www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-15T13:22:55+00:00 www.secnews.physaphae.fr Network World - Magazine Info Expedia IT tech made $330K by secretly accessing execs\' files for insider trading called, “Particularly egregious because Mr. Ly abused his special access privileges as an IT administrator. On top of violating the trust of the public and his company, he violated the privacy of fellow employees by surreptitiously accessing their files.”To read this article in full or to leave a comment, please click here]]> 2016-12-06T05:59:00+00:00 http://www.networkworld.com/article/3147350/security/expedia-it-tech-made-330k-by-secretly-accessing-execs-files-for-insider-trading.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=267482 False Guideline None None Network World - Magazine Info IBM amps-up Watson cybersecurity experiences IBM Watson/ XPrize open $5 million AI competition for world-changing applications+Watson has recruited enterprises from auto, banking and insurance realms -- including Sun Life Financial, University of Rochester Medical Center, SCANA Corporation, Sumitomo Mitsui Financial Group, California Polytechnic State University, University of New Brunswick, Avnet and Smarttech – to help research and develop new security applications that will use the systems natural language and machine learning techniques.To read this article in full or to leave a comment, please click here]]> 2016-12-06T05:47:00+00:00 http://www.networkworld.com/article/3147458/security/ibm-amps-up-watson-cybersecurity-experiences.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=267272 False None None None Network World - Magazine Info 4 top disaster recovery packages compared Lessons from high-profile IT failures ] But what do enterprise users really think about these tools? Here, users give a shout-out for some of their favorite features, but also give the vendors a little tough love.To read this article in full or to leave a comment, please click here]]> 2016-12-06T05:02:00+00:00 http://www.networkworld.com/article/3147457/disaster-recovery/4-top-disaster-recovery-packages-compared.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=267273 False None None None Network World - Magazine Info Companies increasingly looking for hackers to attack their networks “Hack the Army” bug bounty program that challenges dozens of invited hackers to infiltrate its computer networks and find vulnerabilities in select, public-facing Army websites."We're not agile enough to keep up with a number of things that are happening in the tech world and in other places outside the Department of Defense," explained Army Secretary Eric Fanning in announcing the plan in mid-November. "We're looking for new ways of doing business," which includes a break from the past when government avoided working with the hacker community.To read this article in full or to leave a comment, please click here]]> 2016-12-06T04:56:00+00:00 http://www.networkworld.com/article/3147439/security/companies-increasingly-looking-for-hackers-to-attack-their-networks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=267274 False None None None Network World - Magazine Info Tell-tale toys open bedroom door to strangers, consumer groups warn To read this article in full or to leave a comment, please click here]]> 2016-12-06T04:50:24+00:00 http://www.networkworld.com/article/3147434/mobile/tell-tale-toys-open-bedroom-door-to-strangers-consumer-groups-warn.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=267275 False None None None Network World - Magazine Info Common security mistakes in collaboration tools Image by Rebecca SiegelCollaboration tools have become widely used across organizations today, as people come to rely on these handy tools to work more efficiently. They reduce reliance on email, increase conversation between teams and provide an easy way to share information with colleagues. However, with many workplace applications today, there are so many gaps where security settings can fail, and corporate IT is beginning to take notice. Mike McCamon, president at SpiderOak, recommends staying away from these common security and privacy mistakes.To read this article in full or to leave a comment, please click here]]> 2016-12-06T04:50:00+00:00 http://www.networkworld.com/article/3147627/collaboration/common-security-mistakes-in-collaboration-tools.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=267288 False None None None Network World - Magazine Info Privacy groups urge investigation of \'internet of toys\' lucrative slice of the internet of things market, the so-called internet of toys.To read this article in full or to leave a comment, please click here]]> 2016-12-05T21:05:02+00:00 http://www.networkworld.com/article/3147333/internet-of-things/privacy-groups-urge-investigation-of-internet-of-toys.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=266834 False None None None Network World - Magazine Info Facebook, Twitter, Microsoft and YouTube will share terror content info the shared hashes to help identify matching content on their hosted consumer platforms, review against their respective policies and definitions, and remove the content when appropriate, according to a statement by the companies on Monday.To read this article in full or to leave a comment, please click here]]> 2016-12-05T20:12:00+00:00 http://www.networkworld.com/article/3147329/internet/facebook-twitter-microsoft-and-youtube-will-share-terror-content-info.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=266835 False None None None Network World - Magazine Info Obama\'s cybersecurity plan faces uncertainty with Trump To read this article in full or to leave a comment, please click here]]> 2016-12-05T15:01:55+00:00 http://www.networkworld.com/article/3147294/security/obamas-cybersecurity-plan-faces-uncertainty-with-trump.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=266836 False None Uber None Network World - Magazine Info Behavior analytics tools for cybersecurity move into enterprises detect threats to its private cloud system.To read this article in full or to leave a comment, please click here]]> 2016-12-05T13:08:00+00:00 http://www.networkworld.com/article/3147426/security/behavior-analytics-tools-for-cybersecurity-move-into-enterprises.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=266837 False None None None Network World - Magazine Info Google launches Trusted Contacts location sharing app point of view, its new Trusted Contacts app will “help you feel safe and give your friends and family peace of mind.”The “personal safety app” will work even if your phone is offline.Google software engineer Minh Nguyen explained: Here's how it works: Once you install the Android app, you can assign “trusted” status to your closest friends and family. Your trusted contacts will be able to see your activity status - whether you've moved around recently and are online - to quickly know if you're OK. If you find yourself in a situation where you feel unsafe, you can share your actual location with your trusted contacts. And if your trusted contacts are really worried about you, they can request to see your location. If everything's fine, you can deny the request. But if you're unable to respond within a reasonable time-frame, your location is shared automatically and your loved ones can determine the best way to help you out. Of course, you can stop sharing your location or change your trusted contacts whenever you want.To read this article in full or to leave a comment, please click here]]> 2016-12-05T10:02:00+00:00 http://www.networkworld.com/article/3147286/security/google-launches-trusted-contacts-location-sharing-app.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=266850 False None None None Network World - Magazine Info Chrome bug triggered errors on websites using Symantec SSL certificates blog post Friday.To read this article in full or to leave a comment, please click here]]> 2016-12-05T08:45:35+00:00 http://www.networkworld.com/article/3146714/security/chrome-bug-triggered-errors-on-websites-using-symantec-ssl-certificates.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=266851 False None None None Network World - Magazine Info Ransomware as a Service fuels explosive growth To read this article in full or to leave a comment, please click here]]> 2016-12-05T07:07:00+00:00 http://www.networkworld.com/article/3147032/security/ransomware-as-a-service-fuels-explosive-growth.