www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-15T14:31:37+00:00 www.secnews.physaphae.fr Network World - Magazine Info 10 top holiday phishing scams Image by ThinkstockIt always happens this time of year, an influx of holiday related scams circulating the interwebs. Scams don't wait for the holidays, but scammers do take advantage of the increased shopping and distraction when things get busy to take your money and personal information. Jon French, security analyst at AppRiver, warns you of six holiday threats to watch out for.To read this article in full or to leave a comment, please click here]]> 2016-11-21T05:53:00+00:00 http://www.networkworld.com/article/3143179/security/10-top-holiday-phishing-scams.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=257396 False None None None Network World - Magazine Info Security basics for the holiday season, and the year to come Image by Diariocritico de VenezuelaAs far as theft and fraud are concerned, consumers face (and willingly accept) a moderate amount of risk when they shop online or out in their local neighborhoods. This holiday season is no different, but the risk is elevated some, because criminals are looking for easy marks and low-hanging fruit.To read this article in full or to leave a comment, please click here]]> 2016-11-21T05:45:00+00:00 http://www.networkworld.com/article/3143566/security/security-basics-for-the-holiday-season-and-the-year-to-come.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=257397 False None None None Network World - Magazine Info Most hackable holiday gifts McAfee Most Hackable Holiday Gifts list.The company first surveyed people to find out what average consumers plans to purchase and what they know about securing their new devices; the findings included that the average consumer lacks “awareness about the potential risks associated with emerging connected devices, such as drones (20%), children's toys (15%), virtual reality tech (15%), and pet gifts (11%).”To read this article in full or to leave a comment, please click here]]> 2016-11-21T04:00:00+00:00 http://www.networkworld.com/article/3143096/security/most-hackable-holiday-gifts.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=257398 False None None None Network World - Magazine Info Network managers should be checking their list twice As IT Ops teams begin preparation for the upcoming holiday season, which in retail is the busiest time of the year for web traffic, the team at BigPanda along with some other vendors have prepared a checklist of the key factors IT Ops teams need to consider to ensure their IT infrastructure is ready.To read this article in full or to leave a comment, please click here]]> 2016-11-21T03:52:00+00:00 http://www.networkworld.com/article/3142707/network-management/network-managers-should-be-checking-their-list-twice.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=257399 False None None None Network World - Magazine Info New products of the week 11.21.16 Our roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.BetterWorks Program AutopilotbetterworksKey features: BetterWorks Program Autopilot helps enterprise customers automate goal setting and performance management program administration. Automated program reminders, timely communications and usage dashboards all ensure engagement and adoption without administrative overhead. More info.To read this article in full or to leave a comment, please click here]]> 2016-11-21T03:40:00+00:00 http://www.networkworld.com/article/3142996/mobile-wireless/new-products-of-the-week-11-21-16.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=257412 False None None None Network World - Magazine Info Symantec will acquire identity protection firm LifeLock in $2.3B deal To read this article in full or to leave a comment, please click here]]> 2016-11-20T20:57:46+00:00 http://www.networkworld.com/article/3143444/security/symantec-will-acquire-identity-protection-firm-lifelock-in-23b-deal.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=256853 False None None None Network World - Magazine Info IoT security camera infected within 98 seconds of plugging it in fun” to watch the infection happen. He tweet-documented his experience.Graham purchased an inexpensive device – this $55 IoT security camera made by JideTech.To read this article in full or to leave a comment, please click here]]> 2016-11-20T09:06:00+00:00 http://www.networkworld.com/article/3143133/security/iot-security-camera-infected-within-98-seconds-of-plugging-it-in.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=256854 False None None None Network World - Magazine Info Trump\'s national security pick is a cybersecurity hawk speech posted online last year. In 2014, after retiring as a general, he started a consulting firm called Flynn Intel Group that specializes in preventing cyber threats for clients.To read this article in full or to leave a comment, please click here]]> 2016-11-18T15:32:03+00:00 http://www.networkworld.com/article/3143188/security/trumps-national-security-pick-is-a-cybersecurity-hawk.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=256855 False Guideline None None Network World - Magazine Info IoT attacks could bring real-world damage attack on the internet addressing provider Dyn, which resulted in temporary outages at popular sites like Twitter and Spotify.[ Related: How the Dyn DDoS attack unfolded ]To read this article in full or to leave a comment, please click here]]> 2016-11-18T13:12:00+00:00 http://www.networkworld.com/article/3143057/security/iot-attacks-could-bring-real-world-damage.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=256856 False None None None Network World - Magazine Info With CIA choice, Trump picks a foe of Silicon Valley\'s encryption stance To read this article in full or to leave a comment, please click here]]> 2016-11-18T13:05:00+00:00 http://www.networkworld.com/article/3143055/techology-business/with-cia-choice-trump-picks-a-foe-of-silicon-valleys-encryption-stance.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=256869 False None None None Network World - Magazine Info Attacks to make Ask.com Toolbar a conduit for malware are nipped in the bud security firm Red Canary.Once installed, the dropper would bring in secondary malware including banking Trojans and other online-fraud code, says Keith McCammon, CSO of Red Canary. The secondary payloads varied, and some of the dozen or so compromised machines his team found had downloaded more than one kind, he says.To read this article in full or to leave a comment, please click here]]> 2016-11-18T12:09:00+00:00 http://www.networkworld.com/article/3143128/security/attacks-to-make-ask-com-toolbar-a-conduit-for-malware-are-nipped-in-the-bud.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=256870 False None None None Network World - Magazine Info Virgin Galactic, start-up Boom tout supersonic passenger jet Keep grandma's gravy at home but the turducken can fly+To read this article in full or to leave a comment, please click here]]> 2016-11-18T10:45:00+00:00 http://www.networkworld.com/article/3143090/security/virgin-galactic-start-up-boom-tout-supersonic-passenger-jet.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=256871 False None None None Network World - Magazine Info UK mobile operator loses phones following data breach To read this article in full or to leave a comment, please click here]]> 2016-11-18T08:48:32+00:00 http://www.networkworld.com/article/3143144/security/uk-mobile-operator-loses-phones-following-data-breach.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=256872 False None None None Network World - Magazine Info IBM opens \'cyber-range\' to practice security battles 2016-11-18T08:20:00+00:00 http://www.networkworld.com/video/71978/ibm-opens-cyber-range-to-practice-security-battles#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=256873 True None None None Network World - Magazine Info \'Wireless security at its finest\' submitted the above photo to Reddit's section devoted to IT rants presumably does not believe it depicts wireless security at its finest. In fact, the sarcasm oozes.However, not everyone in the forum held such a dim view.“There is nothing wrong with this,” writes another user. “It is public wi-fi. It has a slight security advantage over an open network in that it makes it more difficult to eavesdrop. The (would-be) attacker also has to capture the handshake when a client associates.”There were supportive variations on that theme.To read this article in full or to leave a comment, please click here]]> 2016-11-18T07:48:00+00:00 http://www.networkworld.com/article/3143105/mobile-wireless/wireless-security-at-its-finest.