www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-16T02:39:09+00:00 www.secnews.physaphae.fr Network World - Magazine Info UK bank suspends online payments after fraud hits 20,000 accounts CEO Benny Higgins told BBC Radio 4 on Monday."Around half of them had money taken from the account," he said.The bank will bear any losses as a result of the fraudulent activity and customers are not at financial risk, he said.But they might be inconvenienced until the bank has secured its systems.To read this article in full or to leave a comment, please click here]]> 2016-11-07T06:35:17+00:00 http://www.networkworld.com/article/3137463/security/uk-bank-suspends-online-payments-after-fraud-hits-20000-accounts.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=249250 False None None None Network World - Magazine Info How to protect your ecommerce site from fraud, hacking and copycats 8 keys to ecommerce success ]Here are seven ways small ecommerce business owners can protect their online stores from hacking, fraud and/or copycats.1. Trademark your company name and logo “The most important tip for business owners to protect their site and brand is to ensure [their] name is clear for use as a trademark,” says Sonia Lakhany, trademark attorney, Lakhany Law. “Too many entrepreneurs mistakenly think that because a domain name is available or that they were able to form an LLC or corporation with their local Secretary of State that their business name or brand is available as a trademark.”To read this article in full or to leave a comment, please click here]]> 2016-11-07T06:17:00+00:00 http://www.networkworld.com/article/3139057/security/7-ways-to-protect-your-ecommerce-site-from-fraud-hacking-and-copycats.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=249251 False None None None Network World - Magazine Info IDG Contributor Network: Arbor Networks adapts missile defense strategy for DDoS protection Arbor Networks has found the lessons from missile defense apply. Missile defense The Department of Defense describes missile defense protection :To read this article in full or to leave a comment, please click here]]> 2016-11-07T03:45:00+00:00 http://www.networkworld.com/article/3138574/security/arbor-networks-adapts-missile-defense-strategy-for-ddos-protection.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=248942 False None None None Network World - Magazine Info New products of the week 11.7.16 Our roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Ruckus Cloudpath ES 5.0brocadePricing: based on total number of users and is available in 1/3/5 year subscriptions ranging from: $1.50/user for Education on-prem subscription; $1.70/user for Education cloud subscription; $5.00/user for Education on-prem subscription; $5.80/user for Education cloud subscriptionTo read this article in full or to leave a comment, please click here]]> 2016-11-07T03:11:00+00:00 http://www.networkworld.com/article/3138825/mobile-wireless/new-products-of-the-week-11-7-16.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=248943 False None None None Network World - Magazine Info China passes controversial cybersecurity law authorities pressed ahead with this restrictive law without making meaningful changes,” said Sophie Richardson, China director of Human Rights Watch in a statement over the weekend.To read this article in full or to leave a comment, please click here]]> 2016-11-06T23:04:21+00:00 http://www.networkworld.com/article/3138946/security/china-passes-controversial-cybersecurity-law.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=248826 False None None None Network World - Magazine Info FBI sticks to earlier view not to charge Clinton over email server letter from Comey comes ahead of U.S. presidential elections on Tuesday and will likely blunt criticism that Clinton used the email server for confidential government communications.To read this article in full or to leave a comment, please click here]]> 2016-11-06T18:02:49+00:00 http://www.networkworld.com/article/3139051/security/fbi-sticks-to-earlier-view-not-to-charge-clinton-over-email-server.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=248421 False None None None Network World - Magazine Info Microsoft to protect World Chess Champion Magnus Carlsen from Russian hackers told NPR that “Carlsen won't even play his computer. He uses it to train, to recommend moves for future competition. But he won't play it, because he just loses all the time and there's nothing more depressing than losing without even being in the game.”To read this article in full or to leave a comment, please click here]]> 2016-11-06T07:59:00+00:00 http://www.networkworld.com/article/3139045/security/microsoft-to-protect-world-chess-champion-magnus-carlsen-from-russian-hackers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=248422 False None None None Network World - Magazine Info Update your Belkin WeMo devices before they become botnet zombies To read this article in full or to leave a comment, please click here]]> 2016-11-04T16:36:47+00:00 http://www.networkworld.com/article/3137957/security/update-your-belkin-wemo-devices-before-they-become-botnet-zombies.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=248423 False None None None Network World - Magazine Info Cybersecurity: A Priority for Next POTUS CNAP) but add a national security component due to her personal experience with state sponsored hacks of the DNC and John Podesta.  Donald Trump seemed completely ignorant about cybersecurity issues (remember “the cyber” comments and his rant about his 10-year-old son's computer skills?), but has since come up with some pedestrian cybersecurity policy objectives. To read this article in full or to leave a comment, please click here]]> 2016-11-04T16:29:00+00:00 http://www.networkworld.com/article/3137458/security/cybersecurity-a-priority-for-next-potus.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=248424 False None None None Network World - Magazine Info DNC hacker calls on brethren to monitor US election blog post as U.S. federal agencies are reportedly bracing for cyber attacks on election day.The U.S. has already blamed Russia for allegedly meddling with the upcoming election by hacking into political targets, including the DNC, and then leaking the sensitive documents to the public.To read this article in full or to leave a comment, please click here]]> 2016-11-04T14:10:10+00:00 http://www.networkworld.com/article/3138461/security/dnc-hacker-calls-on-brethren-to-monitor-us-election.