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=266852 False None None None Network World - Magazine Info Security pros most worried about clouds, mobile survey of cybersecurity professionals released this morning.Around 60 percent of companies were able to assess security risks in cloud environments, down 7 points compared to last year. Mobile devices scored at 57 percent, down by 8 percentage points compared to last year.Overall, the confidence levels of security professionals that their cyber defenses were meeting expectations dropped from 76 percent last year to 70 percent in this year's survey, according to the report, which was produced by Annapolis, M.D.-based CyberEdge Group, and sponsored by Tenable.To read this article in full or to leave a comment, please click here]]> 2016-12-05T07:01:00+00:00 http://www.networkworld.com/article/3146823/leadership-management/security-pros-most-worried-about-clouds-mobile.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=266853 False Guideline None None Network World - Magazine Info 10 most useful Slack bots Ace: Saves your to-do list, and conducts your polls and surveysYou can build a to-do list by sending each task item as a message to this bot; it will store them, and show the list to you upon command. A task can be designated to a channel and assigned to a member in your Slack team, and labeled as prioritized (i.e. more important than others). Ace includes other functionalities: you can create simple polls and number ratings surveys with the bot, for which it will tally and provide a summary of the results of your team members' responses.To read this article in full or to leave a comment, please click here]]> 2016-12-05T04:00:00+00:00 http://www.networkworld.com/article/3146609/cloud-computing/10-most-useful-slack-bots.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=266515 False None None None Network World - Magazine Info New products of the week 12.5.16 Our roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Wyse 5060 Thin ClientdellImage by DellTo read this article in full or to leave a comment, please click here]]> 2016-12-05T03:03:00+00:00 http://www.networkworld.com/article/3146220/mobile-wireless/new-products-of-the-week-12-5-16.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=266516 True None None None Network World - Magazine Info How to survive the death of Flash Abode Flash into a long, slow death spiral when he announced that Flash would not be installed on any of his cutting-edge products, particularly the iPad and iPhone. Jobs argued that Flash was slow, cumbersome, battery intensive, incompatible with touch-screens, and had massive security issues.Since then, Flash has fallen out of favor for a number of very good reasons. First, it remains a serious security concern. Second, around five years ago, Adobe announced that Flash would not be available for mobile devices, which is where Internet users were headed. And third, HTML5 emerged in 2014 as an adequate replacement for Flash as a development platform for multimedia applications such as animation and games.To read this article in full or to leave a comment, please click here]]> 2016-12-05T03:00:00+00:00 http://www.networkworld.com/article/3146087/software/how-to-survive-the-death-of-flash.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=266517 False None None None Network World - Magazine Info Pastor: Toyota salesman stole wife\'s nude photos from phone, sent pics to swingers\' site pdf) against Toyota and a specific dealership as well as a Dallas Morning News report.Pastor Tim Gautreaux and his wife, Claire, were interested in buying a Prius from Texas Toyota of Grapevine. They had taken the dealership's advice and used an app to get pre-approved for financing via Capital One Financial Corporation. An internet car salesman claimed he needed to show the pre-approved financing information in the app to his manager. The pastor unlocked his phone and handed it over.To read this article in full or to leave a comment, please click here]]> 2016-12-04T09:35:00+00:00 http://www.networkworld.com/article/3146975/security/pastor-toyota-salesman-stole-wifes-nude-photos-from-phone-sent-pics-to-swingers-site.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=266028 False None None None Network World - Magazine Info Russia claims it foiled a cyber attack from a foreign spy service statement on Friday without blaming a specific country, but said the attack was meant to be carried out on Dec. 5 against a number of major Russian banks.The hack would have also included the use of social media and SMS text messages to circulate posts claiming a crisis in Russia's financial system. Several dozen cities in the country had been targeted, the Federal Security Service claimed, stating it had already neutralized the threat.To read this article in full or to leave a comment, please click here]]> 2016-12-02T14:25:47+00:00 http://www.networkworld.com/article/3147049/security/russia-claims-it-foiled-a-cyber-attack-from-a-foreign-spy-service.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=266029 False None None None Network World - Magazine Info The NSA and Skilz: Turning spying on you into a video game Wikileaks released a collection of documents relating to the German parliament inquiry of the cooperation between the German foreign intelligence agency (the BND) and the United States' NSA. One particular document (pdf) within that collection caught my attention. It appears to be a report from an official at the European Cryptologic Center (ECC) from April 13, 2012, detailing how they can improve usage of Xkeyscore (XKS) to collect information about people. To read this article in full or to leave a comment, please click here]]> 2016-12-02T11:51:00+00:00 http://www.networkworld.com/article/3145623/security/the-nsa-and-skilz-turning-spying-on-you-into-a-video-game.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=266030 False None None None Network World - Magazine Info IDG Contributor Network: Solution to JIT-ROP cyber attacks: Scramble code quickly an article on Columbia University's website.To read this article in full or to leave a comment, please click here]]> 2016-12-02T11:09:00+00:00 http://www.networkworld.com/article/3146563/security/solution-to-jit-rop-cyber-attacks-scramble-code-quickly.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=266031 False None None None Network World - Magazine Info Researchers find a way bypass the iOS activation lock To read this article in full or to leave a comment, please click here]]> 2016-12-02T10:23:34+00:00 http://www.networkworld.com/article/3146221/security/researchers-find-a-way-bypass-the-ios-activation-lock.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=266044 False None None None Network World - Magazine Info Remote management app exposes millions of Android users to hacking To read this article in full or to leave a comment, please click here]]> 2016-12-02T08:44:42+00:00 http://www.networkworld.com/article/3146915/security/remote-management-app-exposes-millions-of-android-users-to-hacking.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=266045 False None None None Network World - Magazine Info Trump cybersecurity dos and don\'ts To read this article in full or to leave a comment, please click here]]> 2016-12-02T08:10:00+00:00 http://www.networkworld.com/article/3146697/security/trump-cybersecurity-do-s-and-don-ts.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=266046 False None None None Network World - Magazine Info \'Distributed guessing\' attack lets hackers verify Visa card details To read this article in full or to leave a comment, please click here]]> 2016-12-02T07:42:00+00:00 http://www.networkworld.com/article/3145617/security/distributed-guessing-attack-lets-hackers-verify-visa-card-details.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=266047 False None None None Network World - Magazine Info How Windows 10 data collection trades privacy for security aggressive data-collection capabilities may concern users about corporate spying, but enterprises have control that consumer-edition Windows users do not: Administrators can decide how much information gets sent back to Microsoft.But enterprises need to think twice before turning off Windows telemetry to increase corporate privacy. That's because doing so can decrease the effectiveness of Windows 10's security features.