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=256874 False None None None Network World - Magazine Info US lawmakers introduce bill to delay enhanced government hacking powers to delay for discussion proposed amendments to rule 41 of the Federal Rules of Criminal Procedure until July 1 next year. The changes to the rule have already been approved by the Supreme Court in April, and if Congress doesn't act to the contrary, they will go into effect on Dec. 1.To read this article in full or to leave a comment, please click here]]> 2016-11-17T22:03:46+00:00 http://www.networkworld.com/article/3141999/security/us-lawmakers-introduce-bill-to-delay-enhanced-government-hacking-powers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=256097 False None None None Network World - Magazine Info Without tech industry guidance, U.S. may resort to weakening encryption encryption issues than turning away, according to a former official with the Obama administration. “The government can get very creative,” said Daniel Rosenthal, who served as the counterterrorism director in the White House until January this year. He fears that the U.S. government will choose to “go it alone” and take extreme approaches to circumventing encryption, especially if another terrorist attack occurs.To read this article in full or to leave a comment, please click here]]> 2016-11-17T19:14:06+00:00 http://www.networkworld.com/article/3142770/security/without-tech-industry-guidance-us-may-resort-to-weakening-encryption.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=256098 False Guideline None None Network World - Magazine Info TSA: Keep grandma\'s gravy at home but the turducken can fly 26 of the craziest and scariest things the TSA has found on travelers+Gravy as well as cranberry sauce for that matter fall under the sometimes mysterious “Liquid Rules” which basically states that you're “allowed to take as many 3.4 ounce or smaller sized containers that will fit in one sealed, clear, quart-sized zip-top bag – and one bag per person. Make sure you take the zip-top bag out of your carry-on prior to sending it through the X-ray.”To read this article in full or to leave a comment, please click here]]> 2016-11-17T12:56:00+00:00 http://www.networkworld.com/article/3142139/security/tsa-keep-grandma-s-gravy-at-home-but-the-turducken-can-fly.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=256099 False None None None Network World - Magazine Info IoT gear will need better security to win a Z-Wave badge Z-Wave Alliance will require all products to include its S2 (Security 2) framework before they can be certified as Z-Wave compliant. S2 is designed to prevent hackers from breaking into IoT devices that are on Z-Wave networks.Home IoT has recently proved to be a dangerous vector for internet-based attacks, such as the one that corralled thousands of IP cameras and other devices into the so-called Mirai botnet that disrupted internet service last month.To read this article in full or to leave a comment, please click here]]> 2016-11-17T10:55:20+00:00 http://www.networkworld.com/article/3142830/internet-of-things/iot-gear-will-need-better-security-to-win-a-z-wave-badge.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=256100 False None None None Network World - Magazine Info Trump remains frighteningly behind in cybersecurity To read this article in full or to leave a comment, please click here]]> 2016-11-17T10:49:00+00:00 http://www.networkworld.com/article/3142824/security/trump-remains-frighteningly-behind-in-cybersecurity.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=256113 False None None None Network World - Magazine Info Cisco sales tick up, CEO Robbins bullish on data center, security, collaboration Cisco CEO Robbins: Wait til you see what's in our innovation pipeline | Cisco CEO: Spin-in technologies aren't dead at Cisco | Cisco/Ericsson: Assessing the mega-deal a year later Asked by analysts if this was a byproduct of macroeconomic trends or a product portfolio issue, Kramer chalked it up to the former, saying the company is confident of its portfolio and expects sales to pick up when spending increases.To read this article in full or to leave a comment, please click here]]> 2016-11-17T08:14:00+00:00 http://www.networkworld.com/article/3142704/cisco-subnet/cisco-sales-tick-up-ceo-robbins-bullish-on-data-center-security-collaboration.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=256114 False None None None Network World - Magazine Info 7 cybersecurity best practices that regulated industries deal with Image by ThinkstockWhether you work for an organization controlled by compliance standards or you are an independent IT firm looking to build your enterprise business, understanding industry regulations is crucial as it pertains to cybersecurity. Michael Hall, CISO, DriveSavers, provides a few best practices for businesses operating in or with regulated industries.To read this article in full or to leave a comment, please click here]]> 2016-11-17T04:57:00+00:00 http://www.networkworld.com/article/3142582/security/7-cybersecurity-best-practices-that-regulated-industries-deal-with.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=255787 False None None None Network World - Magazine Info Report: Surveillance cameras most dangerous IoT devices in enterprise a new report by Zscaler."I would consider the entire video camera category as particularly dangerous," said Deepen Desai, director of security research at Zscaler.Take, for example, the Flir FX wireless HD monitoring camera.Researchers found that the camera communicated with the parent company in plain text and without authentication tokens.To read this article in full or to leave a comment, please click here]]> 2016-11-17T04:56:00+00:00 http://www.networkworld.com/article/3142675/internet-of-things/report-surveillance-cameras-most-dangerous-iot-devices-in-enterprise.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=255788 False None None None Network World - Magazine Info ISPs ordered to block LinkedIn in Russia MORE ON NETWORK WORLD: 6 simple tricks for protecting your passwords Roskomnadzor said it filed suit after LinkedIn failed to respond to two requests for information about its plans for relocating the data to Russia.To read this article in full or to leave a comment, please click here]]> 2016-11-17T04:55:00+00:00 http://www.networkworld.com/article/3142581/internet/isps-ordered-to-block-linkedin-in-russia.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=255789 False None None None Network World - Magazine Info University\'s IT outsourcing could trigger discrimination lawsuit increasingly considering to try and block employers from allegedly replacing their jobs with foreign workers.  In the case of UCSF, the school is dismissing 49 permanent employees from its IT department and contracting the work to outside firms. But in doing so, the school is also getting rid of a diverse staff comprised of Americans from various ethnicities, and replacing them with Indian workers from one of the contractors, the laid-off workers said.To read this article in full or to leave a comment, please click here]]> 2016-11-16T19:03:12+00:00 http://www.networkworld.com/article/3142564/outsourcing/universitys-it-outsourcing-could-trigger-discrimination-lawsuit.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=255292 False None None None Network World - Magazine Info IBM sets up test range to practice fighting nightmare cyber battles safely IBM: Many companies still ill-prepared for cyber attacks+To read this article in full or to leave a comment, please click here]]> 2016-11-16T14:00:00+00:00 http://www.networkworld.com/article/3142408/security/ibm-sets-up-test-range-to-practice-fighting-nightmare-cyber-battles-safely.