www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-15T09:25:11+00:00 www.secnews.physaphae.fr Network World - Magazine Info Obama vows to punish Russia over election-related hacks To read this article in full or to leave a comment, please click here]]> 2016-12-16T14:25:00+00:00 http://www.networkworld.com/article/3151431/security/obama-vows-to-punish-russia-over-election-related-hacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=275703 False None None None Network World - Magazine Info New Research Reveals Cybersecurity Skills Shortage Impact ISSA) published the second report in a two-part research report series investigating these issues.  This new report titled, Through the Eyes of Cyber Security Professionals, uncovers a lot more about just how deep the cybersecurity skills shortage cuts.  For example:To read this article in full or to leave a comment, please click here]]> 2016-12-16T09:45:00+00:00 http://www.networkworld.com/article/3151090/security/new-research-reveals-cybersecurity-skills-shortage-impact.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=275704 False None None None Network World - Magazine Info Corero says its always-on DDoS defense system automatically safeguards service providers   here to subscribe.   The massive DDoS attack that was aimed in stages at DNS provider Dyn in October 2016 did more than grab headlines. It also served as a wake-up call to companies that provide the global Internet infrastructure, as well as downstream operators and service providers. Many experts fear this attack could prove to be a tipping point in the battle to maintain stability and availability across the Internet. Research shows the attack originated from an Internet of Things (IoT) botnet that involved an estimated 100,000 devices. Dyn experienced packet flow bursts 40 to 50 times higher than normal, and unverified reports put the magnitude of the attack in the 1.2Tbps range. The attack used multiple vectors and required a variety of techniques to fight off.To read this article in full or to leave a comment, please click here]]> 2016-12-16T08:59:00+00:00 http://www.networkworld.com/article/3151079/security/corero-says-it-provides-always-on-automatic-ddos-defense-for-service-providers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=275717 False None None None Network World - Magazine Info Apple\'s macOS file encryption easily bypassed without the latest fixes blog post.To read this article in full or to leave a comment, please click here]]> 2016-12-16T07:21:51+00:00 http://www.networkworld.com/article/3151391/security/apples-macos-file-encryption-easily-bypassed-without-the-latest-fixes.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=275718 False None None None Network World - Magazine Info 4 historic security events of 2016 and what they teach us [Infographic] To read this article in full or to leave a comment, please click here]]> 2016-12-16T05:04:00+00:00 http://www.networkworld.com/article/3150820/security/4-historic-security-events-of-2016-and-what-they-teach-us-infographic.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=275331 False None Yahoo None Network World - Magazine Info Don\'t put this holiday spam in you shopping cart Scam artists see the holidays as an opportunity to rip people off. This year is no different. PhishMe's Chief Threat Scientist Gary Warner has caught a few to share.Paypal: Suspicious activityPaypal: Suspicious activityImage by PhishMeTo read this article in full or to leave a comment, please click here]]> 2016-12-16T04:59:00+00:00 http://www.networkworld.com/article/3150819/security/be-on-high-alert-for-this-holiday-spam.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=275332 False None None None Network World - Magazine Info HTTP/2 promises better performance -- but with security caveats according to W3Techs.The new protocol does offer better performance, but there is no particular rush to upgrade, and it's backwards-compatible with the previous protocol, HTTP/1.1.No security problems have been found in the protocol itself, but there are vulnerabilities in some implementations and the possibility of lower visibility into internet traffic, so it's worth waiting for everything to shake out.The pressure to switch is likely to come from lines of business, said Graham Ahearne, director of product management at security firm Corvil.To read this article in full or to leave a comment, please click here]]> 2016-12-16T04:57:00+00:00 http://www.networkworld.com/article/3151017/internet/http-2-promises-better-performance-but-with-security-caveats.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=275333 False None None None Network World - Magazine Info 49% off CyberPower Surge Protector 3-AC Outlet with 2 USB (2.1A) Charging Ports - Deal Alert Surge Protector CSP300WUR1 safeguards common home and office devices, such as computers and electronics, by absorbing spikes in energy caused by storms and electrical power surges. Designed for convenience, the portable CSP300WUR1 is ideal for travelers. It provides 600 joules of protection, has three surge-protected outlets, and a folding wall tap plug. Two USB ports (2.1 Amp shared) charge personal electronics, including smartphones, digital cameras, MP3 players, and other devices. A Limited-Lifetime Warranty ensures that this surge suppressor has passed high quality standards in design, assembly, material or workmanship and further protection is offered by a $50,000 Connected Equipment Guarantee. It currently averages 4 out of 5 stars on Amazon, where its typical list price of $22 has been reduced 49% to just $11.27. See the discounted CSP300WUR1 on Amazon.To read this article in full or to leave a comment, please click here]]> 2016-12-16T04:43:00+00:00 http://www.networkworld.com/article/3151182/consumer-electronics/49-off-cyberpower-surge-protector-3-ac-outlet-with-2-usb-2-1a-charging-ports-deal-alert.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=275334 False None None None Network World - Magazine Info BlackBerry hands its brand to TCL, maker of its last smartphones pulled out of the smartphone market, BlackBerry has agreed to license its brand to handset manufacturer TCL.The Chinese company will make and market future BlackBerry handsets worldwide except for India, Indonesia, Bangladesh, Sri Lanka and Nepal, where BlackBerry has already struck local licensing deals.This is hardly new territory for TCL, which manufactured BlackBerry's last two handsets, the Android-based DTEK50 and DTEK60.To read this article in full or to leave a comment, please click here]]> 2016-12-16T04:30:41+00:00 http://www.networkworld.com/article/3151177/smartphones/blackberry-hands-its-brand-to-tcl-maker-of-its-last-smartphones.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=275347 False None None None Network World - Magazine Info Evernote backs off from privacy policy changes, says it \'messed up\' messed up, in no uncertain terms.”The move by the note-taking app follows protests from users, some of whom have threatened to drop the service after the company announced that its policy would change to improve its machine learning capabilities by letting a select number of employees, who would assist with the training of the algorithms, view the private information of its users. The company claims 200 million users around the world. To read this article in full or to leave a comment, please click here]]> 2016-12-15T22:47:06+00:00 http://www.networkworld.com/article/3151149/security/evernote-backs-off-from-privacy-policy-changes-says-it-messed-up.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=274731 False None None None Network World - Magazine Info Hacker allegedly stole logins from a US election agency blog post. The company said it discovered online chatter about the breach on Dec. 1.Some of these credentials included the highest administrative privileges. With such access, an intruder could steal sensitive information from the commission, which the hacker claimed to have done, Recorded Future said.To read this article in full or to leave a comment, please click here]]> 2016-12-15T17:34:45+00:00 http://www.networkworld.com/article/3151167/security/hacker-allegedly-stole-logins-from-a-us-election-agency.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=274366 False None None None Network World - Magazine Info Non-malware attacks are on the rise To read this article in full or to leave a comment, please click here]]> 2016-12-15T14:25:00+00:00 http://www.networkworld.com/article/3151056/security/non-malware-attacks-are-on-the-rise.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=274367 False None None None Network World - Magazine Info IDG Contributor Network: Five ways cybersecurity is nothing like the way Hollywood portrays it To read this article in full or to leave a comment, please click here]]> 2016-12-15T12:29:00+00:00 http://www.networkworld.com/article/3151064/security/five-ways-cybersecurity-is-nothing-like-the-way-hollywood-portrays-it.