[ InfoWorld's deep look: Why (and how) you should manage Windows 10 PCs like iPhones. | The essentials for Windows 10 installation: Download the Windows 10 Installation Superguide today. ] Microsoft isn't merely hoovering up large amounts of data because it can. The company has repeatedly reiterated its stance that Windows 10 does not collect the user's personal data, but rather anonymized file data that is then used to improve overall user experience and Windows functionality.To read this article in full or to leave a comment, please click here]]> 2016-12-02T05:20:00+00:00 http://www.networkworld.com/article/3146709/windows/how-windows-10-data-collection-trades-privacy-for-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=265766 False None None None Network World - Magazine Info Major cybercrime network Avalanche dismantled in global takedown 2009, but on Thursday, authorities in the U.S. and Europe announced they had arrested five suspects allegedly involved with it.Avalanche has been found distributing more 20 different malware families including GozNym, a banking Trojan designed to steal user credentials, and Teslacrypt, a notorious ransomware. Europol estimated the network has caused hundreds of millions of dollars in damages across the world.To read this article in full or to leave a comment, please click here]]> 2016-12-01T13:06:11+00:00 http://www.networkworld.com/article/3145681/security/major-cybercrime-network-avalanche-dismantled-in-global-takedown.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=264810 False None Tesla None Network World - Magazine Info Best practices for lowering cyber insurance costs and cyber risk earned $1B in cyber premiums.  You can minimize your premiums by showing your insurance company you're actively mitigating cyber risks, which is a win-win: lower your risk and secure a more cost-effective insurance plan.To read this article in full or to leave a comment, please click here]]> 2016-12-01T11:34:00+00:00 http://www.networkworld.com/article/3146519/security/best-practices-for-lowering-cyber-insurance-costs-and-cyber-risk.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=264811 False None None None Network World - Magazine Info Data-wiping malware strikes Saudi government agencies said on Thursday. The transportation sector was among the agencies hit by an actor from outside the country, the press agency said.Security firms say the attack involved malware called Shamoon or Disttrack that was previously found targeting a Saudi Arabian oil company four years ago. That attack disabled 30,000 computers.  To read this article in full or to leave a comment, please click here]]> 2016-12-01T11:12:37+00:00 http://www.networkworld.com/article/3146349/security/data-wiping-malware-strikes-saudi-government-agencies.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=264812 False None None None Network World - Magazine Info Who\'s responsible for data compliance? 25% of executives don\'t know Liaison Technologies, one-quarter of top executives are unclear who in their organization is responsible for compliance. And nearly half (47 percent) of respondents to the survey of 479 senior and C-level executives said they don't know which compliance standards apply to their organizations.“As leaders in the compliance domain we thought it was important to share our findings on how U.S. companies perceive their regulatory obligations-and examine ways to help improve their compliance postures,” Hmong Vang, chief trust officer with Liaison, said in a statement. “What we found was rather concerning."To read this article in full or to leave a comment, please click here]]> 2016-12-01T10:43:00+00:00 http://www.networkworld.com/article/3145663/compliance/whos-responsible-for-data-compliance-25-of-executives-dont-know.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=264813 False Guideline None None Network World - Magazine Info AWS tries to protect its customers from DDoS attacks with new service DNS provider Dyn, the BBC and the website of security journalist Brian Krebs.Amazon Web Services is trying to help protect its customers with a new service aimed at mitigating DDoS impacts. It's called Shield, and the free entry-level tier is enabled by default for all web applications running on AWS, starting on Wednesday.To read this article in full or to leave a comment, please click here]]> 2016-12-01T10:23:00+00:00 http://www.networkworld.com/article/3145657/cloud-computing/aws-tries-to-protect-its-customers-from-ddos-attacks-with-new-service.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=264826 False None None None Network World - Magazine Info DARPA gamification plan to get deep-thinkers, game-changers to collaborate 20 years ago: Hot sci/tech images from 1996+The agency is proposing an online community known as Gamifying the Search for Strategic Surprise (GS3) that would “apply a unique combination of online game and social media technologies and techniques to engage a large number of experts and deep thinkers in a shared analytic process to rapidly identify, understand, and expand upon the potential implications and applications of emerging science and technology. The program will also develop a mechanism to identify and quickly fund research opportunities that emerge from this collaborative process,” DARPA stated.To read this article in full or to leave a comment, please click here]]> 2016-12-01T10:00:00+00:00 http://www.networkworld.com/article/3146554/security/darpa-gamification-plan-to-get-deep-thinkers-game-changers-to-collaborate.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=264827 False None None None Network World - Magazine Info IDG Contributor Network: How to architect the network so IoT devices are secure DDoS attacks using IoT devices follow The Manchurian Candidate model + Just like in current IT environments, there is no security silver bullet that can protect IoT devices from every possible cyber threat.To read this article in full or to leave a comment, please click here]]> 2016-12-01T08:45:00+00:00 http://www.networkworld.com/article/3146090/internet-of-things/how-to-architect-the-network-so-iot-devices-are-secure.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=264828 False None None None Network World - Magazine Info TopSpin Security deploys realistic deceptions to lure and trap attackers To read this article in full or to leave a comment, please click here]]> 2016-12-01T07:52:00+00:00 http://www.networkworld.com/article/3146238/security/topspin-security-deploys-realistic-deceptions-to-lure-and-trap-attackers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=264829 False None None None Network World - Magazine Info Implantable medical devices can be hacked to harm patients a new paper examining the security of implantable cardioverter defibrillators (ICDs), which monitor heart rhythm and can deliver either low-power electrical signals to the heart, like a pacemaker, or stronger ones, like a defibrillator, to shock the heart back to a normal rhythm. They will present their findings at the Annual Computer Security Applications Conference (ACSAC) in Los Angeles next week.To read this article in full or to leave a comment, please click here]]> 2016-12-01T07:26:05+00:00 http://www.networkworld.com/article/3146546/security/implantable-medical-devices-can-be-hacked-to-harm-patients.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=264830 False None None None Network World - Magazine Info Scholars, infosec experts call for action on Russian hacking signed an open letter calling for a congressional investigation."Our country needs a thorough, public Congressional investigation into the role that foreign powers played in the months leading up to November," the letter said.Democrats in Congress have also called for an investigation, and were recently joined by Republican Sen. Lindsey Graham.To read this article in full or to leave a comment, please click here]]> 2016-12-01T05:14:00+00:00 http://www.networkworld.com/article/3146527/security/scholars-infosec-experts-call-for-action-on-russian-hacking.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=264475 False Guideline None None Network World - Magazine Info Security Sessions: Lessons learned from the Dyn DNS attacks 2016-12-01T05:00:00+00:00 http://www.networkworld.com/video/72055/security-sessions-lessons-learned-from-the-dyn-dns-attacks#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=264488 False None None None Network World - Magazine Info IBM warns of rising VoIP cyber-attacks report from IBM's Security Intelligence group this week.