False None None None Network World - Magazine Info New products of the week 12.19.16 Image by Cybereason.Our roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Cloud Foundry Training PlatformaltorosImage by altorosTo read this article in full or to leave a comment, please click here]]> 2016-12-19T06:00:00+00:00 http://www.networkworld.com/article/3151334/mobile-wireless/new-products-of-the-week-12-19-16.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=276192 True None None None Network World - Magazine Info Ransomware: at your service Image by ThinkstockRansomware is on track to net organized cybercrime more than $1 billion in 2016, not taking downtime and other costs associated with it into account. And according to KnowBe4's 2016 Ransomware Report, 93 percent of IT professionals surveyed are worried ransomware will continue to grow. To read this article in full or to leave a comment, please click here]]> 2016-12-19T04:57:00+00:00 http://www.networkworld.com/article/3151791/security/ransomware-at-your-service.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=276193 False None None None Network World - Magazine Info 10 biggest hacks of user data in 2016 To read this article in full or to leave a comment, please click here]]> 2016-12-19T03:13:00+00:00 http://www.networkworld.com/article/3150815/security/10-biggest-hacks-of-user-data-in-2016.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=276194 False None Yahoo None Network World - Magazine Info Inside 3 top threat hunting tools Image by ThinkstockAdvanced Persistent Threats (APT) are able to slip past even the most cutting-edge security defenses thanks to a diabolically clever strategy. Hackers may try to breach your defenses thousands of times until they finally get in. Once a network is breached, most APTs go into stealth mode. They move slowly, laterally compromising other systems and inching toward their goals. But what if you could hunt down these active, but hidden threats before they can do real damage? For this review, we tested threat hunting systems from Sqrrl, Endgame and Infocyte. Read the full review as well.To read this article in full or to leave a comment, please click here]]> 2016-12-19T03:00:00+00:00 http://www.networkworld.com/article/3150473/security/threat-hunting-tools-could-be-a-security-game-changer.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=276195 False None None None Network World - Magazine Info Review: Threat hunting turns the tables on attackers To read this article in full or to leave a comment, please click here]]> 2016-12-19T03:00:00+00:00 http://www.networkworld.com/article/3150254/security/review-threat-hunting-turns-the-tables-on-attackers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=276197 False None None None Network World - Magazine Info 5 enterprise technologies that will shake things up in 2017 Thinkstock The Internet of Things – for real Yes, yes, we know – it's one of those long-standing tech industry jokes, like “the year of the Linux desktop” and “Java security.” But 2017 really could be the year that all the hub-bub and hype around the Internet of Things comes home to roost.To read this article in full or to leave a comment, please click here]]> 2016-12-19T02:38:00+00:00 http://www.networkworld.com/article/3150526/internet-of-things/5-enterprise-technologies-that-will-shake-things-up-in-2017.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=276209 False None None None Network World - Magazine Info LinkedIn skill learning unit Lynda.com hit by database breach To read this article in full or to leave a comment, please click here]]> 2016-12-18T21:24:50+00:00 http://www.networkworld.com/article/3151530/security/linkedin-skill-learning-unit-lyndacom-hit-by-database-breach.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=275701 False None None None Network World - Magazine Info The Grugq, Hacker House and \'Boceffus Cleetus\' weigh in on the latest ShadowBroker dump the grugq,” a security researcher who is well-respected for his infosec and counterintelligence knowledge, and the other is by the cybersecurity researchers at Hacker House out of the UK.The Grugq published a three-part commentary series on the great cyber game – part 1, part 2, part 3. His deep analysis is his contribution since not many are capable of it. He said that the latest by the ShadowBrokers, dropped on Dec. 14, is a “massive” and valuable drop in terms of revealing to the NSA what the Russians know and have obtained.To read this article in full or to leave a comment, please click here]]> 2016-12-18T10:18:00+00:00 http://www.networkworld.com/article/3151339/security/the-grugq-hacker-house-and-boceffus-cleetus-weigh-in-on-the-latest-shadowbroker-dump.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=275702 False None None None