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=274368 False None None None Network World - Magazine Info Ransomware fighting coalition adds new members and decryption tools a website dedicated to fighting ransomware, was originally launched by Europol's European Cybercrime Centre in partnership with the National High Tech Crime Unit of the Netherlands police, Kaspersky Lab, and Intel Security.The website has a tool that allows users to determine which type of ransomware has affected their files but also contains general information about ransomware, prevention advice, and instruction on reporting incidents to law enforcement.To read this article in full or to leave a comment, please click here]]> 2016-12-15T10:57:22+00:00 http://www.networkworld.com/article/3150736/security/ransomware-fighting-coalition-adds-new-members-and-decryption-tools.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=274369 False None None None Network World - Magazine Info Citrix is building your workspace of the future the blind men and the elephant. How customers describe the company depends a lot on which of Citrix's diverse products they touch. It's a desktop and app virtualization company. It's a networking company. A secure file sharing company, a mobility management firm. Yes, Citrix is all of those and more, and CEO Kirill Tatarinov – one year after taking over from long-time leader Mark Templeton – is working to show how all those pieces play together in making Citrix the focal point of the 'workspace of the future' for nimble enterprises. To read this article in full or to leave a comment, please click here]]> 2016-12-15T06:46:00+00:00 http://www.networkworld.com/article/3150984/virtualization/citrix-is-building-your-workspace-of-the-future.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=274382 False Guideline None None Network World - Magazine Info 5 things you should do following the Yahoo breach announced a massive data breach Wednesday that affected over one billion accounts, making it by far the largest data breach in history. This follows the disclosure in September of a different breach that affected more than 500 million of the company's customers.What stands out with this new security compromise is that it occurred over three years ago, in August 2013, and that hackers walked away with password hashes that can be easily cracked.To read this article in full or to leave a comment, please click here]]> 2016-12-15T06:29:16+00:00 http://www.networkworld.com/article/3150949/security/5-things-you-should-do-following-the-yahoo-breach.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=274383 False None Yahoo None Network World - Magazine Info Trump, tech leaders avoided encryption and surveillance talk at summit To read this article in full or to leave a comment, please click here]]> 2016-12-15T05:40:00+00:00 http://www.networkworld.com/article/3150682/techology-business/trump-tech-leaders-avoided-encryption-and-surveillance-talk-at-summit.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=274116 False Guideline None None Network World - Magazine Info 14 eyebrow-raising things Google knows about you To read this article in full or to leave a comment, please click here]]> 2016-12-15T05:10:00+00:00 http://www.networkworld.com/article/3150674/security/14-eyebrow-raising-things-google-knows-about-you.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=274117 False None None None Network World - Magazine Info How to maintain security while employees are out of the office for the holidays Image by ThinkstockThe downtime created by the holiday season is a fan favorite for enterprise employees and hackers alike. As workers are enjoying time away from the office for vacations or working remotely, hackers are viewing this slow down as an optimal time to attack corporate systems. To avoid having your organization turn into this holiday's victim, security professionals provide tips for IT managers to protect corporate data, as well as share recommendations for using the slower cycles to test security systems. To read this article in full or to leave a comment, please click here]]> 2016-12-15T05:07:00+00:00 http://www.networkworld.com/article/3150729/security/tips-for-maintaining-security-while-employees-are-out-of-the-office-for-the-holidays.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=274118 False None None None Network World - Magazine Info Protecting more than privacy in schools To read this article in full or to leave a comment, please click here]]> 2016-12-15T05:06:00+00:00 http://www.networkworld.com/article/3150728/security/protecting-more-than-privacy-in-k-12-sector.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=274119 False None None None Network World - Magazine Info Privacy protections for wearable devices are weak, study says are embracing fitness trackers, smart watches, and smart clothing, a "weak and fragmented" health privacy regulatory system in the U.S. fails to give consumers the privacy protections they may expect, said the study, released Thursday by the Center for Digital Democracy and the School of Communication at American University.To read this article in full or to leave a comment, please click here]]> 2016-12-15T05:00:03+00:00 http://www.networkworld.com/article/3150796/security/privacy-protections-for-wearable-devices-are-weak-study-says.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=274132 False None None None Network World - Magazine Info Yahoo breach means hackers had three years to abuse user accounts breach when law enforcement began sharing with the company stolen data  that had been provided by a hacker. At the time, the company was already dealing with a separate data breach, reported in September, involving 500 million user accounts.To read this article in full or to leave a comment, please click here]]> 2016-12-14T19:08:43+00:00 http://www.networkworld.com/article/3150889/security/yahoo-breach-means-hackers-had-three-years-to-abuse-user-accounts.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=273013 False None Yahoo None Network World - Magazine Info Here\'s some questions Congress should ask about the election-related hacks influence the U.S. presidential election with several high-profile hacks. U.S. intelligence agencies are confident that the Kremlin was involved, but incoming president Donald Trump remains skeptical.  As they prepare to investigate, here's some questions lawmakers should be asking to help them understand and respond to these hacks.  What evidence do we have proving Russia's involvement? Attribution in any hack can be incredibly difficult, as Trump noted in a tweet, but cybersecurity experts say they have technical evidence showing that Democratic groups and figures were at the very least hacked with spear phishing emails and hard-to-detect malware from two suspected Russian hacking teams.To read this article in full or to leave a comment, please click here]]> 2016-12-14T16:36:52+00:00 http://www.networkworld.com/article/3150805/security/heres-some-questions-congress-should-ask-about-the-election-related-hacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=273014 False None None None Network World - Magazine Info Yahoo reports massive data breach involving 1 billion accounts reported in September involving at least 500 million users that originally occurred in late 2014 and shook public trust in the company.FREAKIN' OUT? DON'T CARE? Discuss on our Facebook pageStolen user data from this new breach involves names, email addresses, telephone numbers, dates of birth, and hashed passwords using an aging algorithm known as MD5 that can be cracked.To read this article in full or to leave a comment, please click here]]> 2016-12-14T14:41:00+00:00 http://www.networkworld.com/article/3150666/security/yahoo-reports-massive-data-breach-involving-1-billion-accounts.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=273015 False None Yahoo None Network World - Magazine Info Bye, privacy: Evernote will let its employees read your notes changing its privacy policy to let employees read its customers' notes, and they can't opt out. Users have until Jan. 23 to move their notes out of the company's system and delete their accounts if they want to avoid the sanctioned snooping. Companies using Evernote Business can have their administrators opt out, but users won't have individual control over it.The change a push by the company to enhance its machine learning capabilities by letting a select number of employees view the private information of its users to help with the training of algorithms."While our computer systems do a pretty good job, sometimes a limited amount of human review is simply unavoidable in order to make sure everything is working exactly as it should," the company said in a support bulletin.To read this article in full or to leave a comment, please click here]]> 2016-12-14T13:33:27+00:00 http://www.networkworld.com/article/3150475/security/bye-privacy-evernote-will-let-its-employees-read-your-notes.