“SIP is one of the most commonly used application layer protocols in VoIP technology… we found that there has been an upward trend in attacks targeting the SIP protocol, with the most notable uptick occurring in the second half of 2016,” IBM wrote. “In actual attacks on VoIP communications, we note various types of disruption. Spikes in July and September were mostly the result of specially crafted SIP messages that were terminated incorrectly. Persistent, invalid messages are known to cause vulnerable servers and equipment to fail. The spike in October 2016 was largely influenced by SIP messages with invalid characters in the SIP “To” field. These could be reflective of suspicious activity, necessitating further investigation.”To read this article in full or to leave a comment, please click here]]> 2016-11-30T14:06:00+00:00 http://www.networkworld.com/article/3146095/security/ibm-warns-of-rising-voip-cyber-attacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=263510 False None None None Network World - Magazine Info 10% off Nest Cam Indoor Security Camera - Deal Alert read reviews). Its typical list price of $199 has been reduced 10% to $179.97 on Amazon.To read this article in full or to leave a comment, please click here]]> 2016-11-30T12:15:00+00:00 http://www.networkworld.com/article/3131503/cameras/9-off-nest-cam-indoor-security-camera-deal-alert.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=264834 False None None None Network World - Magazine Info Android malware steals access to more than 1 million Google accounts blog post.The malware, called Gooligan, has been preying on devices running older versions of Android, from 4.1 to 5.1, which are still used widely, especially in Asia.Gooligan masquerades as legitimate-looking Android apps. Checkpoint has found 86 titles, many of which are offered on third-party app stores, that contain the malicious coding.To read this article in full or to leave a comment, please click here]]> 2016-11-30T09:53:14+00:00 http://www.networkworld.com/article/3146108/security/android-malware-steals-access-to-more-than-1-million-google-accounts.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=263512 False None None None Network World - Magazine Info Senators fail to stop new rules allowing US law-enforcement hacking Rule 41, the search-and-seizure provision in the Federal Rules of Criminal Procedure, will go into effect Thursday barring any last-minute action in Congress. The rules change will give U.S. law enforcement agencies the authority to cross jurisdictional lines and hack computers anywhere in the world during criminal investigations. Until now, the rules, in most cases, prohibited federal judges from issuing a search warrant outside their jurisdictions. To read this article in full or to leave a comment, please click here]]> 2016-11-30T09:44:16+00:00 http://www.networkworld.com/article/3145953/security/senators-fail-to-stop-new-rules-allowing-us-law-enforcement-hacking.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=263513 False None None None Network World - Magazine Info What\'s in store for tech in 2017 It's the time of year for tech predictions. We've rounded up a slew of ideas from industry watchers who track IT budgets, cybersecurity, hiring, infrastructure management, IoT, virtual reality and more. Here are their predictions, projections and prognostications.IT spending set to rise 2.9%2017 predictions 3Growth in software and IT services revenue will drive an increase in worldwide IT spending, which Gartner forecasts will climb 2.9% to $3.5 trillion in 2017. Software spending is projected to grow 6% in 2016, and it will grow another 7.2% in 2017 to total $357 billion, according to Gartner. IT services spending, which is on pace to grow 3.9% in 2016, will increase 4.8% in 2017 to reach $943 billion.To read this article in full or to leave a comment, please click here]]> 2016-11-30T09:42:00+00:00 http://www.networkworld.com/article/3144464/careers/whats-in-store-for-tech-in-2017.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=263526 False None None None Network World - Magazine Info Security products among the most vulnerable software acquired Secunia in 2015, noted that between August and October of 2016, 46 products made it to the top 20 most vulnerable products. Eleven of those software products overflowing with vulnerabilities were security-related products.To read this article in full or to leave a comment, please click here]]> 2016-11-30T09:33:00+00:00 http://www.networkworld.com/article/3146046/security/security-products-are-among-the-most-vulnerability-riddled-software-products.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=263527 False None None None Network World - Magazine Info Who\'s on your IT security dream team? Image by ThinkstockLast month, I presented you a chamber of horrors-the worst people you meet doing IT security, many of them your friends and, sadly, co-workers. But I don't like to dwell on the negative! So I asked a slew of IT pros about the best people, the ones they want on their side when facing down the toughest security challenges. There are a number of important roles to fill, and I'm not just talking about job titles: I mean attitudes, and abilities that verge on superpowers. IT security is a team sport, so who do you want on your team?To read this article in full or to leave a comment, please click here]]> 2016-11-30T06:40:00+00:00 http://www.networkworld.com/article/3145790/leadership-management/whos-on-your-it-security-dream-team.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=263528 False Guideline None None Network World - Magazine Info 8 tech startup trends to watch in 2017 Help a Reporter Out, a site designed to help journalists connect with sources, asking about startup trends to watch in 2017, the overwhelming majority of respondents pointed to AI. This coming year and beyond, AI will help companies "disrupt sectors that haven't been fully disrupted," says Anthony Glomski, principal of AG Asset Advisory, a financial advisory firm. "AI is in its beginning stages with massive potential impact."To read this article in full or to leave a comment, please click here]]> 2016-11-30T06:39:00+00:00 http://www.networkworld.com/article/3146084/malware-cybercrime/8-tech-startup-trends-to-watch-in-2017.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=263529 False None None None Network World - Magazine Info 2017 security predictions 2016's been a hell of a year in cybersecurity, and it's not over yet.There's no reason to believe 2017 will be any better. If anything, it could be even worse as cybercriminals continue to push social engineering, find new ways to deliver malware, crack vulnerable databases and leverage mobile technology to find ways to get inside corporate defenses and target individuals.To read this article in full or to leave a comment, please click here]]> 2016-11-30T06:36:00+00:00 http://www.networkworld.com/article/3145730/security/2017-security-predictions.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=263530 False None None None Network World - Magazine Info Report: Most cybercriminals earn $1,000 to $3,000 a month according to a recent report.The data is based on a survey conducted by a closed underground community, said report author Andrei Barysevich, director of advanced collection at cybersecurity firm Recorded Future."We actually saw criminals who made way more than that, $50,000 to $200,000 a month," he said. "This is what they keep, this is not revenues, but pure profit. This is what they can spend on loose women, fast cars and nice clothes."To read this article in full or to leave a comment, please click here]]> 2016-11-30T06:31:00+00:00 http://www.networkworld.com/article/3146045/security/report-most-cybercriminals-earn-1000-to-3000-a-month.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=263531 False None None None Network World - Magazine Info SIEMs-as-a-service addresses needs of small, midsize enterprises phishing attempts."We are negotiating a $2 million contract for road work, and we had spearphishing attacks," he said. "Luckily it's a small town, and everyone knows everyone, so people called us."To read this article in full or to leave a comment, please click here]]> 2016-11-30T06:27:00+00:00 http://www.networkworld.com/article/3145423/security/siems-as-a-service-addresses-needs-of-small-midsize-enterprises.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=263532 False None None None Network World - Magazine Info HPE rolls out products to enable IoT adoption Mirai botnet attack on unsecured IoT devices, which halted widespread access to dozens of popular internet sites, dramatizes the value of more comprehensive management and control of IoT, HPE executives said in interviews.Some of HPE's new products are intended for use by virtual cellular network providers, while others are for small and medium-sized enterprises to use in managing their local area network (LAN) operations.To read this article in full or to leave a comment, please click here]]> 2016-11-30T06:24:00+00:00 http://www.networkworld.com/article/3145729/internet-of-things/hpe-rolls-out-products-to-enable-iot-adoption.