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=255293 False None None None Network World - Magazine Info Congress members try to grasp enormity of IoT DDoS attacks “Understanding the Role of Connected Devices in Recent Cyber Attacks.” The attacks refer to when insecure IoT devices infected with Mirai malware hammered DNS provider Dyn in October.The hearing included testimony, as well as submitted prepared remarks, from Dale Drew (pdf), CSO and senior vice president of Level 3 Communications; crypto and privacy guru Bruce Schneier (pdf); and Dr. Kevin Fu (pdf), who helped shock the world years ago by saying pacemakers and implantable cardiac defibrillators were vulnerable to hackers. You can read the experts' testimonies for specific concerns and suggestions, but this is primarily based on paraphrased commentary during the hearing.To read this article in full or to leave a comment, please click here]]> 2016-11-16T11:47:00+00:00 http://www.networkworld.com/article/3142315/security/experts-blow-the-minds-of-energy-and-commerce-committee-over-iot-based-ddos-attacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=255294 False None None None Network World - Magazine Info IBM: Many companies still ill-prepared for cyber attacks Cisco: Potent ransomware is targeting the enterprise at a scary rate+According to Ponemon, for the second straight year the Cyber Resilient Organization study showed that incident response challenges are hindering what the researchers called cyber resilience or what they define as the as “the alignment of prevention, detection, and response capabilities to manage, mitigate, and move on from cyberattacks.”To read this article in full or to leave a comment, please click here]]> 2016-11-16T11:25:00+00:00 http://www.networkworld.com/article/3142316/security/ibm-many-companies-still-ill-prepared-for-cyber-attacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=255295 False None None None Network World - Magazine Info US lawmakers balk at call for IoT security regulations denial-of-service attack aided by IoT devices in October "was benign" because a couple of websites crashed, said Bruce Schneier, a veteran cybersecurity researcher and lecturer at Harvard University. But the next attack may be more dangerous.With cars, airplanes, thermostats, and appliances now connected to the internet, "there's real risk to life and property, real catastrophic risk," Schneier told two House of Representatives subcommittees Wednesday.To read this article in full or to leave a comment, please click here]]> 2016-11-16T09:03:30+00:00 http://www.networkworld.com/article/3142350/security/us-lawmakers-balk-at-call-for-iot-security-regulations.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=255308 False None None None Network World - Magazine Info Cybersecurity fabric vs. a security platform: Fabric wins INSIDER: 5 ways to prepare for Internet of Things security threats Securing organizations used to be straight forward: Put up a big, expensive firewall at the sole ingress/egress point, and all was good. Today there are dozens or even hundreds of entry points created from an increase in the use of cloud services, mobile workers and consumer devices. Security must now be applied at the perimeter, but also in the data center, campus, cloud, branch offices and anywhere else the business might have assets or people.To read this article in full or to leave a comment, please click here]]> 2016-11-16T08:40:00+00:00 http://www.networkworld.com/article/3141919/security/cybersecurity-fabric-vs-a-security-platform-fabric-wins.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=255309 False None None None Network World - Magazine Info SWIFT has not seen its last \'bank robbery\' The Society for Worldwide Interbank Financial Telecommunications, which the industry refers to as the SWIFT co-op maintains this system.CSO looks at the SWIFT co-op's denial of the real issue, the cost of attacks, informed expert insights into these security flaws, how hackers are using and abusing these to their profit, and what the co-op should do to seal its messaging system to mitigate further falsifications.To read this article in full or to leave a comment, please click here]]> 2016-11-16T07:46:00+00:00 http://www.networkworld.com/article/3142348/malware-cybercrime/swift-has-not-seen-its-last-bank-robbery.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=255310 False Guideline None None Network World - Magazine Info Cisco Founders Forum: One creative way to keep & energize talent Cisco Matt Cutler, Lead Evangelist for Cisco Cloud Collaboration Technologies, has big ideas on ideation.To read this article in full or to leave a comment, please click here]]> 2016-11-16T07:38:00+00:00 http://www.networkworld.com/article/3141654/leadership-management/cisco-founders-forum-one-creative-way-to-keep-energize-talent.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=255311 False Guideline None None Network World - Magazine Info Is critical infrastructure the next DDoS target? (DDoS) attack last month on Dyn, the New Hampshire-based Domain Name System (DNS) provider, was mostly an inconvenience.While it took down a portion of the internet for several hours, disrupted dozens of major websites and made national news, nobody died. Nobody even got hurt, other than financially.But the attack, enabled by a botnet of millions of Internet of Things (IoT) devices, inevitably led to speculation on what damage a DDoS of that scale or worse could do to even a portion of the nation's critical infrastructure (CI).To read this article in full or to leave a comment, please click here]]> 2016-11-16T05:22:00+00:00 http://www.networkworld.com/article/3142308/security/is-critical-infrastructure-the-next-ddos-target.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=254991 False None None None Network World - Magazine Info Welcome to the 11th Gibbs Golden Turkey Awards Image by Mark Gibbs / psdblast.comWelcome, once again, to the Gibbs Golden Turkey Awards. It's been a few years since our last effort to point the digit of disdain at those individuals, companies or entities that don't, won't or can't come to grips with reality, maturity, ethical behavior and/or social responsibility because of their blindness, self-imposed ignorance, thinly veiled political agenda, rapaciousness and greed, or their blatant desire to return us to the Dark Ages. Or all of those sins combined. But that lapse aside, with loins girded anew with cheap girders, we undertake again the traditional annual roasting of those who deserve a damn good basting. Without further ado, here in reverse order, are the top 10 Golden Turkeys for 2016 …To read this article in full or to leave a comment, please click here]]> 2016-11-16T02:45:00+00:00 http://www.networkworld.com/article/3141576/security/welcome-to-the-11th-gibbs-golden-turkey-awards.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=254992 False None None None Network World - Magazine Info Akamai: Look for IoT devices to attack during Thanksgiving, Christmas State of the Internet/Security Report, the company says certain types of DDoS attacks are on the rise compared to the third quarter last year, both in size and number. That doesn't bode well for users of the internet starting next week.“Thanksgiving, Christmas, and the holiday season in general have long been characterized by a rise in the threat of DDoS attacks,” the report says. “Malicious actors have new tools - IoT botnets - that will almost certainly be used in the coming quarter.”To read this article in full or to leave a comment, please click here]]> 2016-11-15T15:20:00+00:00 http://www.networkworld.com/article/3141579/security/akamai-look-for-iot-devices-to-attack-during-thanksgiving-christmas.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=254455 False None None None Network World - Magazine Info Planetary scientists push for unique asteroid deflection mission How to protect Earth from asteroid destruction+Proponents are trying to garner worldwide support for the mission pointing to the European Space Administration ministerial conference in Luzern next month where the decision will be made whether or not to fund the ESA's Asteroid Impact Mission (AIM). AIM is part of an over-arching collaborative effort with NASA known as theAsteroid Impact and Deflection Assessment (AIDA) mission.To read this article in full or to leave a comment, please click here]]> 2016-11-15T14:30:00+00:00 http://www.networkworld.com/article/3141578/security/planetary-scientists-push-for-unique-asteroid-deflection-mission.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=254456 False None None None Network World - Magazine Info Super Mari-owned: Startling Nintendo-based vulnerability discovered in Ubuntu Cool Yule Tools 2016: Digital disruption at Santa's Workshop + Android deems Instagram worthy of its presenceTo read this article in full or to leave a comment, please click here]]> 2016-11-15T11:05:00+00:00 http://www.networkworld.com/article/3141940/open-source-tools/super-mari-owned-startling-nintendo-based-vulnerability-discovered-in-ubuntu.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=254457 False None None None Network World - Magazine Info Netgear\'s Arlo Go camera makes security more mobile To read this article in full or to leave a comment, please click here]]> 2016-11-15T10:30:00+00:00 http://www.networkworld.com/article/3141649/security/netgears-arlo-go-camera-makes-security-more-mobile.