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=273016 False None None None Network World - Magazine Info IDG Contributor Network: 5 cybersecurity trends to watch for 2017 Ponemon Institute.Companies of all sizes have embraced the cloud and open source has become the standard for infrastructure software. Both pose their own blend of benefit and risk. A major datacenter attack or failure could be problematic for many companies, and we can certainly expect an increase in the number of cyber-attacks based on open source vulnerabilities.To read this article in full or to leave a comment, please click here]]> 2016-12-14T13:14:00+00:00 http://www.networkworld.com/article/3150255/security/5-cybersecurity-trends-to-watch-for-2017.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=273029 False None None None Network World - Magazine Info 10 game changing networking acquisitions of 2016 Image by ThinkstockIn the networking industry, it seems that every year there's a flurry of mergers and acquisitions. Turns out that 2016 was no different. Here are 10 that have the most game changing potential, since they have the potential to move the acquiring company into an entirely new market.To read this article in full or to leave a comment, please click here]]> 2016-12-14T12:39:00+00:00 http://www.networkworld.com/article/3150132/leadership-management/10-game-changing-networking-acquisitions-of-2016.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=273031 False Guideline None None Network World - Magazine Info UNH InterOperability Lab fostering even more IoT togetherness IoT Testing Services. Test services will apply to devices for homes, industrial networks, smart cities and connected cars, according to UNH-IOL. What's more, testing will be offered for the IPv6 Forum's IPv6 Ready IoT Logo in the spring. MORE: Beware the ticking Internet of Things security time bombTo read this article in full or to leave a comment, please click here]]> 2016-12-14T12:13:00+00:00 http://www.networkworld.com/article/3150023/internet-of-things/unh-interoperability-lab-fostering-even-more-togetherness-among-iot-crowd.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=273032 False None None None Network World - Magazine Info A hefty fine is just part of penalties for the Ashley Madison adultery site was hacked last year.Ruby Corp., the parent company of Ashley Madison agreed to pay $8.75 million fine to the Federal Trade Commission and another $8.75 million to 13 states that also filed complaints. It will wind up paying just $1.6 million because it is strapped for assets.To read this article in full or to leave a comment, please click here]]> 2016-12-14T12:02:00+00:00 http://www.networkworld.com/article/3149721/security/adultery-site-ashley-madison-fined-8-75m-customer-data-hack.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=273033 False None None None Network World - Magazine Info Ashley Madison to pay $1.6M settlement related to data breach said on Wednesday.In July 2015, a hacking group called Impact Team managed to steal the account details and then post them online a month later -- potentially damaging the reputation of the customers using the adultery website.To read this article in full or to leave a comment, please click here]]> 2016-12-14T11:12:46+00:00 http://www.networkworld.com/article/3150446/security/ashley-madison-to-pay-16m-settlement-related-to-data-breach.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=273034 False None None None Network World - Magazine Info Lessons learned from the 7 major cyber security incidents of 2016 Russia's hacking of Democrat emails to internet cameras and DVRs launching DDoS attacks, leaving the impression among many that nothing should be entrusted to the internet. These incidents reveal technical flaws that can be addressed and failure to employ best practices that might have prevented some of them from happening. +More on Network World: Gartner Top 10 technology trends you should know for 2017+To read this article in full or to leave a comment, please click here]]> 2016-12-14T07:41:00+00:00 http://www.networkworld.com/article/3150075/security/lessons-learned-from-the-7-major-cyber-security-incidents-of-2016.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=273035 False None None None Network World - Magazine Info Know your (cyber) enemy To read this article in full or to leave a comment, please click here]]> 2016-12-14T07:40:00+00:00 http://www.networkworld.com/article/3150545/security/know-your-cyber-enemy.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=273036 False None None None Network World - Magazine Info Adobe fixes actively exploited critical vulnerability in Flash Player a security advisory.To read this article in full or to leave a comment, please click here]]> 2016-12-14T07:35:20+00:00 http://www.networkworld.com/article/3150078/security/adobe-fixes-actively-exploited-critical-vulnerability-in-flash-player.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=273037 False None None None Network World - Magazine Info List of remotely exploitable Netgear routers grows as beta firmware fix is released confirmed the existence of the flaw which US-CERT believed was dangerous enough to advise users to stop using vulnerable routers. In addition to the originally announced vulnerable Netgear routers models R6400, R7000, R8000, Netgear warned that nine other router models are also vulnerable.To read this article in full or to leave a comment, please click here]]> 2016-12-14T05:41:00+00:00 http://www.networkworld.com/article/3150250/security/list-of-remotely-exploitable-netgear-routers-grow-as-beta-firmware-fix-is-released.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=272671 False None None None Network World - Magazine Info Tech Forecast 2017: 5 key technologies to double down on now digital transformation dominating the business agenda, IT pros are under pressure to create a modern-day tech foundation sturdy enough to drive that change as they head into 2017. What milestones are they aiming for in the year ahead? Where should they direct their limited resources?According to Computerworld's Forecast 2017 survey, IT professionals will prioritize security, analytics, XaaS or "as a service" technology, virtualization and mobile apps in the coming year. If you're thinking of adding those technologies to your own 2017 to-do list, read on for findings from our survey, along with real-world advice from other IT leaders.To read this article in full or to leave a comment, please click here]]> 2016-12-14T05:35:00+00:00 http://www.networkworld.com/article/3150444/leadership-management/tech-forecast-2017-5-key-technologies-to-double-down-on-now.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=272672 False Guideline None None Network World - Magazine Info Top 15 security predictions for 2017 Image by ThinkstockIt is once again, as the song doesn't quite say, “the most predictive time of the year.” Not that anybody knows for sure what will be happening even a month from now, never mind six months to a year.But that does not, and should not, stop organizations from trying. The way to get ahead and stay ahead, especially in online security, is to look ahead.To read this article in full or to leave a comment, please click here]]> 2016-12-14T05:33:00+00:00 http://www.networkworld.com/article/3150249/security/top-15-security-predictions-for-2017.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=272673 False None None None Network World - Magazine Info John McAfee asks court to block Intel\'s security spin-out To read this article in full or to leave a comment, please click here]]> 2016-12-13T23:36:06+00:00 http://www.networkworld.com/article/3149993/security/john-mcafee-asks-court-to-block-intel-s-security-spin-out.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=272481 False None None None Network World - Magazine Info Google publishes national security letters for the first time transparency report," which revealed the company receives thousands of requests for user data each month from law enforcement agencies around the globe. The national security letters remained secret, but on Tuesday, Google published a handful that are no longer covered by nondisclosure rules.To read this article in full or to leave a comment, please click here]]> 2016-12-13T17:01:59+00:00 http://www.networkworld.com/article/3150209/legal/google-publishes-national-security-letters-for-the-first-time.