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=263533 False None None None Network World - Magazine Info IDG Contributor Network: SecureAuth introduces another take on multi-factor authentication 5 trends shaking up multi-factor authentication + As data breaches have gained massive prominence in recent years, due in part to some celebrities' dual proclivities for poor password control and a penchant for naked selfies, the public has become increasingly aware of multi-factor authentication (MFA) a process that requires a subsequent authentication entry beyond simply username and password.To read this article in full or to leave a comment, please click here]]> 2016-11-30T05:00:00+00:00 http://www.networkworld.com/article/3144340/security/secureauth-introduces-another-take-on-multi-factor-authentication.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=263131 False None None None Network World - Magazine Info IDG Contributor Network: 8 security tips for retailers and consumers this holiday season Flash mobs the latest threat this holiday season + Financial fraud is the one that comes to mind first, but identity theft, impersonation and theft of items, among others, are all common. On top of that, every year cyber attackers improve on their techniques to steal information, money and goods.To read this article in full or to leave a comment, please click here]]> 2016-11-30T04:00:00+00:00 http://www.networkworld.com/article/3145626/malware-cybercrime/8-security-tips-for-retailers-and-consumers-this-holiday-season.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=263132 False None None None Network World - Magazine Info Study warns of human rights risks from censoring online terror content the human rights implications of government efforts to restrict online content with the aim of protecting public safety.To read this article in full or to leave a comment, please click here]]> 2016-11-30T02:05:53+00:00 http://www.networkworld.com/article/3145715/security/study-warns-of-human-rights-risks-from-censoring-online-terror-content.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=262846 False None None None Network World - Magazine Info Wisconsin recount over suspected hacking will not be by hand concerns were raised that the voting systems can be hacked. Democratic party candidate Hillary Clinton also backed the recount, including the hand count.To read this article in full or to leave a comment, please click here]]> 2016-11-29T23:12:48+00:00 http://www.networkworld.com/article/3142743/security/wisconsin-recount-over-suspected-hacking-will-not-be-by-hand.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=262847 False None None None Network World - Magazine Info The new Mirai strain has gone far beyond Deutsche Telekom new Mirai strain infecting internet routers and modems across the globe, including in the U.K., Brazil, Iran and Thailand.It's still unclear how many devices have been infected, but Flashpoint estimates that as many as five million devices are vulnerable. “If even a fraction of these vulnerable devices were compromised, they would add considerable power to an existing botnet,” Flashpoint said in a Tuesday blog post.To read this article in full or to leave a comment, please click here]]> 2016-11-29T16:28:02+00:00 http://www.networkworld.com/article/3144761/security/the-new-mirai-strain-has-gone-far-beyond-deutsche-telekom.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=262483 False None None None Network World - Magazine Info Isolation technologies create an “air gap” to eliminate the risk of malware To read this article in full or to leave a comment, please click here]]> 2016-11-29T12:14:00+00:00 http://www.networkworld.com/article/3145415/security/isolation-technologies-create-an-air-gap-to-eliminate-the-risk-of-malware.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=262484 False None None None Network World - Magazine Info DARPA building space consortium to set standards for safe robotic maneuvers To read this article in full or to leave a comment, please click here]]> 2016-11-29T11:21:00+00:00 http://www.networkworld.com/article/3144383/security/darpa-building-space-consortium-to-set-standards-for-safe-robotic-maneuvers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=262485 False None None None Network World - Magazine Info UK\'s internet surveillance law receives royal approval no reigning British monarch has rejected a piece of legislation since 1707. Besides, given the post-Brexit backlash against anyone than Parliament deciding British law, it would have been a daring move for a hereditary head of state.To read this article in full or to leave a comment, please click here]]> 2016-11-29T09:22:48+00:00 http://www.networkworld.com/article/3145646/internet/uks-internet-surveillance-law-receives-royal-approval.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=262486 False None None None Network World - Magazine Info Goodbye SIEM, hello SOAPA To read this article in full or to leave a comment, please click here]]> 2016-11-29T08:31:00+00:00 http://www.networkworld.com/article/3145408/security/goodbye-siem-hello-soapa.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=262499 False Guideline None None Network World - Magazine Info Senators plan last-ditch push to curb US law-enforcement hacking power Rule 41, the search and seizure provision in the Federal Rules of Criminal Procedure, would give U.S. law enforcement agencies the authority to cross jurisdictional lines and hack computers anywhere in the world during criminal investigations.The rules, in most cases, now prohibit federal judges from issuing a search warrant outside their jurisdictions. The changes, approved by the U.S. Supreme Court in April at the request of the Department of Justice, go into effect on Thursday unless Congress moves to reverse them.To read this article in full or to leave a comment, please click here]]> 2016-11-29T07:53:51+00:00 http://www.networkworld.com/article/3145576/security/senators-plan-last-ditch-push-to-curb-us-law-enforcement-hacking-power.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=262500 False None None None Network World - Magazine Info Amazon employee jumped from building after sending email to co-workers and CEO SeattlePI that a man did jump from the “rooftop at an Amazon building at Ninth Avenue North and Thomas Street.”amazon apollo building Google Amazon Apollo Building as seen via Google Maps.To read this article in full or to leave a comment, please click here]]> 2016-11-29T07:03:00+00:00 http://www.networkworld.com/article/3145604/security/amazon-employee-jumped-from-building-after-sending-email-note-to-co-workers-and-ceo.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=262501 False None None None Network World - Magazine Info Should InfoSec hire from other industries? $170 billion by 2020, but – like any child star – it finds itself struggling with growing pains.An evolving threat landscape, cyber-crime-as-a-service and cyber espionage are the biggest problems for CISOs and law enforcers today, not to mention the record number of data breaches, but there is a bigger, arguably more basic, problem that stunts the market.Information security has long been suffering from a well-advertised skills gap problem. It's well cited that (ISC)² says that there will be a shortage of 2 million professionals by 2020, with Cisco putting the current global shortage at closer to 1 million. According to 2015 analysis from Bureau of Labor Statistics by Peninsula Press, more than 209,000 cybersecurity jobs in the U.S. are currently unfilled.To read this article in full or to leave a comment, please click here]]> 2016-11-29T05:33:00+00:00 http://www.networkworld.com/article/3145432/careers/should-infosec-hire-from-other-industries.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=262149 False None None None Network World - Magazine Info 2016: A systems security disaster known systems breaches just this year. Read it and rage.  It does not include the San Francisco Metro Transit Authority (SFMTA) hack from Thanksgiving weekend, where the SFMTA had to let passengers go free through the gates. To read this article in full or to leave a comment, please click here]]> 2016-11-29T04:30:00+00:00 http://www.networkworld.com/article/3144942/security/2016-a-systems-security-disaster.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=262150 False None None None Network World - Magazine Info San Francisco Muni says server data not accessed in ransomware hit if the ransom of the equivalent of about $73,000 in bitcoin was not paid.