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=254458 False None None None Network World - Magazine Info IDG Contributor Network: 2017 breach predictions: The big one is inevitable Last year, I offered up a number of predictions, but the one continuing to make huge waves in 2017 is around data integrity attacks. Quite simply, I expect that we'll see more intricate, complex and undetected data integrity attacks and for two main reasons: financial gain and/or political manipulation.To read this article in full or to leave a comment, please click here]]> 2016-11-15T08:34:00+00:00 http://www.networkworld.com/article/3141468/security/2017-breach-predictions-the-big-one-is-inevitable.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=254471 False None None None Network World - Magazine Info Goodbye, NAC. Hello, software-defined perimeter To read this article in full or to leave a comment, please click here]]> 2016-11-15T07:50:00+00:00 http://www.networkworld.com/article/3141930/security/goodbye-nac-hello-software-defined-perimeter-sdp.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=254472 False None APT 15 None Network World - Magazine Info Half of banking customers now using fintech How 3 fintech startups are shaking up security ]To read this article in full or to leave a comment, please click here]]> 2016-11-15T07:06:00+00:00 http://www.networkworld.com/article/3141990/techology-business/half-of-banking-customers-now-using-fintech.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=254473 False None None None Network World - Magazine Info IDG Contributor Network: Synack delivers crowdsourced security for government, snags IRS contract Synack, a crowdsourced cybersecurity vendor, told me it secured a contract with the IRS, I was intrigued.+ Also on Network World: How the government can help businesses fight cyber attacks + First, a little bit about what Synack does: The company is following something of an ongoing trend in the security space in that it wrangles a bunch of “ethical hackers” to essentially try and break a client's IT systems. The idea being that those hackers can ply their trade, but instead of intruding onto organizations' IT systems out of malice, they can do so as a service (and, it must be added, for a payment). Founded in 2013 by former NSA security experts Jay Kaplan, CEO, and Dr. Mark Kuhr, CTO, Synack feels very similar to HackerOne, a company now headed by Marten Mickos of MySQL fame.To read this article in full or to leave a comment, please click here]]> 2016-11-15T06:00:00+00:00 http://www.networkworld.com/article/3140715/security/synack-delivers-crowdsourced-security-for-government-snags-irs-contract.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=254474 False None None None Network World - Magazine Info How automated investigation can accelerate threat detection Image by ThinkstockCyber‫ security analysts are overwhelmed with the pressure of keeping their companies safe. Not only do they need to filter through countless alerts, many of which turn out to be false positives, but also the volume of real threats is growing exponentially. They quickly need to triage and move on, stopping the most pressing threats – but not always the most dangerous. Cyber analysts need a new, holistic approach to threat detection that monitors, analyzes and cross-references data across multiple dimensions to help them detect complex threats as early as possible.To read this article in full or to leave a comment, please click here]]> 2016-11-15T05:01:00+00:00 http://www.networkworld.com/article/3141588/security/how-automated-investigation-can-accelerate-threat-detection.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=254042 False None None None Network World - Magazine Info Security analysis of popular IoT devices researchers at Zscaler analyzed IoT traffic patterns not only on the days of the DDoS attacks on Dyn and Krebs on Security, but going back to July.While Zscaler does not believe any of the devices connected to Zscaler Cloud had been compromised and used in the IoT botnet attacks, ThreatLabz researchers analyzed the security of five security cameras, three smart TV entertainment devices, three smart network printers and scanners, two DVRs and NVRs, two IP phones and a partridge in a pear tree. The last one of course was just to see if you were paying attention: no partridges were harmed in the course of this research.To read this article in full or to leave a comment, please click here]]> 2016-11-15T04:45:00+00:00 http://www.networkworld.com/article/3140590/security/security-analysis-of-popular-iot-devices.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=254043 False None None None Network World - Magazine Info IDG Contributor Network: What is the General Data Protection Regulation and why should you care? General Data Protection Regulation (GDPR) introduces several major changes that will impact many organizations worldwide. The smart move is to familiarize yourself with the incoming regulation now, and begin preparing to comply with your obligations. The GDPR will apply to any business that operates within the EU, but also any company that processes data from EU citizens. It doesn't matter where the organization is located.To read this article in full or to leave a comment, please click here]]> 2016-11-15T04:30:00+00:00 http://www.networkworld.com/article/3140459/compliance/what-is-the-general-data-protection-regulation-and-why-should-you-care.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=254044 False None None None Network World - Magazine Info This malware attack starts with a fake customer-service call Carbanak gang, a group that was blamed last year for stealing as much as $1 billion from various banks. On Monday, security firm Trustwave said that three of its clients in the past month had encountered malware built with coding found in previous Carbanak attacks.To read this article in full or to leave a comment, please click here]]> 2016-11-14T16:13:52+00:00 http://www.networkworld.com/article/3141724/security/this-malware-attack-starts-with-a-fake-customer-service-call.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=253512 False None None None Network World - Magazine Info 12 steps to lower your espionage risk Computer Security Fundamentals. It's not showy, often low-tech and sometimes downright dirty, as exemplified by Oracle CEO Larry Ellison's admission that he "hire[d] private investigators to sift through Microsoft garbage in an attempt to garner information."To read this article in full or to leave a comment, please click here]]> 2016-11-14T12:23:00+00:00 http://www.networkworld.com/article/3140462/security/12-steps-to-lower-your-espionage-risk.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=253513 False None None None Network World - Magazine Info UK approves extradition of British hacker to the US To read this article in full or to leave a comment, please click here]]> 2016-11-14T12:00:00+00:00 http://www.networkworld.com/article/3140591/security/uk-approves-extradition-of-british-hacker-to-the-us.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=253514 False None None None Network World - Magazine Info Your security mirages I was hit last week. Forensics are in progress. I got doxxed, too.It has made me realize that most of systems security is an illusion. Here are my favorite alternate realities:1. Everything is safe behind the firewall.Ever heard of UBFWI-as in User's Been Fooling With It? While IPD/IPS and firewall networked-technology has improved so vastly, there's nothing like a user with an infected laptop to bring in a lulu.2. Obscure operating systems never get hit. Hackers only go for the gold with Windows.Here, let me laugh out loud and roll on the floor. Mine was an obscure server version on an obscure branch of an obscure BSD limb. Listen to the sound of lunch getting eaten: mine. Chomp, chomp, burp.To read this article in full or to leave a comment, please click here]]> 2016-11-14T11:12:00+00:00 http://www.networkworld.com/article/3141431/security/your-security-mirages.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=253515 False None APT 15 None Network World - Magazine Info Kaspersky: Windows-bundled Defender is anticompetitive, Russia opens antitrust probe case against Microsoft for “abusing dominance.”Microsoft claimed to have a “long history of cooperation” with Kaspersky and that it is “committed to work in full compliance with Russian law.”Yet, Russia has already decided to block Microsoft-owned LinkedIn, since the law requires Russian citizens' personal data to be stored on servers within its country. In the past, Microsoft made LinkedIn censorship changes to cater to China, as opposed to being blocked like Google and Facebook. It remains to be seen if Microsoft will localize Russian users' data as the country's law demands. The New York Times added that it was unclear why LinkedIn was targeted, “rather than any other major social networking site,” but that is a “sign of growing tensions for American tech companies operating” in Russia.To read this article in full or to leave a comment, please click here]]> 2016-11-14T09:47:00+00:00 http://www.networkworld.com/article/3141387/security/kaspersky-windows-bundled-defender-is-anti-competitive-russia-opens-antitrust-probe.