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=271597 False None None None Network World - Magazine Info Don\'t like Russian cyberspies? Tips to stop state-sponsored hackers Russian cyberspies allegedly stole sensitive files from Democratic groups and figures using this very tactic. In some cases, the spoofed emails pretended to be from Google and managed to trick victims into giving up their login details, paving the way for a series of high-profile hacks that rocked this year's presidential election.But even as the presidential race is over, cybersecurity experts warn that state-sponsored hackers remain a dangerous threat. Political organizations, businesses, and universities all should be on guard -- you're probably already in their crosshairs.To read this article in full or to leave a comment, please click here]]> 2016-12-13T13:54:37+00:00 http://www.networkworld.com/article/3148789/security/dont-like-russian-cyberspies-tips-to-stop-state-sponsored-hackers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=271598 False None None None Network World - Magazine Info Google\'s taking Brillo into smart homes with Android Things Project Brillo and will be able to get updates directly from Google. With the home IoT industry still emerging from the hobbyist realm to mass market, Android's traction in the smartphone realm could make it a popular platform for devices like lights, locks, thermostats, and household appliances that consumers want to manage through their phones. On Tuesday, Google announced a developer preview of Android Things, which will be able to run on the Raspberry Pi 3, Intel Edison, and NXP Pico hardware platforms. It will be easy for developers to scale their prototypes up to large production runs using custom versions of those boards, Google says.To read this article in full or to leave a comment, please click here]]> 2016-12-13T12:31:00+00:00 http://www.networkworld.com/article/3149982/internet-of-things/googles-taking-brillo-into-smart-homes-with-android-things.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=271599 False None None None Network World - Magazine Info The Ring Stick Up Cam. Don\'t bother. I reviewed the Ring ($199), a security camera that replaces your conventional doorbell and lets you not only see who's ringing your doorbell but also talk with them. The Ring doorbell provides movement detection with optional cloud video recording for a monthly fee ($3 per month).While I liked the product conceptually, the startup lag (the time between detecting movement and when recording begins, usually a delay of a few seconds) is long enough that fast moving people like the Fedex guy can come and go before the device starts recording and the so-so video quality led me to give it a Gearhead rating of 3.5 out of 5.To read this article in full or to leave a comment, please click here]]> 2016-12-13T11:33:00+00:00 http://www.networkworld.com/article/3149083/security/the-ring-stick-up-cam-dont-bother.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=271600 False None FedEx None Network World - Magazine Info Dec. 2016 Patch Tuesday: Microsoft releases 12 security bulletins, 6 rated critical 12 security bulletins, half of which are rated critical due to remote code execution vulnerabilities. Get ready for restarts. Please do not delay deploying patches since three do address vulnerabilities which had been publicly disclosed.Rated criticalMS16-144 pertains to patching a plethora of bugs in Internet Explorer: two scripting engine memory corruption vulnerabilities, two memory corruption vulnerabilities, a security feature bypass bug, and two information disclosure flaws and one Windows hyperlink object library information disclosure vulnerability.To read this article in full or to leave a comment, please click here]]> 2016-12-13T11:16:00+00:00 http://www.networkworld.com/article/3150070/security/dec-2016-patch-tuesday-microsoft-releases-12-security-bulletins-6-rated-critical.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=271613 False None None None Network World - Magazine Info Facebook helps companies detect rogue SSL certificates for domains The tool uses data collected from the many Certificate Transparency logs that are publicly accessible. Certificate Transparency (CT) is a new open standard requiring certificate authorities to disclose the certificate that they issue.Until a few years ago, there was no way of tracking the certificates issued by every certificate authority (CA). At best, researchers could scan the entire web and collect those certificates being used on public servers. This made it very hard to discover cases where CAs issued certificates for domain names without the approval of those domains' owners.To read this article in full or to leave a comment, please click here]]> 2016-12-13T09:43:36+00:00 http://www.networkworld.com/article/3149736/security/facebook-helps-companies-detect-rogue-ssl-certificates-for-domains.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=271614 False None None None Network World - Magazine Info U.S. DOT advances mandate for vehicle-to-vehicle communications technology proposed rule to standardize the development and implementation of vehicle communications technologies in cars and trucks. The idea is to enable a multitude of new crash-avoidance applications that could save lives by preventing “hundreds of thousands of crashes every year by helping vehicles “talk” to each other,” the DOT stated.+More on Network World: Six key challenges loom over car communication technology+To read this article in full or to leave a comment, please click here]]> 2016-12-13T09:33:00+00:00 http://www.networkworld.com/article/3150089/security/u-s-dot-advances-mandate-for-vehicle-to-vehicle-communications-technology.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=271615 False None None None Network World - Magazine Info Zen and the art of security very cogent citation describes the folly of it all. The people who install toolbars, click on random stuff and feel like they won something when they downloaded the free app are too plentiful, and security is too tough to understand-even PGP. Bringing up the bottom is as important as extending the top. We don't ritualize security because that would be too tough, to impolite to do. Your mother did not teach you to use complex passwords and to change them as frequently as your underwear. Given some people I know, it's a wonder they passed the “p@55w0rd” rubric they were trained to use.To read this article in full or to leave a comment, please click here]]> 2016-12-13T06:57:00+00:00 http://www.networkworld.com/article/3149731/security/zen-and-the-art-of-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=271616 False None None None Network World - Magazine Info Netgear starts patching routers affected by a critical flaw The vulnerability was disclosed by a researcher Friday and affects multiple Netgear router models, many from the company's Nighthawk series. The company initially confirmed the flaw in three models -- R6400, R7000, R8000 -- but it has since expanded the list to include five more.The models confirmed to be affected so far are: R6250, R6400, R6700, R7000, R7100LG, R7300, R7900 and R8000. This list might not be complete as Netgear continues to analyze the flaw's impact to its entire router portfolio.To read this article in full or to leave a comment, please click here]]> 2016-12-13T06:29:03+00:00 http://www.networkworld.com/article/3148701/security/netgear-starts-patching-routers-affected-by-a-critical-flaw.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=271617 False None None None Network World - Magazine Info AirMap, DigiCert to issue digital certificates for drones To read this article in full or to leave a comment, please click here]]> 2016-12-13T06:00:03+00:00 http://www.networkworld.com/article/3149775/security/airmap-digicert-to-issue-digital-certificates-for-drones.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=271618 False None None None Network World - Magazine Info Cybersecurity skills aren\'t taught in college cybersecurity skills shortage. It's reached a point where the government has created the National Initiative for Cybersecurity and Studies (NICS) to help address the growing need for cybersecurity professionals, starting by getting kids introduced to cybersecurity as early as middle school.To read this article in full or to leave a comment, please click here]]> 2016-12-13T05:54:00+00:00 http://www.networkworld.com/article/3150005/it-skills-training/cybersecurity-skills-aren-t-taught-in-college.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=271359 False None None None Network World - Magazine Info 5 tips to stay ahead of ransomware threats Internet Security Threat Report (ISTR), there were more than 4,000 ransomware attacks per day since Jan 1, 2016, a 300-percent increase over 2015, which saw an average 1,000 attacks per day, according to the ISTR.While organizations can't ever be completely protected, there are a number of steps you can take to minimize the risk and potential fallout from a ransomware attack, says Scott Millis, CTO at mobile security and secure device management platform Cyber adAPT.To read this article in full or to leave a comment, please click here]]> 2016-12-13T05:53:00+00:00 http://www.networkworld.com/article/3149855/security/5-tips-to-stay-ahead-of-ransomware-threats.