“The SFMTA network was not breached from the outside, nor did hackers gain entry through our firewalls,” the agency's spokeswoman Kristen Holland wrote in a blog post. She did not mention how the ransomware had got to the SFMTA systems, though there is the possibility that it may have been activated through a link in an email or a web link by an unsuspecting insider.To read this article in full or to leave a comment, please click here]]> 2016-11-28T22:49:55+00:00 http://www.networkworld.com/article/3145490/security/san-francisco-muni-says-server-data-not-accessed-in-ransomware-hit.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=261948 False None None None Network World - Magazine Info Upgraded Mirai botnet disrupts Deutsche Telekom by infecting routers problems for close to a million Deutsche Telekom customers, the company reported on Monday.   Deutsche Telekom blamed the disruption on the notorious malware, which has already been found infecting more than 500,000 internet connected devices, including DVRs and surveillance cameras.To read this article in full or to leave a comment, please click here]]> 2016-11-28T12:18:51+00:00 http://www.networkworld.com/article/3145446/security/upgraded-mirai-botnet-disrupts-deutsche-telekom-by-infecting-routers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=261605 False None None None Network World - Magazine Info Spaceflight training jets, balloons create challenges for FAA report from the Government Accountability Office said companies they interviewed had received standard aircraft certification for their space support vehicle, but for others the standard certification process is lengthy and not designed for the type of vehicles they would like to use, such as unique, single-production aircraft or retired military jets.To read this article in full or to leave a comment, please click here]]> 2016-11-28T12:11:00+00:00 http://www.networkworld.com/article/3144191/security/spaceflight-training-jets-balloons-create-challenges-for-faa.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=261606 False None None None Network World - Magazine Info Google security expert says antivirus apps don\'t work Kiwicon X, the New Zealand equivalent of the Black Hat conference held in the United States, Darren Bilby called many existing tools ineffective "magic" that engineers are forced to install for the sake of compliance but at the expense of real security. "Please no more magic," he said, according to The Register. "We need to stop investing in those things we have shown do not work." To read this article in full or to leave a comment, please click here]]> 2016-11-28T11:38:00+00:00 http://www.networkworld.com/article/3142735/security/google-security-expert-says-antivirus-apps-dont-work.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=261607 False Guideline None None Network World - Magazine Info Feds provide legal loophole to hacking IoT devices long-overdue exemptions to the Digital Millennium Copyright Act (DMCA).Those exemptions, which took effect Oct. 28, provide a two-year window allowing “good-faith” researchers to break into the software that controls most consumer and commercial Internet of Things (IoT) devices – those used in everything from “smart” homes to smartphones, cars, medical devices, voting machines and more – without violating copyright laws.To read this article in full or to leave a comment, please click here]]> 2016-11-28T11:21:00+00:00 http://www.networkworld.com/article/3144561/internet-of-things/feds-provide-legal-loophole-to-hacking-iot-devices.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=261608 False None None None Network World - Magazine Info Researchers exploit app flaw and steal a Tesla Model S remotely hacked while it was being driven. The hack demonstrated by Promon, a Norwegian security company, provided “additional functionality” for cyber thugs to control the vehicle, including enabling “keyless driving functionality,” which could allow a crook to drive away with a Tesla without have a key fob present.To read this article in full or to leave a comment, please click here]]> 2016-11-28T09:07:00+00:00 http://www.networkworld.com/article/3144481/security/researchers-showed-how-to-exploit-app-flaw-and-steal-a-tesla-model-s.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=261621 False None Tesla None Network World - Magazine Info One million broadband offline in Germany; \'external influence\' blamed To read this article in full or to leave a comment, please click here]]> 2016-11-28T08:30:31+00:00 http://www.networkworld.com/article/3142730/security/one-million-broadband-offline-in-germany-external-influence-blamed.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=261622 False None None None Network World - Magazine Info Best practices to fight corporate security risks Image by PexelsToday, security education may be part of an organization's onboarding process, but while many people know not to open an email from an unidentified source, or even those from a friend or coworker that have uncharacteristic links or text, individuals inevitably still do.To read this article in full or to leave a comment, please click here]]> 2016-11-28T06:29:00+00:00 http://www.networkworld.com/article/3144473/security/best-practices-to-fight-corporate-security-risks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=261623 False None None None Network World - Magazine Info Security budgets continue to grow, but is it enough? data from the ISACA. And 40 percent of those data breaches happened in the business sector.So it's no surprise that Business Insider Intelligence reports an estimated $655 billion will be invested in cybersecurity initiatives between 2015 and 2020. However, in 2015, worldwide cybersecurity spending reached only $75.4 billion, according to Gartner, jumping to an estimated $2.77 trillion in 2016. Those numbers suggest that businesses are only just catching on to the importance of cybersecurity in the workplace, but are they too late?To read this article in full or to leave a comment, please click here]]> 2016-11-28T06:23:00+00:00 http://www.networkworld.com/article/3144514/malware-cybercrime/security-budgets-continue-to-grow-but-is-it-enough.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=261624 False None None None Network World - Magazine Info Retailers get an IoT wake-up call DDoS attack shows dangers of IoT 'running rampant' ]To read this article in full or to leave a comment, please click here]]> 2016-11-28T06:19:00+00:00 http://www.networkworld.com/article/3144018/internet-of-things/retailers-get-an-iot-wake-up-call.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=261625 False None None None Network World - Magazine Info Advice for evading ATM skimmers a series of articles on the subject by security expert Brian Krebs, who posted another one just yesterday.This piece includes a couple of videos showing exactly how scammers insert and remove the skimmers from an ATM, as well as practical advice you can use to thwart those efforts:To read this article in full or to leave a comment, please click here]]> 2016-11-28T06:07:00+00:00 http://www.networkworld.com/article/3144343/security/advice-for-evading-atm-skimmers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=261626 False None None None Network World - Magazine Info How to protect the C-suite from spear phishing 2016-11-28T06:00:00+00:00 http://www.networkworld.com/video/70455/how-to-protect-the-c-suite-from-spear-phishing#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=261627 False Guideline None None Network World - Magazine Info IDG Contributor Network: Information security priorities for Trump\'s administration To read this article in full or to leave a comment, please click here]]> 2016-11-28T04:30:00+00:00 http://www.networkworld.com/article/3144108/security/information-security-priorities-for-trumps-administration.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=261256 False None None None Network World - Magazine Info IDG Contributor Network: Has IT become too complex to manage? To read this article in full or to leave a comment, please click here]]> 2016-11-28T03:20:00+00:00 http://www.networkworld.com/article/3142371/leadership-management/has-it-become-too-complex-to-manage.