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=253528 False None None None Network World - Magazine Info 37% of IT pros to look for new jobs in 2017 2017 Tech Career Outlook. The most frequently cited reasons are: to advance my IT skills (cited by 69%); to get a more competitive salary (64%); to work at a company that makes IT more of a priority (40%); I'm burnt out at my current job (40%); to find a better work-life balance (38%); to get better benefits (401k, healthcare) (33%); to work with a more talented IT team (26%); to get better work-from-home options (24%); to get a better job title (22%).To read this article in full or to leave a comment, please click here]]> 2016-11-14T08:00:00+00:00 http://www.networkworld.com/article/3141329/careers/37-of-it-pros-to-look-for-new-jobs-in-2017.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=253529 False None None None Network World - Magazine Info Blockchain adoption in banks coming, but slower than expected two years to run blockchain in production due to regulatory hurdles, a lack of standards and other stumbling blocks. “This is real, this will come but in a very regulated environment. We will go through a lot of validation,” says Bussmann, who jumpstarted blockchain efforts when he was leading IT at the Swiss bank last year.To read this article in full or to leave a comment, please click here]]> 2016-11-14T07:55:00+00:00 http://www.networkworld.com/article/3141301/techology-business/blockchain-adoption-in-banks-coming-but-slower-than-expected.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=253530 False Guideline None None Network World - Magazine Info DoS technique lets a single laptop take down an enterprise firewall To read this article in full or to leave a comment, please click here]]> 2016-11-14T07:32:31+00:00 http://www.networkworld.com/article/3141325/security/dos-technique-lets-a-single-laptop-take-down-an-enterprise-firewall.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=253531 False None None None Network World - Magazine Info Security Sessions: How to prepare for a data breach 2016-11-14T06:01:00+00:00 http://www.networkworld.com/video/70055/security-sessions-how-to-prepare-for-a-data-breach#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=253532 False None None None Network World - Magazine Info New products of the week 11.14.16 Our roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.NetCrunch 9.3adremKey features: Version 9.3 of the NetCrunch network monitoring system introduces an overhauled GUI, live up/down traffic on physical segments, new views for smaller networks, and integration with JIRA, ConnectWise and more. More info.To read this article in full or to leave a comment, please click here]]> 2016-11-14T05:00:00+00:00 http://www.networkworld.com/article/3138973/mobile-wireless/new-products-of-the-week-11-14-16.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=253260 False None None None Network World - Magazine Info 412 million FriendFinder Network accounts said to be exposed in hack LeakedSource said Sunday.Other network sites that had user accounts exposed were cams.com with 62.6 million exposed, penthouse.com with 7 million, stripshow.com with 1.4 million, icams.com with about 1 million and an unidentified website adding 35,372 users whose accounts were exposed.To read this article in full or to leave a comment, please click here]]> 2016-11-13T21:51:40+00:00 http://www.networkworld.com/article/3140716/security/412-million-friendfinder-network-accounts-said-to-be-exposed-in-hack.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=252795 False None None None Network World - Magazine Info BlackNurse attack: 1 laptop can DoS some firewalls, bring down big servers BlackNurse” attack to bring vulnerable Cisco, SonicWall, Palo Alto and Zyxel firewalls to their knees.Danish researchers at the Security Operations Center of telecom operator TDC described BlackNurse as a low bandwidth Internet Control Message Protocol (ICMP) attack that “is capable of doing a denial of service to well-known firewalls.”In their report (pdf), the researchers wrote:To read this article in full or to leave a comment, please click here]]> 2016-11-13T08:25:00+00:00 http://www.networkworld.com/article/3140925/security/blacknurse-attack-1-laptop-can-dos-some-firewalls-bring-down-big-servers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=252796 False None None None Network World - Magazine Info Election Data Models Lesson for Cybersecurity fivethirtyeight.com, the New York Times, Princeton, etc.  The lowest percentage gave Mrs. Clinton roughly a 65% chance of winning on November 8. So, what happened?  Every database jockey recognizes the old maxim of garbage in/garbage out.  In other words, killer algorithms and all the processing power in the world are rather useless if your model is built on the back of crappy data.  Obviously, all the brainiacs building these models made a critical mistake in not gathering data from disenfranchised white voters in rural areas.  The result?  A stunning election result and lots of eggs on ivy league elitist faces.To read this article in full or to leave a comment, please click here]]> 2016-11-11T07:15:00+00:00 http://www.networkworld.com/article/3138974/security/election-data-models-lesson-for-cybersecurity.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=252797 False None None None Network World - Magazine Info Ethernet consortia trio want to unlock a more time-sensitive network IEEE sets new Ethernet standard that brings 5X the speed without disruptive cable changes+To read this article in full or to leave a comment, please click here]]> 2016-11-10T14:05:00+00:00 http://www.networkworld.com/article/3140749/lan-wan/ethernet-consortia-trio-want-to-unlock-a-more-time-sensitive-network.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=251915 False None None None Network World - Magazine Info Suspected Russian hackers target US think tanks after election responsible for hacking the Democratic National Committee and is allegedly tied to the Russian government.To read this article in full or to leave a comment, please click here]]> 2016-11-10T11:46:16+00:00 http://www.networkworld.com/article/3139403/security/suspected-russian-hackers-target-us-think-tanks-after-election.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=251916 False None APT 29 None Network World - Magazine Info Google punishes web backsliders in Chrome To read this article in full or to leave a comment, please click here]]> 2016-11-10T11:03:00+00:00 http://www.networkworld.com/article/3138891/internet/google-punishes-web-backsliders-in-chrome.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=251917 False None APT 19 None Network World - Magazine Info How to maintain data and document security with a mobile workforce Image by ThinkstockData and document security with today's mobile workforce can be a difficult challenge. This is not a “one-size-fits-all” problem; one needs to weigh the risks to ensure that you are operating within a tolerable risk level or the opposite in which you put significant controls around devices, hamper productivity for no benefit. Take a pragmatic approach – you want the ability to clearly and justly answer the organization's question of, “Why is this security measure necessary?” As security leaders, we want to allow your teams to move as fast as possible and not deploy a policy or technology because someone touts it as the best way to do something. Security vendor Conga provides these tips for that healthy balance.To read this article in full or to leave a comment, please click here]]> 2016-11-10T11:00:00+00:00 http://www.networkworld.com/article/3139336/mobile-security/how-to-maintain-data-and-document-security-with-a-mobile-workforce.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=251918 False Guideline None None Network World - Magazine Info Hacker shows how easy it is to take over a city\'s public Wi-Fi network To read this article in full or to leave a comment, please click here]]> 2016-11-10T09:37:12+00:00 http://www.networkworld.com/article/3140624/security/hacker-shows-how-easy-it-is-to-take-over-a-citys-public-wi-fi-network.