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=271360 False None None None Network World - Magazine Info 8 ways companies can manage risks brought on by the SaaS Tsunami Image by ThinkstockEvery employee is on a mission to find the next SaaS application that will make their job easier. With nothing more than a credit card and an expense report, anyone within the organization can sign-up for a new application in minutes.The problem is that employees are signing-up for SaaS apps without the knowledge or permission of their IT administrator. According to Gartner and Cisco, IT pros only know about 7% of the apps in use. Meaning, within any given organization, there are hundreds of unsecured SaaS apps, each a potential entry point for hackers to access your corporate data.To read this article in full or to leave a comment, please click here]]> 2016-12-13T05:49:00+00:00 http://www.networkworld.com/article/3150004/application-security/8-ways-companies-can-manage-risks-brought-on-by-the-saas-tsunami.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=271361 False None None None Network World - Magazine Info Nearly half of all websites pose security risks Menlo Security, which sponsored the report, which was released this morning.For example, news sites -- 50 percent of which were risky -- typically run ads from third-party advertising networks.To read this article in full or to leave a comment, please click here]]> 2016-12-13T05:47:00+00:00 http://www.networkworld.com/article/3149852/security/nearly-half-of-all-websites-pose-security-risks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=271362 False None None None Network World - Magazine Info The latest ransomware is pure evil genius MalwareHunterTeam takes the nastiness to a whole 'nother level.Turning victims into criminals Apparently, the latest Popcorn Time ransomware adds a new twist to the standard M.O. of demanding payment from their victims or permanently lose access to their files. In what seems like a brilliant if seriously messed up maneuver, if victims don't want to pay the Bitcoin ransom “the fast and easy way,” the program gives victims the option of paying up “the nasty way”-by sending the ransomware link on to others. To read this article in full or to leave a comment, please click here]]> 2016-12-13T05:38:00+00:00 http://www.networkworld.com/article/3149961/security/the-latest-ransomware-is-pure-evil-genius.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=271375 False None None None Network World - Magazine Info Trump\'s margin up after Wisconsin recount over voting machine security the voting systems can be hacked. Wisconsin uses both the optical scan and direct-recording electronic types of voting machines, which are both susceptible to compromise, Stein said in a petition to the Wisconsin Elections Commission.To read this article in full or to leave a comment, please click here]]> 2016-12-12T23:18:40+00:00 http://www.networkworld.com/article/3149498/security/trumps-margin-up-after-wisconsin-recount-over-voting-machine-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=271182 False None None None Network World - Magazine Info Dozens arrested in international DDoS-for-hire crackdown statement.To read this article in full or to leave a comment, please click here]]> 2016-12-12T16:47:32+00:00 http://www.networkworld.com/article/3149539/security/dozens-arrested-in-international-ddos-for-hire-crackdown.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=270893 False None None None Network World - Magazine Info 5 core topics Trump needs to address in Silicon Valley leaders meeting To read this article in full or to leave a comment, please click here]]> 2016-12-12T14:08:00+00:00 http://www.networkworld.com/article/3149563/security/5-core-topics-trump-needs-to-address-in-silicon-valley-leaders-meeting.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=270894 False Guideline None None Network World - Magazine Info Politics bog down US response to election hacks influence this year's election. Among the targets were Democratic groups and figures whose emails were stolen and later leaked online.To read this article in full or to leave a comment, please click here]]> 2016-12-12T13:33:51+00:00 http://www.networkworld.com/article/3148881/security/politics-bog-down-us-response-to-election-hacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=270895 False Guideline None None Network World - Magazine Info The top 10 tech stories of 2016: Post-PC, post-reality To read this article in full or to leave a comment, please click here]]> 2016-12-12T13:15:22+00:00 http://www.networkworld.com/article/3149705/security/the-top-10-tech-stories-of-2016-post-pc-post-reality.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=270896 False None None None Network World - Magazine Info Survey: Despite costly attacks, 85% of business leaders confident in preparedness survey sponsored by BAE Systems.Why the disconnect?[Related: 3 ingredients of a successful attack] It's one thing to believe you have the right protections in place; it's another thing to test those beliefs. The survey of 600 business leaders across five countries found that “only 29% of organizations tested their attack response in the last month. On average, organizations last tested their cyber attack response 5 months ago.”To read this article in full or to leave a comment, please click here]]> 2016-12-12T10:22:00+00:00 http://www.networkworld.com/article/3149587/malware-cybercrime/survey-despite-costly-attacks-85-of-business-leaders-confident-in-preparedness.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=270909 False Guideline None None Network World - Magazine Info Should journalists be worried about the Countering Disinformation and Propaganda Act? previous anti-First Amendment statements by President-elect Donald Trump, there has been some worry by journalists that writing something the soon-to-be President doesn't like may result in unpleasant consequences. Yet that is not the same thing as reporting “fake” news or spreading disinformation.To read this article in full or to leave a comment, please click here]]> 2016-12-12T09:44:00+00:00 http://www.networkworld.com/article/3149584/security/should-journalists-be-worried-about-the-countering-disinformation-and-propaganda-act.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=270910 False None None None Network World - Magazine Info An unpatched vulnerability exposes Netgear routers to hacking rated the flaw as critical, assigning it a score of 9.3 out of 10 in the Common Vulnerability Scoring System (CVSS).To read this article in full or to leave a comment, please click here]]> 2016-12-12T06:26:13+00:00 http://www.networkworld.com/article/3149550/security/an-unpatched-vulnerability-exposes-netgear-routers-to-hacking.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=270911 False None None None Network World - Magazine Info Security Sessions: Ransomware as a service on the rise 2016-12-12T05:59:00+00:00 http://www.networkworld.com/video/71959/security-sessions-ransomware-as-a-service-on-the-rise#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=270563 False None None None Network World - Magazine Info Tech predictions for 2017: What I expect to happen, and what I hope will happen predictions made a year ago and admitting what came true and what didn't. So let's get into that. How good were my 2016 predictions? 1. IBM becomes a major cloud player.Not really. The most recent numbers, which covered Q2 of this year, put IBM at under 10 percent share. It's still an Amazon and Microsoft world. The good news is IBM grew 57 percent year over year, so it is making up for lost ground. To read this article in full or to leave a comment, please click here]]> 2016-12-12T05:53:00+00:00 http://www.networkworld.com/article/3148850/cloud-computing/tech-predictions-for-2017-what-i-expect-to-happen-and-what-i-hope-will-happen.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=270550 False Guideline None None Network World - Magazine Info Singapore\'s \'city brain\' project is groundbreaking -- but what about privacy? smart parking meters and noise- and air-quality sensors, but are you ready to embrace the idea of a city brain?The residents of Singapore are on track to do just that.Creating a centralized dashboard view of sensors deployed across a distributed network is nothing new, but it takes on a bigger -- perhaps ominous -- meaning when deployed across a major city.To read this article in full or to leave a comment, please click here]]> 2016-12-12T04:48:00+00:00 http://www.networkworld.com/article/3148849/mobile-wireless/singapore-s-city-brain-project-is-groundbreaking-but-what-about-privacy.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=270551 False None None None Network World - Magazine Info New products of the week 12.12.16 Image by BrocadeOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.BlueData EPIC on AWSbluedataImage by Blue DataTo read this article in full or to leave a comment, please click here]]> 2016-12-12T02:27:00+00:00 http://www.networkworld.com/article/3148868/mobile-wireless/new-products-of-the-week-12-12-16.