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=261257 False Guideline None None Network World - Magazine Info Japanese government denies report that its defense forces were hacked Japanese Ministry of Defense told Kyodo News on Sunday. The ministry and the Self-Defense Forces discovered the attack in September, said the report, which was also relayed by The Japan Times.Kyodo's sources said the hack was believed to be the work of a nation state, and that information may have been leaked in the attack.To read this article in full or to leave a comment, please click here]]> 2016-11-28T03:17:45+00:00 http://www.networkworld.com/article/3143976/security/japanese-government-denies-report-that-its-defense-forces-were-hacked.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=261258 False None None None Network World - Magazine Info New products of the week 11.28.16 Image by CAOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.CSTAR for Google Chrome112816 upguardImage by UpGuard To read this article in full or to leave a comment, please click here]]> 2016-11-28T02:49:00+00:00 http://www.networkworld.com/article/3142933/mobile-wireless/new-products-of-the-week-11-28-16.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=261259 True None None None Network World - Magazine Info San Francisco\'s Muni transit system reportedly hit by ransomware “out of service,” and San Francisco's Municipal Railway, widely known as Muni, was allowing free rides on its light-rail vehicles as it was unable to charge customers, according to the Examiner.To read this article in full or to leave a comment, please click here]]> 2016-11-27T23:36:42+00:00 http://www.networkworld.com/article/3144992/security/san-franciscos-muni-transit-system-reportedly-hit-by-ransomware.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=261067 False Guideline None None Network World - Magazine Info Trump Tower changed to Dump Tower on Google Maps Fidel Castro died. Unlike President Obama who said, “History will record and judge the enormous impact of this singular figure on the people and world around him,” President-elect Donald Trump bluntly called Catro a “brutal dictator” whose “legacy is one of firing squads, theft, unimaginable suffering, poverty and the denial of fundamental human rights.”Some unknown person with an internet connection also attempted to be blunt, expressing his or her opinion of Donald Trump via Google Maps; the President-elect's transition headquarters was renamed to the Dump Tower on Google Maps.To read this article in full or to leave a comment, please click here]]> 2016-11-27T08:50:00+00:00 http://www.networkworld.com/article/3144927/security/trump-tower-changed-to-dump-tower-on-google-maps.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=260683 False None None None Network World - Magazine Info Amazon Cyber Monday 2016 sales: Ready, Set... Nest thermostats.(Black Friday & Cyber Monday watchers such as BFads and Best Black Friday have been a big help in keeping tabs on deals.)To read this article in full or to leave a comment, please click here]]> 2016-11-27T05:54:00+00:00 http://www.networkworld.com/article/3144987/consumer-electronics/amazon-cyber-monday-2016-sales-ready-set.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=260684 False None None None Network World - Magazine Info Wisconsin to recount US presidential election vote after hack concerns reports of breaches of voter registration databases in at least two states, Stein in her petition for recount wrote that Wisconsin uses both the optical scan and direct-recording electronic types of electronic voting machines, which are both susceptible to compromise.To read this article in full or to leave a comment, please click here]]> 2016-11-25T21:56:47+00:00 http://www.networkworld.com/article/3144456/security/wisconsin-to-recount-us-presidential-election-vote-after-hack-concerns.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=260685 False None None None Network World - Magazine Info Will AI usher in a new era of hacking? battled each other to show that machines can indeed find and patch software vulnerabilities.Theoretically, the technology can be used to perfect any coding, ridding it of exploitable flaws. But what if that power was used for malicious purposes? The future of cyberdefense might also pave the way for a new era of hacking.To read this article in full or to leave a comment, please click here]]> 2016-11-25T05:00:10+00:00 http://www.networkworld.com/article/3142937/security/will-ai-usher-in-a-new-era-of-hacking.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=260489 False None None None Network World - Magazine Info Linux hardening: a 15-step checklist for a secure Linux server Gus Khawaja Most people assume Linux is secure, and that's a false assumption. Imagine your laptop is stolen without first being hardened. A thief would probably assume your username is “root” and your password is “toor” since that's the default password on Kali and most people continue to use it. Do you? I hope not.The negative career implications of choosing not to harden your Kali Linux host are severe, so I'll share the necessary steps to make your Linux host secure, including how I use penetration testing and Kali Linux to get the job done. It's important to note that, while they are many distributions (AKA distros) of Linux and each one differs from the command line perspective, the logic is the same. Use the following tips to harden your own Linux box.To read this article in full or to leave a comment, please click here]]> 2016-11-25T03:00:00+00:00 http://www.networkworld.com/article/3143050/linux/linux-hardening-a-15-step-checklist-for-a-secure-linux-server.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=260490 False None None None Network World - Magazine Info Britain\'s wartime codebreaking base could host a national cyber security college Alan Turing developed some of his mathematical theories of computing while working on breaking the enigma code.After the war the site fell into disrepair, but parts of it have been restored and now house the U.K.'s National Museum of Computing.To read this article in full or to leave a comment, please click here]]> 2016-11-24T08:55:40+00:00 http://www.networkworld.com/article/3144549/security/britains-wartime-codebreaking-base-could-host-a-national-cyber-security-college.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=260008 False None None None Network World - Magazine Info Voting security experts call on Clinton to demand recount the group has told her campaign.The group has so far given no concrete evidence of voting irregularities but is planning to release a report. One news report suggested significant differences in the margins of victory for Trump in Wisconsin in counties using electronic voting machines, compared to counties using paper ballots, but the group has not confirmed those concerns.To read this article in full or to leave a comment, please click here]]> 2016-11-23T08:20:35+00:00 http://www.networkworld.com/article/3144465/security/voting-security-experts-call-on-clinton-to-demand-recount.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=259267 False None None None Network World - Magazine Info U.S. says cybersecurity skills shortage is a myth hire 6,500 people with cybersecurity skills by January 2017, according to White House officials. It had hired 3,000 by the first half of this year. As part the ongoing hiring effort, it held a job fair in July.At the Department of Homeland Security (DHS), "We set out to dispel certain myths regarding cybersecurity hiring," wrote Angela Bailey, chief human capital officer at DHS in a blog post Monday.To read this article in full or to leave a comment, please click here]]> 2016-11-23T05:23:00+00:00 http://www.networkworld.com/article/3144137/careers/u-s-says-cybersecurity-skills-shortage-is-a-myth.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=259019 False None None None Network World - Magazine Info Make companies pay full cost of breaches to restore trust in the internet, says ISOC ISOC report.To read this article in full or to leave a comment, please click here]]> 2016-11-23T04:46:20+00:00 http://www.networkworld.com/article/3144132/security/make-companies-pay-full-cost-of-breaches-to-restore-trust-in-the-internet-says-isoc.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=259020 False None None None Network World - Magazine Info How to make home IoT more secure: Assume the worst report, which came out on Tuesday. It also points out that some consumer IoT devices ship with weak built-in usernames and passwords like “admin” and “password,” can't do authentication or encryption, or can easily be taken over by malware that turns them into bots.To read this article in full or to leave a comment, please click here]]> 2016-11-22T17:39:04+00:00 http://www.networkworld.com/article/3143554/internet-of-things/how-to-make-home-iot-more-secure-assume-the-worst.