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=251931 False None None None Network World - Magazine Info Tech groups push policy priorities for the Trump administration long list of infrastructure projects he hopes to fund. Other infrastructure projects on Trump's list include roads, bridges, tunnels, airports, railroads, ports, pipelines, and the electricity grid, and it's unclear how he plans to pay for the plan, given that Trump also has promised large tax cuts, and whether telecommunications networks would be a priority. To read this article in full or to leave a comment, please click here]]> 2016-11-10T08:41:33+00:00 http://www.networkworld.com/article/3140606/techology-business/tech-groups-push-policy-priorities-for-the-trump-administration.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=251932 False None None None Network World - Magazine Info European Parliament clears drone regulations for takeoff a calculator developed by the Dropped Object Prevention Scheme, which promotes safety in the oil and gas industry.To read this article in full or to leave a comment, please click here]]> 2016-11-10T07:25:55+00:00 http://www.networkworld.com/article/3140055/security/european-parliament-clears-drone-regulations-for-takeoff.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=251933 False Guideline None None Network World - Magazine Info Cisco/Ericsson: Assessing the mega-deal a year later Cisco CEO Robbins: Wait til you see what's in our innovation pipeline+To read this article in full or to leave a comment, please click here]]> 2016-11-10T05:58:00+00:00 http://www.networkworld.com/article/3140236/data-center/cisco-ericsson-assessing-the-mega-deal-a-year-later.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=251625 False None None None Network World - Magazine Info Need for \'smart\' regulation of IoT security is as obvious as is it unlikely writes of the growing IoT threat: It's a form of invisible pollution. … And, like pollution, the only solution is to regulate. The government could impose minimum security standards on IoT manufacturers, forcing them to make their devices secure even though their customers don't care. They could impose liabilities on manufacturers, allowing companies like Dyn to sue them if their devices are used in DDoS attacks. The details would need to be carefully scoped, but either of these options would raise the cost of insecurity and give companies incentives to spend money making their devices secure. …To read this article in full or to leave a comment, please click here]]> 2016-11-10T05:44:00+00:00 http://www.networkworld.com/article/3140155/internet-of-things/need-for-smart-regulation-of-iot-security-is-as-obvious-as-is-it-unlikely.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=251626 False None None None Network World - Magazine Info IDG Contributor Network: Major cloud is infested with malware, researchers say Georgia Tech writes in an article on its website. The problem being that the resulting malware is quick to “assemble from stored components that individually may not appear to be malicious.”To read this article in full or to leave a comment, please click here]]> 2016-11-10T04:00:00+00:00 http://www.networkworld.com/article/3137260/security/major-cloud-is-infested-with-malware-researchers-say.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=251627 False Guideline None None Network World - Magazine Info Down the rabbit hole, part 5: Secure and private instant messaging ongoing quest to make my life as secure and private as possible, I've found three instant messaging networks that are worth talking about. They're not perfect, but they are significant improvements over using the many, astoundingly insecure platforms out there (such as Google's Hangouts or Apple's iMessage). Let's go over those here, with their benefits and pitfalls. To read this article in full or to leave a comment, please click here]]> 2016-11-10T03:30:00+00:00 http://www.networkworld.com/article/3140014/open-source-tools/down-the-rabbit-hole-part-5-secure-and-private-instant-messaging.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=251628 False None None None Network World - Magazine Info Yahoo investigating if insiders knew of hack said in a regulatory filing to the U.S. Securities and Exchange Commission. Yahoo said it would “analyze and investigate the hacker's claim.” It isn't clear if this data is from the 2014 hack or from another breach.To read this article in full or to leave a comment, please click here]]> 2016-11-09T20:41:36+00:00 http://www.networkworld.com/article/3140444/security/yahoo-investigating-if-insiders-knew-of-hack.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=251041 False None Yahoo None Network World - Magazine Info Worries and uncertainty cloud outlook for digital privacy under President Trump showed support for the NSA's bulk telephone data collection, which ended last year. “I err on the side of security,” he said at the time. And on Apple's refusal to provide the FBI access to an iPhone used by the San Bernardino shooter: the public should boycott the company until it complies, he said.To read this article in full or to leave a comment, please click here]]> 2016-11-09T16:37:00+00:00 http://www.networkworld.com/article/3140181/security/worries-and-uncertainty-cloud-outlook-for-digital-privacy-under-president-trump.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=251042 False None None None Network World - Magazine Info President Trump: An uncertain future for tech industry, digital rights largely a blank canvas, and when he's dipped his toe into IT issues, he's made people nervous. Trump's campaign was dominated by debates over illegal immigration, lost manufacturing jobs, and character issues. Silicon Valley firms largely opposed Trump, and one of his signature issues, rewriting free trade deals between the U.S. and other nations, likely will hurt U.S tech companies' ability to sell products overseas. Meanwhile, digital rights groups say they expect Trump to call for expanded government surveillance programs to fight terrorism and fewer protections for privacy. And a Trump administration will likely work to gut net neutrality rules that the Federal Communications Commission passed only last year, although repealing the rules won't be easy.To read this article in full or to leave a comment, please click here]]> 2016-11-09T13:07:14+00:00 http://www.networkworld.com/article/3140189/techology-business/president-trump-an-uncertain-future-for-tech-industry-digital-rights.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=251043 False None None None Network World - Magazine Info Ransomware hammers Madison County, Indiana told WTHR, “It's like when I came on in the 80s - we're doing everything with pencil and paper.”“We cannot query old information to bring up prior reports or prior court records,” Madison County Sheriff Scott Mellinger told Fox59. “If we want to bring somebody's record up for something in the future, let's say for somebody that has been arrested or somebody who is even in jail then we cannot look up information that would help us at a hearing. On the sheriff's office side, we cannot book people into jail using the computers. We are using pencil and paper like the old days.”To read this article in full or to leave a comment, please click here]]> 2016-11-09T11:23:00+00:00 http://www.networkworld.com/article/3139975/security/ransomware-hammers-madison-county-indiana.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=251044 False None None None Network World - Magazine Info IBM package brings Watson smarts to everything IoT Watson cognitive intelligence features in all manner of IoT systems from robots and drones to sensors and avatars.IBM says the platform, called Project Intu lets Project Intu offers developers easily build cognitive or basically machine learning skills into a wide variety of operating systems – from Raspberry PI to MacOS, Windows to Linux devices. Devices using Intu can “interact more naturally with users, triggering different emotions and behaviors and creating more meaningful and immersive experience for users.  Developers can simplify and integrate Watson services, such as Conversation, speech-to-text, Language and Visual Recognition, with the capabilities of the “device” to, in essence, act out the interaction with the user,” IBM stated.To read this article in full or to leave a comment, please click here]]> 2016-11-09T08:43:00+00:00 http://www.networkworld.com/article/3139970/security/ibm-package-brings-watson-smarts-to-everything-iot.