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=270552 True None None None Network World - Magazine Info Trump, tech executives may try to untangle relationship and billionaire tech investor Peter Thiel, a Silicon Valley figure who came out openly early on in favor of Trump.The relationship between Trump and Silicon Valley companies has been difficult with some senior tech executives openly backing his Democratic rival Hillary Clinton in the run-up to the presidential elections. The president-elect and tech companies also appear to have differing views on issues such as immigration, outsourcing abroad, clean energy, net neutrality, encryption, surveillance and on restoring lost manufacturing jobs in the U.S.To read this article in full or to leave a comment, please click here]]> 2016-12-11T21:46:41+00:00 http://www.networkworld.com/article/3148758/techology-business/trump-tech-executives-may-try-to-untangle-relationship.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=270095 False None None None Network World - Magazine Info US-CERT: Stop using your remotely exploitable Netgear routers on Exploit Database, was published on Dec. 7. Netgear has yet to issue new firmware to patch the flaw in its vulnerable routers. There is a way to test if your router is vulnerable and even a non-official temporary fix you can try if tossing out your router is not an option.To read this article in full or to leave a comment, please click here]]> 2016-12-11T08:15:00+00:00 http://www.networkworld.com/article/3148771/security/us-cert-stop-using-your-remotely-exploitable-netgear-routers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=270096 False None None None Network World - Magazine Info Cisco dents Arista again with patent infringement ruling November Arista announced that US Customs has given it permission to resume importing its networking gear in the United States.To read this article in full or to leave a comment, please click here]]> 2016-12-09T18:56:00+00:00 http://www.networkworld.com/article/3148677/cisco-subnet/cisco-dents-arista-again-with-patent-infringement-ruling.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=270097 False None None None Network World - Magazine Info Why CISOs succeed and why they leave Information Systems Security Association (ISSA) published a research report titled, The State of Cyber Security Careers. The report was based on a survey of 437 cybersecurity professionals, the clear majority of which were ISSA members.Two-thirds of these cybersecurity professionals worked at an organization that employed a CSO or CISO. These individuals were then asked to identify the most important qualities that make a successful CISO. Here is a sample of the results: 50% of respondents said strong leadership skills were most important 47% of respondents said strong communication skills were most important 30% of respondents said a strong relationship with business executives was most important 29% of respondents said a strong relationship with the CIO and other members of the IT leadership team was most important 23% of respondents said strong management skills were most important Based upon this list, it's clear that successful CISOs need to be strong business people who can work with business and IT executives. This is an important consideration since many security professionals are deeply rooted in the technology rather than the business aspects of infosec.To read this article in full or to leave a comment, please click here]]> 2016-12-09T11:05:00+00:00 http://www.networkworld.com/article/3149075/security/why-ciso-succeed-and-why-they-leave.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=270098 False Guideline None None Network World - Magazine Info Obama orders review of election hacks as Trump doubts Russia\'s role Politico."We may be crossed into a new threshold, and it is incumbent upon us to take stock of that, to review, to conduct some after-action, to understand what this means, and to impart those lessons learned," Monaco reportedly said.To read this article in full or to leave a comment, please click here]]> 2016-12-09T10:46:41+00:00 http://www.networkworld.com/article/3149069/security/obama-orders-review-of-election-hacks-as-trump-doubts-russias-role.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=270111 False None None None Network World - Magazine Info Ransomware attacks against businesses increased threefold in 2016 a new report from security company Kaspersky Lab, the rate of ransomware attacks against businesses increased from one every two minutes to one every 40 seconds during that period. For consumers it was even worse, with the rate reaching one attack every 10 seconds in September.During the third quarter of the year, there were 32,091 new ransomware variations detected by Kaspersky Lab compared to only 2,900 during the first quarter. Overall, 62 new ransomware families appeared this year, the company said.To read this article in full or to leave a comment, please click here]]> 2016-12-09T09:43:13+00:00 http://www.networkworld.com/article/3148842/security/ransomware-attacks-against-businesses-increased-threefold-in-2016.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=270112 False None None None Network World - Magazine Info Looking to 2017: It\'s not just enterprise security To read this article in full or to leave a comment, please click here]]> 2016-12-09T08:33:00+00:00 http://www.networkworld.com/article/3149066/security/looking-to-2017-its-not-just-enterprise-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=270113 False None None None Network World - Magazine Info Attackers use hacked home routers to hit Russia\'s 5 largest banks To read this article in full or to leave a comment, please click here]]> 2016-12-09T07:58:04+00:00 http://www.networkworld.com/article/3148720/security/attackers-use-hacked-home-routers-to-hit-russias-5-largest-banks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=270114 False None None None Network World - Magazine Info The IoT: Gateway for enterprise hackers To read this article in full or to leave a comment, please click here]]> 2016-12-09T05:02:00+00:00 http://www.networkworld.com/article/3149027/internet-of-things/the-iot-gateway-for-enterprise-hackers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=269742 False None None None Network World - Magazine Info 10 essential PowerShell security scripts for Windows administrators To read this article in full or to leave a comment, please click here]]> 2016-12-09T05:01:00+00:00 http://www.networkworld.com/article/3148836/security/10-essential-powershell-security-scripts-for-windows-administrators.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=269743 False None None None Network World - Magazine Info How this analyst targeted a phisher Spear phishing is a type of phishing attack in which the perpetrator customizes their attack to a particular individual or group of individuals. The attacker gathers information on the victim and then tailors the attack to be more likely to fool the target. The would-be attack arrived as an email appearing to come from the finance employee's manager, requesting an urgent wire transfer.To read this article in full or to leave a comment, please click here]]> 2016-12-09T04:59:00+00:00 http://www.networkworld.com/article/3149026/security/how-this-analyst-targeted-a-phisher.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=269744 False None None None Network World - Magazine Info Georgia says it\'s traced an attempted voter hack to DHS Facebook post on Thursday that he had been made aware of the failed attempt to breach the firewall protecting Georgia's voter registration database. The attack was traced to an Internet Protocol address associated with DHS, he said.To read this article in full or to leave a comment, please click here]]> 2016-12-08T17:30:10+00:00 http://www.networkworld.com/article/3148706/security/georgia-says-its-traced-an-attempted-voter-hack-to-dhs.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=269304 False None None None Network World - Magazine Info Cisco Talos: Zeus spawn “Floki bot” malware gaining use, cyber-underworld notoriety warned that a variant of trojan monster Zeus has begun to garner a following in the cyber-underworld as a hard-to-detect attack mechanism.“[Floki bot] is based on the same codebase that was used by the infamous Zeus trojan, the source code of which was leaked in 2011. Rather than simply copying the features that were present within the Zeus trojan 'as-is', Floki Bot claims to feature several new capabilities making it an attractive tool for criminals,” Talos wrote.+More on Network World: 20 years ago: Hot sci/tech images from 1996+To read this article in full or to leave a comment, please click here]]> 2016-12-08T12:30:00+00:00 http://www.networkworld.com/article/3148785/security/cisco-talos-zeus-spawn-floki-bot-malware-gaining-use-cyber-underworld-notoriety.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=269305 False None None None Network World - Magazine Info Russian cyberspies likely behind DNC breach move on to German election statement Thursday posted online by Politico.The hacking activities have led to a surge in spear-phishing email attacks directed at German politicians, the agency said.  