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=248437 False None None None Network World - Magazine Info What about the personal data on those millions of recalled Note7s? Greenpeace demanded Samsung find ways to reuse rare materials in the phones, such as gold and tungsten.To read this article in full or to leave a comment, please click here]]> 2016-11-04T13:27:00+00:00 http://www.networkworld.com/article/3138906/security/what-about-the-personal-data-on-those-millions-of-recalled-note7s.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=248438 False None None None Network World - Magazine Info Phishing scheme crimps El Paso for $3.2 million El Paso Times this week reported that the city had been scammed out of $3.2 million through a phishing scheme that targeted municipality's street car development program.+More on Network World: FBI snags group that allegedly pinched 23,000 or $6.7 million worth of iPhonesTo read this article in full or to leave a comment, please click here]]> 2016-11-04T12:39:00+00:00 http://www.networkworld.com/article/3138458/security/phishing-scheme-crimps-el-paso-for-3-2-million.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=248439 False None None None Network World - Magazine Info Intel launches 500 drones for nighttime light show Infographic: Commercial drones by the numbers +To read this article in full or to leave a comment, please click here]]> 2016-11-04T11:20:00+00:00 http://www.networkworld.com/article/3138531/techology-business/intel-launches-500-drones-for-nighttime-light-show.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=248440 False None None None Network World - Magazine Info Democracy has died of dysentery: The Voter Suppression Trail is a video game.+ CAN THE ELECTIONS BE HACKED? Find out with Network World's package of stories +To read this article in full or to leave a comment, please click here]]> 2016-11-04T10:39:00+00:00 http://www.networkworld.com/article/3138554/security/democracy-has-died-of-dysentery-the-voter-suppression-trail.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=248441 False None None None Network World - Magazine Info 25% to 30% of users struggle with identifying phishing threats, study says here to subscribe.   Humans are often the weak link in any cybersecurity defense. People behave unpredictably because we are sometimes driven by emotion and by an innate desire to trust and please other people. Also, we tend to take the path of least resistance, even if that path inadvertently creates a cybersecurity risk. Attackers understand these human traits, which is why they are frequently successful in exploiting people to get around more predictable machine-based defenses. As an example, consider phishing. It's estimated that globally, 8 million phishing email messages are opened every day, and of those, 800,000 recipients of the malicious messages click on the embedded links. Ten percent of the people who click on a link actually give their information, such as login credentials for personal applications or their employer's applications.To read this article in full or to leave a comment, please click here]]> 2016-11-04T08:42:00+00:00 http://www.networkworld.com/article/3138582/security/25-to-30-of-users-struggle-with-identifying-phishing-threats-study-says.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=248442 False None None None Network World - Magazine Info How to approach your first day as CSO data breach? Did they not have a CSO previously and that is why they are looking for security help to lock down their network?If during the job interview, there was a blunt plea for help then most new hires would come in guns a blazin' to get things under control quickly. But in most scenarios, CSOs interviewed said there is a general time period to examine the culture of the company to help in getting a grasp of what needs to be done.To read this article in full or to leave a comment, please click here]]> 2016-11-04T05:00:00+00:00 http://www.networkworld.com/article/3138804/careers/what-these-csos-did-on-their-first-days.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=248067 False None None None Network World - Magazine Info DDoS attack from Mirai malware \'killing business\' in Liberia Mirai malware has been launching distributed denial-of-service (DDoS) attacks on IP addresses in the African country, according to security researchers.  These attacks are the same kind that briefly disrupted internet access across the U.S. almost two weeks ago. They work by flooding internet connections with too much traffic, effectively forcing the services offline.To read this article in full or to leave a comment, please click here]]> 2016-11-03T13:53:29+00:00 http://www.networkworld.com/article/3138628/security/ddos-attack-from-mirai-malware-killing-business-in-liberia.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=247579 False None None None Network World - Magazine Info Mobile subscriber identity numbers can be exposed over Wi-Fi To read this article in full or to leave a comment, please click here]]> 2016-11-03T11:01:33+00:00 http://www.networkworld.com/article/3138468/security/mobile-subscriber-identity-numbers-can-be-exposed-over-wi-fi.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=247580 False None None None Network World - Magazine Info Flaw in Wix website builder risked computer worm take advantage of them to trick users' browsers into running malicious scripts that, for example, could download a computer virus or expose the internet cookies that are on their machines. Austin found the same kind of problem in websites from Wix, which builds websites and has 87 million users in Europe, Latin America, Asia.To read this article in full or to leave a comment, please click here]]> 2016-11-03T10:48:01+00:00 http://www.networkworld.com/article/3138437/security/flaw-in-wix-website-builder-risked-computer-worm.