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=258546 False None None None Network World - Magazine Info 12 tips for safer Black Friday and Cyber Monday shopping How to dodge Black Friday schemes +Here are a dozen steps you can take to avoid becoming a victim. Only download or buy apps from legitimate app stores. Suspect apps that ask for too many permissions. Check out the reputation of apps and particularly the app publisher. Only enter credit card info on secure shopping portals. Avoid using simple passwords, and use two-factor authentication if you can. Be alert for poisoned search results when using search engines to find products. Don't install software that sites require before you can shop. Don't use free pubic Wi-Fi to make purchases. Be suspicious of great deals you learn about via social media or emails and don't click the links. Turn off location services while shopping to minimize the potential personal data that could be compromised. Make sure the connection to e-commerce sites is secured (HTTPS). Double check the validity of the SSL certificate for the site. To read this article in full or to leave a comment, please click here]]> 2016-11-22T14:14:00+00:00 http://www.networkworld.com/article/3144057/security/12-tips-for-safer-black-friday-and-cyber-monday-shopping.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=258547 False None None None Network World - Magazine Info How to dodge Black Friday and Cyber Monday shopping hackers To read this article in full or to leave a comment, please click here]]> 2016-11-22T14:12:00+00:00 http://www.networkworld.com/article/3144060/security/how-to-dodge-black-friday-and-cyber-monday-shopping-hackers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=258548 False None None None Network World - Magazine Info Who has the most impact in driving security advancement? To read this article in full or to leave a comment, please click here]]> 2016-11-22T04:56:00+00:00 http://www.networkworld.com/article/3143542/techology-business/who-has-the-most-impact-in-driving-security-advancement.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=258177 False Guideline None None Network World - Magazine Info Beware of fake apps and bad Wi-Fi hotspots while shopping by mobile phone in a blog. "Going to physical stores and connecting to risky Wi-Fi networks, or shopping online both pose increasing risks we should all be aware of."To read this article in full or to leave a comment, please click here]]> 2016-11-22T04:54:00+00:00 http://www.networkworld.com/article/3143460/internet/holiday-shopping-by-phone-beware-fake-e-commerce-apps-and-bad-wi-fi-hotspots.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=258178 False None None None Network World - Magazine Info Best small to midsized cities to land a cybersecurity job Image by ThinkstockWhile cybersecurity positions are plentiful in most major cities, thousands of cyber positions at all levels are waiting to be filled in less populated and often more scenic locales – and most offer a lower cost of living.Although larger corporations usually post the most job openings, “you're most likely to find that you're working at a smaller company” in these smaller cities, says Tim Herbert, senior vice president of research and market intelligence at CompTIA, the Computing Technology Industry Association. But the tradeoff will be broader responsibilities and more experience, he adds. “In smaller companies you take on more responsibilities with less specialization than in a large enterprise where roles are very well-defined.”To read this article in full or to leave a comment, please click here]]> 2016-11-21T13:30:00+00:00 http://www.networkworld.com/article/3143119/careers/best-small-to-midsized-cities-to-land-a-cybersecurity-job.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=257622 False None None None Network World - Magazine Info 3 ingredients of a successful attack Security in Computing, 5th edition.But over the years the field has also developed a language of its own, which can present a challenge to newcomers.In the preface to the updated edition of this classic text, the authors make plain their intent to demystify the language of computer security. One good place to start: understanding the three things a malicious attacker needs to be successful.To read this article in full or to leave a comment, please click here]]> 2016-11-21T13:28:00+00:00 http://www.networkworld.com/article/3143117/it-skills-training/3-ingredients-of-a-successful-attack.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=257623 False None None None Network World - Magazine Info ACM Prize in Computing is the new name of honor for young innovators ACM-Infosys Foundation Award to the ACM Prize in Computing, and boosted the value of the prize by $75K.Good call on the name change, which the ACM figures will raise awareness of the award and be more recognizable. Though not to be confused: the group's more famous AM Turing Award, given annually for major contributions of lasting importance to computing, is known informally as the "Nobel Prize of Computing". (See also: "Crypto dream team of Diffiie & Hellman wins 2016 'Nobel Prize of Computing'")To read this article in full or to leave a comment, please click here]]> 2016-11-21T12:35:00+00:00 http://www.networkworld.com/article/3142899/careers/acm-prize-in-computing-is-the-new-name-of-honor-for-young-innovators.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=257624 False None None None Network World - Magazine Info FireEye\'s iSIGHT threat intelligence exposes security blind spots To read this article in full or to leave a comment, please click here]]> 2016-11-21T10:22:00+00:00 http://www.networkworld.com/article/3143656/security/fireeyes-isight-threat-intelligence-exposes-security-blind-spots.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=257625 False None None None Network World - Magazine Info CIO confab SIMposium to skip 2017 Society for Information Management has announced that is reworking its annual SIMposium conference, which took place last month in Connecticut, and will come back in the spring of 2018 with an event dubbed SIM Connect Live.This year's event attracted hundreds of CIOs and other IT decision makers and business strategists to exchange thoughts on everything from leadership to risk management to the workforce of the future (See also: "CIO Security Lessons -- Dark thinking on IoT & exploding enterprise networks").To read this article in full or to leave a comment, please click here]]> 2016-11-21T09:40:00+00:00 http://www.networkworld.com/article/3142398/leadership-management/cio-confab-simposium-to-skip-2017.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=257638 False Guideline None None Network World - Magazine Info Which Job-Related Factors Alienate Cybersecurity Pros? report from ESG and the Information Systems Security Association (ISSA) indicates that 46% of cybersecurity professionals are solicited by recruiters to consider another job at least once each week!The data indicates that there aren't enough cybersecurity professionals around and those that are employed are in high demand.  This puts a lot of pressure on CISOs and human resources people to make sure to keep their existing cybersecurity staff happy so they don't walk out the door when they are barraged by headhunters' calls. To read this article in full or to leave a comment, please click here]]> 2016-11-21T07:35:00+00:00 http://www.networkworld.com/article/3143624/security/which-job-related-factors-alienate-cybersecurity-pros.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=257639 False None None None Network World - Magazine Info Renowned tech investor Harry Weller of NEA passes away at 46 New Enterprise Associate General Partner Harry Weller died in his sleep at the age of 46. Weller, who was not known to have had any illness, is survived by his wife and two sons."A renowned technology investor, champion of innovation and true partner to entrepreneurs, many knew Harry to be bold, brilliant and passionate," NEA says on a tribute to Weller on its website." To those who knew him best, he was equally remarkable for his kind heart and generous spirit. Harry was a deeply devoted father, husband and friend."MORE: Notable deaths in 2016 in technology, science & inventionsTo read this article in full or to leave a comment, please click here]]> 2016-11-21T06:56:00+00:00 http://www.networkworld.com/article/3143217/careers/renowned-tech-investor-harry-weller-of-nea-passes-away-at-46.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=257640 False None None None