To read this article in full or to leave a comment, please click here]]> 2016-12-08T11:35:57+00:00 http://www.networkworld.com/article/3148666/security/russian-cyberspies-likely-behind-dnc-breach-move-on-to-german-election.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=269306 False None APT 28 None Network World - Magazine Info 7 ways to tighten enterprise social media security Image by Umberto NURSSocial media has become the new cyber battleground. Not only is this landscape growing rapidly, but it also represents one of the most dynamic, unstructured and unregulated datasets anywhere in the digital world. In the wake of the social media revolution, cybercriminals exploit businesses and their customers at a massive scale.To read this article in full or to leave a comment, please click here]]> 2016-12-08T11:02:00+00:00 http://www.networkworld.com/article/3148687/social-networking/7-ways-to-tighten-enterprise-social-media-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=269307 False None None None Network World - Magazine Info Cyberspies stole secrets from industrial giant ThyssenKrupp To read this article in full or to leave a comment, please click here]]> 2016-12-08T08:45:58+00:00 http://www.networkworld.com/article/3147941/security/cyberspies-stole-secrets-from-industrial-giant-thyssenkrupp.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=269320 False None None None Network World - Magazine Info November 2016: The month in hacks and breaches disclosed that FriendFinder Networks, Inc., which operates such websites as Adultfriendfinder.com and Penthouse.com, had been hacked and over 400 million customer accounts were compromised.In addition to being the largest leak of 2016 (the 360 million records from leaked from MySpace in May comes in second), this data breach also marked the second time in 2 years that FriendFinder users had their account information compromised.To read this article in full or to leave a comment, please click here]]> 2016-12-08T08:45:00+00:00 http://www.networkworld.com/article/3148336/security/november-2016-the-month-in-hacks-and-breaches.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=269321 False None None None Network World - Magazine Info Fighting ransomware: A fresh look at Windows Server approaches the attack on the San Francisco Municipal Transportation Agency (SFMTA), or Muni as it is known by Bay Area residents. Muni had to give free trips to all comers over the Thanksgiving weekend while it worked to restore access to its machines. The hacker who infected the utility also claims to have access to 30GB of stolen Muni data; the utility disputes this claim, but it is certainly possible.To read this article in full or to leave a comment, please click here]]> 2016-12-08T08:44:00+00:00 http://www.networkworld.com/article/3148299/security/fighting-ransomware-a-fresh-look-at-windows-server-approaches.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=269322 False None None None Network World - Magazine Info The Trump effect on cybersecurity: Tough to tell Trump cyber plan is just 175 words long and includes some initiatives that sound like what's already in place.On the campaign trail and during debates he occasionally hit the topic, but again with little detail and perhaps little understanding of how the internet works. For example, he called for Microsoft founder Bill Gates to find a way to shut off parts of the internet to ISIS as a way to halt its recruitment efforts.To read this article in full or to leave a comment, please click here]]> 2016-12-08T08:31:00+00:00 http://www.networkworld.com/article/3148295/security/the-trump-effect-on-cybersecurity-tough-to-tell.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=269323 False None None None Network World - Magazine Info OpenVPN will be audited for security flaws To read this article in full or to leave a comment, please click here]]> 2016-12-08T06:09:14+00:00 http://www.networkworld.com/article/3148314/security/openvpn-will-be-audited-for-security-flaws.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=269324 False None None None Network World - Magazine Info U.S. and U.K. spy agencies have been intercepting in-flight phone calls for years French newspaper Le Monde reported Wednesday.To read this article in full or to leave a comment, please click here]]> 2016-12-08T04:17:29+00:00 http://www.networkworld.com/article/3148487/privacy/us-and-uk-spy-agencies-have-been-intercepting-in-flight-phone-calls-for-years.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=268893 False None None None Network World - Magazine Info A Turkish hacker is giving out prizes for DDoS attacks click fraud,  and a prank program that can infect a computer and scare the victim with sounds and images.To read this article in full or to leave a comment, please click here]]> 2016-12-07T17:25:06+00:00 http://www.networkworld.com/article/3148267/security/a-turkish-hacker-is-giving-out-prizes-for-ddos-attacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=268426 False None None None Network World - Magazine Info Democrats unveil bill to probe Russia\'s role in alleged election hacks legislation that proposes to form a 12-member bipartisan commission to investigate the electronic means Russia may have used to influence the U.S. election. "Regardless of whether you voted for Donald Trump, Hillary Clinton, or anyone else, Russia's attacks on our election are an attempt to degrade our democracy," said Representative Elijah Cummings of Maryland, one of the sponsors of the bill.To read this article in full or to leave a comment, please click here]]> 2016-12-07T12:50:00+00:00 http://www.networkworld.com/article/3148324/security/democrats-unveil-bill-to-probe-russias-role-in-alleged-election-hacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=268427 False None None None Network World - Magazine Info Cisco whacks its Secure Access Control System the last day customers can order the system is August 30, 2017. For customers with active and paid service and support contracts, support will be available under the terms and conditions of customers' service contract the company said. The last date that Cisco Engineering will release any final software maintenance releases or bug fixes is Aug. 30, 2018. After this date, Cisco Engineering will no longer develop, repair, maintain, or test the product software, the company said.To read this article in full or to leave a comment, please click here]]> 2016-12-07T10:59:00+00:00 http://www.networkworld.com/article/3147842/cisco-subnet/cisco-whacks-its-secure-access-control-system.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=268428 False None None None Network World - Magazine Info EPIC takes aim at IoT toys Cayla and i-Que that spy on kids, files complaint with FTC issues with My Friend Cayla dolls and i-Que Robots which “subject young children to ongoing surveillance.”EPIC – along with Campaign for Commercial Free Childhood, the Center for Digital Democracy, and the Consumers Union – are working “to ban these toys from the marketplace.”To read this article in full or to leave a comment, please click here]]> 2016-12-07T09:58:00+00:00 http://www.networkworld.com/article/3148173/security/epic-takes-aim-at-iot-toys-cayla-and-i-que-that-spy-on-kids-files-complaint-with-ftc.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=268429 False None None None Network World - Magazine Info IDG Contributor Network: The silver lining on a ransomware attack half of companies had responded to a ransomware attack, with 85 percent reporting three or more. If it locks down your personal computer, it's a royal pain. But if it gets onto a network drive at your work, that pain is multiplied by the number of employees and more.Systematically locking down every computer on the network, ransomware puts your entire workforce out of work and sends your IT guys to the mats trying to find the money to pay the ransom or the backups to bring the network back online. Long story short: Ransomware is bad news!To read this article in full or to leave a comment, please click here]]> 2016-12-07T08:51:00+00:00 http://www.networkworld.com/article/3147648/security/the-silver-lining-on-a-ransomware-attack.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=268442 False None None None Network World - Magazine Info Latest Android security update fixes Dirty COW, GPS vulnerabilities Dirty COW (copy-on-write) is a privilege escalation vulnerability that has existed in the Linux kernel for the past nine years and is already being exploited in the wild. It affects Android because the mobile OS is based on Linux, but it was initially believed that the SELinux security policies enforced by default in Android provided some mitigation against the attack.To read this article in full or to leave a comment, please click here]]> 2016-12-07T07:59:29+00:00 http://www.networkworld.com/article/3147959/security/latest-android-security-update-fixes-dirty-cow-gps-vulnerabilities.