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=251057 False None None None Network World - Magazine Info The scary state of the cybersecurity profession Recruiting and retaining cybersecurity talent + Since these folks protect all our digital assets daily, it's only natural that we'd be curious as to how they are doing. To measure these feelings, ESG teamed up with the Information Systems Security Association (ISSA) and conducted a survey of 437 global cybersecurity professionals. This project resulted in a recently published research report. To read this article in full or to leave a comment, please click here]]> 2016-11-09T07:48:00+00:00 http://www.networkworld.com/article/3140170/security/the-scary-state-of-the-cybersecurity-profession.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=251058 False None None None Network World - Magazine Info Los Angeles: Warm weather, movie stars -- and 100 million monthly cyber attacks To read this article in full or to leave a comment, please click here]]> 2016-11-09T05:01:00+00:00 http://www.networkworld.com/article/3140148/security/los-angeles-warm-weather-movie-stars-and-100-million-monthly-cyber-attacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=250695 False None None None Network World - Magazine Info Robots present a cyber risk ransomware attack targeted at robotic assemblers in a plant in Mexico.” In that case, the ransomware locked up the specifications files from which the robots drew their operating parameters, he says.To read this article in full or to leave a comment, please click here]]> 2016-11-09T04:59:00+00:00 http://www.networkworld.com/article/3139879/security/robots-present-a-cyber-risk.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=250696 False None None None Network World - Magazine Info There\'s a war on for cybersecurity talent Phishing scheme crimps El Paso for $3.2 million+To read this article in full or to leave a comment, please click here]]> 2016-11-09T04:49:00+00:00 http://www.networkworld.com/article/3140167/security/there-s-a-war-on-for-cybersecurity-talent.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=250697 False None None None Network World - Magazine Info Microsoft patches 68 vulnerabilities, two actively exploited ones 14 security bulletins, one dedicated to Adobe Flash Player which is upgraded through Windows Update in Windows 10 and 8.1. Six of the bulletins are rated critical and eight are rated important.Administrators should prioritize the Windows patches in the MS16-135 bulletin, because they address a zero-day vulnerability that's already being exploited by a group of attackers known in the security industry as Fancy Bear, APT28 or Strontium.To read this article in full or to leave a comment, please click here]]> 2016-11-08T15:59:18+00:00 http://www.networkworld.com/article/3139894/security/microsoft-patches-68-vulnerabilities-two-actively-exploited-ones.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=250092 False None APT 28 None Network World - Magazine Info Microsoft fixes Windows flaw that Google divulged one of several security updates -- 14 to be exact -- Microsoft fixed the bug in the Windows kernel drivers that Google security engineers had revealed on Oct. 31, 10 days after notifying Microsoft of the vulnerability.Microsoft credited Neel Mehta and Billy Leonard of Google's Threat Analysis Group for reporting the flaw. Last week, the two said that because the vulnerability was being actively exploited, a disclose-within-seven-days policy applied.To read this article in full or to leave a comment, please click here]]> 2016-11-08T13:52:00+00:00 http://www.networkworld.com/article/3138041/computers/microsoft-fixes-windows-flaw-that-google-divulged.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=250093 False None None None Network World - Magazine Info Competing hackers dampen the power of Mirai botnets attack in the U.S. appears to be losing its potency. Ironically, hackers are to blame for diluting its power.  The malware known as Mirai -- which is now available on the internet -- has become a bit too popular in the hacking community, according to security firm Flashpoint.Competing hackers have all been trying to take advantage of Mirai to launch new DDoS attacks. To do so, that means infecting the poorly secured internet-connected devices, such as surveillance cameras, baby monitors, and DVRs, that the malware was designed to exploit.To read this article in full or to leave a comment, please click here]]> 2016-11-08T13:46:15+00:00 http://www.networkworld.com/article/3138037/security/competing-hackers-dampen-the-power-of-mirai-botnets.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=250094 False None None None Network World - Magazine Info Nov 2016 Patch Tuesday: Microsoft released 14 security updates, 6 rated critical 14 security updates on Election Day Patch Tuesday, six of which are rated critical, the Microsoft Security Response Center responded to requests for better access to security update information; Microsoft's solution was to release a preview of its new Security Update Guide, “a single destination for security vulnerability information.”MSRC added, “Instead of publishing bulletins to describe related vulnerabilities, the new portal lets our customers view and search security vulnerability information in a single online database.”To read this article in full or to leave a comment, please click here]]> 2016-11-08T11:54:00+00:00 http://www.networkworld.com/article/3139911/security/nov-2016-patch-tuesday-microsoft-released-14-security-updates-6-rated-critical.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=250095 False None None None Network World - Magazine Info Adobe fixes flaws in Flash Player and Adobe Connect To read this article in full or to leave a comment, please click here]]> 2016-11-08T09:32:25+00:00 http://www.networkworld.com/article/3139904/security/adobe-fixes-flaws-in-flash-player-and-adobe-connect.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=250108 False None None None Network World - Magazine Info Carnegie Mellon researchers visualize way to fend off DDoS attacks the massive DDoS attack that last month that targeted DNS provider Dyn and temporarily knocked Twitter, Netflix and other big names off the Internet, we were bombarded with pitches from vendors begging to offer their expert opinions on the matter while extolling the virtues of their solutions that naturally would have safeguarded organizations.Now, a couple of weeks later, Carnegie Mellon's CyLab Security and Privacy Institute too is touting research that it says shows that the tools really needed to stymie such attacks are on the way. Somehow, this seems more believable than some of the all-to-eager vendor claims, though it doesn't appear the tools will quite be ready to fly for imminent DDoS attack candidates, such as 2016 U.S. Presidential Election-related sites and Black Friday 2016 websites.To read this article in full or to leave a comment, please click here]]> 2016-11-08T08:25:00+00:00 http://www.networkworld.com/article/3137255/security/carnegie-mellon-researchers-visualize-way-to-fend-off-ddos-attacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=250109 False None None None Network World - Magazine Info Android patches fix Drammer RAM attack, but not Dirty Cow exploit To read this article in full or to leave a comment, please click here]]> 2016-11-08T06:46:40+00:00 http://www.networkworld.com/article/3139537/security/android-patches-fix-drammer-ram-attack-but-not-dirty-cow-exploit.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=250110 False Guideline None None Network World - Magazine Info French plan for biometric database of 60 million people sparks outcry To read this article in full or to leave a comment, please click here]]> 2016-11-08T05:51:31+00:00 http://www.networkworld.com/article/3139457/security/french-plan-for-biometric-database-of-60-million-people-sparks-outcry.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=249777 False None None None Network World - Magazine Info Make your emails more trusted with DKIM DKIM -- that tries to mitigate some of the risk of trusting that emails are actually from who they say they are from. Strangely, though, this technology has not made its way into Microsoft Exchange. In this piece, I want to open the curtains on DomainKeys and DKIM, show how they work and why what they do is important, and then demonstrate how to use a free utility to set up DKIM on your on-premises Exchange servers.To read this article in full or to leave a comment, please click here]]> 2016-11-08T04:50:00+00:00 http://www.networkworld.com/article/3138542/security/make-your-emails-more-trusted-with-dkim.