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=268443 False None None None Network World - Magazine Info Aruba flexes some IoT muscle Aruba, a Hewlett Packard Enterprise Company, plans to be a part of it. The company has been active in the IoT industry by providing Wi-Fi connectivity to IoT endpoints and security through its ClearPass product. However, it has never put together a comprehensive IoT story that spans its portfolio.Last week at the HPE Discover Conference, though, Aruba announced several new products to position itself as a strong IoT enabler. The new solutions include security tools, wired switches and new partnerships.To read this article in full or to leave a comment, please click here]]> 2016-12-07T06:29:00+00:00 http://www.networkworld.com/article/3147927/internet-of-things/aruba-flexes-some-iot-muscle.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=268048 False None None None Network World - Magazine Info Playing cyber defense is not enough to win To read this article in full or to leave a comment, please click here]]> 2016-12-07T05:37:00+00:00 http://www.networkworld.com/article/3147833/security/playing-cyber-defense-is-not-enough-to-win.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=268049 False Guideline None None Network World - Magazine Info Malicious online ads expose millions to possible hack blog post. It's been preying on Internet Explorer users by scanning for vulnerabilities in Adobe Flash and then exploiting them.The attack is designed to infect victims with malware that can steal email password credentials through its keylogging and screenshot grabbing features, among others.To read this article in full or to leave a comment, please click here]]> 2016-12-06T18:49:14+00:00 http://www.networkworld.com/article/3147809/security/malicious-online-ads-expose-millions-to-possible-hack.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=267587 False None None None Network World - Magazine Info Big Switch adds security perimeter around SDN data center 20 years ago: Hot sci/tech images from 1996+ “What we are seeing is network attack by thousands of IoT devices [like the recent Dyn DNS attack that hit 1.2Tbps] using massive speed and bandwidth to take down resources. To mitigate against that kind of attack can be cost prohibitive but what we have implemented in BigSecure can help mitigate those attacks,” said Prashant Gandhi, vice president and chief product officer.To read this article in full or to leave a comment, please click here]]> 2016-12-06T12:58:00+00:00 http://www.networkworld.com/article/3147765/software-defined-networking/big-switch-platform-adds-security-perimeter-around-data-center.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=267588 False None None None Network World - Magazine Info Say goodbye to MS-DOS command prompt To read this article in full or to leave a comment, please click here]]> 2016-12-06T11:54:00+00:00 http://www.networkworld.com/article/3147641/security/say-goodbye-to-ms-dos-command-prompt.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=267589 False None None None Network World - Magazine Info Backdoor accounts found in 80 Sony IP security camera models an advisory Tuesday.To read this article in full or to leave a comment, please click here]]> 2016-12-06T10:51:36+00:00 http://www.networkworld.com/article/3147307/security/backdoor-accounts-found-in-80-sony-ip-security-camera-models.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=267590 False None None None Network World - Magazine Info Getting started with blockchain smart contracts Blockchain: You've got questions; we've got answers ]What are smart contracts? Early approaches to smart contracts included some that were merely “augmented by technology,” says Houman B. Shadab, professor of law at New York Law School. “In a sense, you could view contract signing and management services like DocuSign as an example of [smart contracts].” Other approaches automated the production of traditional contracts using templates.To read this article in full or to leave a comment, please click here]]> 2016-12-06T10:27:00+00:00 http://www.networkworld.com/article/3147734/leadership-management/getting-started-with-blockchain-smart-contracts.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=267603 False Guideline None None Network World - Magazine Info App developers not ready for iOS transport security requirements study was performed by security firm Appthority on the most common 200 apps installed on iOS devices in enterprise environments. The researchers looked at how well these apps conform to Apple's App Transport Security (ATS) requirements.ATS was first introduced and was enabled by default in iOS 9. It forces all apps to communicate with Internet servers using encrypted HTTPS (HTTP over SSL/TLS) connections and ensures that only industry-standard encryption protocols and ciphers without known weaknesses are used. For example, SSL version 3 is not allowed and neither is the RC4 stream cipher, due to known vulnerabilities.To read this article in full or to leave a comment, please click here]]> 2016-12-06T08:13:14+00:00 http://www.networkworld.com/article/3147508/security/app-developers-not-ready-for-ios-transport-security-requirements.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=267604 False None None None Network World - Magazine Info Trump Cybersecurity Do\'s and Don\'ts (Part 2) blog, I presented some recommendations for the “do” column.  Alternatively, here is a list of things President Trump should eschew in his administration's cybersecurity agenda.  The “don't” column includes the following: Don't obsess over cybersecurity intelligence sharing path.  Public/private partnerships for cybersecurity cooperation have roots that go back to the Clinton administration's original PDD-63 for critical infrastructure protection.  In more recent times, congress struggled with CISPA then CISA as stand-alone bills before sneaking CISA into a federal spending bill in late 2015.  Intelligence sharing is a good step but it's been beaten to death and most large organizations have figured this out on their own.  What's needed is a concerted effort on best practices and sharing threat intelligence with small businesses.  Yes, these things should happen but the feds should do so as part of CISA and not spin up another distracting effort.  Remember that threat intelligence sharing is a means to an end (i.e. better cybersecurity visibility and analysis) and not an end in itself. Don't propose yet another blue-ribbon cybersecurity panel.  If Mr. Trump's goal is to shake up Washington, the last thing he should do is appoint another blue-ribbon panel to study cybersecurity issues and provide recommendations – this action is on page one of every Beltway politician's playbook.  As an alternative, Mr. Trump should appoint high-level cybersecurity experts to go through President Obama's cybersecurity commission's findings and suggestions (as well as other historical similar reports), tailor them to his political agenda, and push forward the appropriate actions with congress as soon as possible.     Don't even think about giving national cybersecurity oversight to the military.  The few cybersecurity plans Mr. Trump camp talks about tend to include a military and intelligence component to them.  This is fine when it comes to offensive operations and U.S. Cyber Command but it gets a little scary with regard to civilian agencies and the private sector.  There are those at the Pentagon that will push for this by equating cybersecurity with national security but with all due respect to the military, Mr. Trump must absolutely follow the lead of past President's and draw a clear line between military and civilian cybersecurity involvement.  In truth, ANY military, law enforcement, or intelligence involvement in private sector and consumer cybersecurity programs will turn into an all-consuming political and technology civil war with Republicans and Democrats alike will pushing back.   This unnecessary fight must be avoided as it could halt federal cybersecurity progress for months or years.  Don't push for a new federal cybersecurity agency.  Since the military can't be involved in private sector cybersecurity, many responsibilities fall to DHS, a massive bureaucracy that hasn't had a strong record of success with its cybersecurity programs.  Some in Washington see this as a reason to create yet another civilian agency, a department of national cybersecurity.  While it may be tempting to consolidate cybersecurity responsibilities, it would be extremely difficult to unwind cybersecurity from DHS and every other nook and cranny in the greater DC area.  This shouldn't mean however that the]]> 2016-12-06T06:56:00+00:00 http://www.networkworld.com/article/3147645/security/trump-cybersecurity-do-s-and-don-ts-part-2.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=267481 False Guideline None None