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=249778 False None None None Network World - Magazine Info AI makes security systems more flexible To read this article in full or to leave a comment, please click here]]> 2016-11-08T04:46:00+00:00 http://www.networkworld.com/article/3137249/network-security/ai-makes-security-systems-more-flexible.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=249779 False None None None Network World - Magazine Info 7 steps to start a bug bounty program Image by ThinkstockVulnerability assessment and identification strategies have evolved to include the concept of crowd sourced security testing through bug bounty programs. While bug bounty programs have been used for over 20 years, widespread adoption by enterprise organizations has just begun to take off within the last few. The bug bounty path, paved by tech giants, is widening, enabling security teams of all sizes to create and manage robust security assessment programs, get ahead of adversaries, and level the cybersecurity playing field. As we are clearly still in the early- to mid-adopter phase of this new market, Paul Ross, senior vice preside of marketing at Bugcrowd, breaks down how to get started with a bug bounty program, and how to prepare your organization for this new approach to vulnerability testing.To read this article in full or to leave a comment, please click here]]> 2016-11-08T04:44:00+00:00 http://www.networkworld.com/article/3139530/security/7-steps-to-start-a-bug-bounty-program.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=249780 False None None None Network World - Magazine Info China\'s vague cybersecurity law has foreign businesses guessing adopted on Monday and taking effect next June, it's possible that any major company working in the country might be subject to "security reviews" from the Chinese government. Any company involved in telecommunications, information services, finance or any sector "where the loss of data can harm the country's security" is subject to a possible review. But what these security reviews actually entail isn't clear in the law.To read this article in full or to leave a comment, please click here]]> 2016-11-07T17:52:30+00:00 http://www.networkworld.com/article/3139516/security/chinas-vague-cybersecurity-law-has-foreign-businesses-guessing.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=249227 False None None None Network World - Magazine Info Carriers are going virtual to give enterprises more freedom AT&T, Verizon and other operators that are selling or developing such programs. Easy Go Network is available as a month-to-month subscription and its launch follows a year-long customer trial. Orange Business Services claims more than 3,000 multinational organizations as customers.To read this article in full or to leave a comment, please click here]]> 2016-11-07T14:28:48+00:00 http://www.networkworld.com/article/3139526/networking/carriers-are-going-virtual-to-give-enterprises-more-freedom.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=249228 False None None None Network World - Magazine Info Apple just removed hundreds of fake shopping apps from the App Store New York Times and New York Post, Apple removed hundreds of offenders. But hucksters keep coming back: The Times found that an app called Overstock Inc. was trying to convince shoppers that it was Overstock.com by selling clothes and Ugg boots. Apple killed the app, only to see it return the next day, because sketchy developers are finding new ways to bypass the company's traditionally tough app review process.To read this article in full or to leave a comment, please click here]]> 2016-11-07T13:07:00+00:00 http://www.networkworld.com/article/3139504/ios/apple-just-removed-hundreds-of-fake-shopping-apps-from-the-app-store.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=249229 False None None None Network World - Magazine Info Microsoft postpones Windows anti-exploit tool\'s retirement post to a company blog Nov. 3. "Its effectiveness against modern exploit kits has not been demonstrated, especially in comparison to the many security innovations built into Windows 10."To read this article in full or to leave a comment, please click here]]> 2016-11-07T13:06:00+00:00 http://www.networkworld.com/article/3139333/computers/microsoft-postpones-windows-anti-exploit-tools-retirement.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=249230 False Guideline None None Network World - Magazine Info When DR fails To read this article in full or to leave a comment, please click here]]> 2016-11-07T11:21:00+00:00 http://www.networkworld.com/article/3139388/security/when-dr-fails.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=249243 False None None None Network World - Magazine Info US election day faces specter of cyberattacks hack the U.S. election. The system itself is distributed across the country over thousands of voting jurisdictions, making it hard to tamper with on a wide scale.     But hackers could still attempt to sow chaos on Election Day in other ways. The tools and infrastructure to do so are already in place.To read this article in full or to leave a comment, please click here]]> 2016-11-07T10:01:00+00:00 http://www.networkworld.com/article/3139280/security/us-election-day-faces-specter-of-cyberattacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=249244 False None None None Network World - Magazine Info Hackers can abuse LTE protocols to knock phones off networks To read this article in full or to leave a comment, please click here]]> 2016-11-07T09:58:28+00:00 http://www.networkworld.com/article/3139290/security/hackers-can-abuse-lte-protocols-to-knock-phones-off-networks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=249245 False None None None Network World - Magazine Info IDG Contributor Network: Tesco Bank breach causes 20,000 customers to lose money Tesco Bank, a U.K.-based bank owned by the Tesco supermarket chain, suffered some sort of widespread fraud. The bank's CEO, Benny Higgins, told Radio 4 that around 40,000 of the bank's 7 million accounts had seen “some sort of suspicious transactions.” Of those, around 20,000 customers have actually lost money from their bank accounts. In the interview, the CEO told the BBC he was “very hopeful” that customers would be refunded the lost funds. What he didn't say is that I am sure he is also “very hopeful” that once this all washes up he and his IT team will still have jobs.To read this article in full or to leave a comment, please click here]]> 2016-11-07T09:31:00+00:00 http://www.networkworld.com/article/3139278/security/tesco-bank-breach-causes-20000-customers-to-lose-money.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=249246 False None None None Network World - Magazine Info Security vendor demonstrates hack of US e-voting machine released a video of it Friday, caught the attention of noted National Security Agency leaker Edward Snowden, but other critics of e-voting security dismissed the vulnerability as nothing new.The Cylance hack demonstrated a theoretical vulnerability described in research going back a decade, the company noted.To read this article in full or to leave a comment, please click here]]> 2016-11-07T08:47:00+00:00 http://www.networkworld.com/article/3138873/security/security-vendor-demonstrates-hack-of-us-e-voting-machine.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=249247 False None None None Network World - Magazine Info 5 things you need to know about virtual private networks To read this article in full or to leave a comment, please click here]]> 2016-11-07T08:17:48+00:00 http://www.networkworld.com/article/3138952/security/5-things-you-need-to-know-about-virtual-private-networks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=249248 False Guideline None None Network World - Magazine Info Adobe\'s \'Photoshop for audio\' tweaks voice recordings to say words speaker didn\'t say Adobe Max Creativity Conference, Adobe developer Zeyu Jin mentioned that people “having been making weird stuff online” with photo editing software, before adding, now “let's do something to human speech.”Jin gave a sneak peek of software which is like Photoshop for audio, demonstrating Project VoCo, for voice conversion, by altering a voice clip of comedian Keegan-Michael Key. The voice clip was something Key said after being nominated for an award.To read this article in full or to leave a comment, please click here]]> 2016-11-07T06:42:00+00:00 http://www.networkworld.com/article/3138995/security/adobes-photoshop-for-audio-tweaks-voice-recordings-to-say-words-speaker-didnt-say.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=249249 False None None None