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=247581 False None Yahoo None Network World - Magazine Info Ixia\'s Flex Tap Secure+ protects against injection breaches Network World annual State of the Network survey results + In IT, too much network traffic is certainly a bad thing. We need networks and rely on them to access cloud applications, call people on via videoconferencing and do a whole bunch of other tasks. However, too much traffic and the network becomes unusable and a source of frustration for workers. To read this article in full or to leave a comment, please click here]]> 2016-11-03T09:03:00+00:00 http://www.networkworld.com/article/3137217/network-security/ixias-flex-tap-secure-protects-against-injection-breaches.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=247582 False None None None Network World - Magazine Info 10 AWS security blunders and how to avoid them To read this article in full or to leave a comment, please click here]]> 2016-11-03T05:23:00+00:00 http://www.networkworld.com/article/3138408/security/10-aws-security-blunders-and-how-to-avoid-them.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=247114 False None None None Network World - Magazine Info Ex-Facebook, Dropbox engineers offer debugging as a service Honeycomb, currently in an open beta cycle, is a SaaS platform that reduces MTTR (mean time to repair) for outages and degraded services, identifies bugs and performance regressions, isolates contributing factors to failures, and reproduces user bug reports.[ Find out how to get ahead with our career development guide for developers. | The art of programming is changing rapidly. We help you navigate what's hot in programming and what's going cold. | Keep up with hot topics in programming with InfoWorld's Application Development newsletter. ] The collective debugging skills of teams would be captured and preserved, according to the project website. Rather than relying on a dashboard, Honeycomb is for interactive debugging.To read this article in full or to leave a comment, please click here]]> 2016-11-03T05:20:00+00:00 http://www.networkworld.com/article/3138425/application-development/ex-facebook-dropbox-engineers-offer-debugging-as-a-service.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=247115 False None None None Network World - Magazine Info How secure are home robots? University of Ulster and IEEE member.To read this article in full or to leave a comment, please click here]]> 2016-11-03T05:18:00+00:00 http://www.networkworld.com/article/3138407/security/how-secure-are-home-robots.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=247116 False None None None Network World - Magazine Info Flood of threat intelligence overwhelming for many firms Target missed alerts warning them about a massive data breach, the amount of threat information coming in from security systems is still overwhelming for many companies, according to new reports, due to a lack of expertise and integration issues.Seventy percent of security pros said that their companies have problems taking actions based on threat intelligence because there is too much of it, or it is too complex, according to a report by Ponemon Research released on Monday. In particular, 69 percent said that their companies lacked staff expertise. As a result, only 46 percent said that incident responders used threat data when deciding how to respond to threats, and only 27 percent said that they were effective in using the data.To read this article in full or to leave a comment, please click here]]> 2016-11-03T05:14:00+00:00 http://www.networkworld.com/article/3138406/security/flood-of-threat-intelligence-overwhelming-for-many-firms.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=247117 False None None None Network World - Magazine Info IDG Contributor Network: The day the 911 network stood still a reward from Apple as part of its bug bounty program. Apple launched this long-awaited program in September, and the company is offering five different categories of reward prizes:To read this article in full or to leave a comment, please click here]]> 2016-11-03T03:30:00+00:00 http://www.networkworld.com/article/3137526/security/the-day-the-911-network-stood-still.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=246919 False None None None Network World - Magazine Info Black Hat Europe: IoT devices can hack phones launch the biggest DDoS attacks ever, but now it represents a potential path for attackers to compromise cell phones.Flaws in Belkin WeMo devices - electrical switches, cameras, light bulbs, coffee makers, air purifiers, etc. – enabled Invincea Labs researchers to not only hack into the devices, but to use that access to attack an Android phone running the app that controls the WeMo devices.“This is the first instance we've seen of IoT hacking something else,” says researcher Scott Tenaglia, who pledges to look for other vulnerable devices that might be abused to carry out similar attacks.To read this article in full or to leave a comment, please click here]]> 2016-11-02T14:25:00+00:00 http://www.networkworld.com/article/3138050/internet-of-things/black-hat-europe-iot-devices-can-hack-phones.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=245164 False None None None Network World - Magazine Info 29% off Litom Solar Outdoor Motion Sensor Security Lights, 2 Pack - Deal Alert see reviews), and a 2-pack is currently being offered at $35.29, a 29% discount over its typical list price of $50. See it now on Amazon.To read this article in full or to leave a comment, please click here]]> 2016-11-02T14:05:00+00:00 http://www.networkworld.com/article/3137497/lighting/29-off-litom-solar-outdoor-motion-sensor-security-lights-2-pack-deal-alert.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=245165 False None None None Network World - Magazine Info Microsoft to patch Windows bug that Google revealed post to a company blog.To read this article in full or to leave a comment, please click here]]> 2016-11-02T12:36:00+00:00 http://www.networkworld.com/article/3137494/computers/microsoft-to-patch-windows-bug-that-google-revealed.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=244741 False None None None Network World - Magazine Info ExtraHop package captures files before ransomware encrypts them Potent ransomware is targeting the enterprise at a scary rate+A software upgrade to ExtraHop's Ransomware Detection bundle picks up on precursors to ransomware encrypting files and captures them before the malware has the chance to encrypt.To read this article in full or to leave a comment, please click here]]> 2016-11-02T12:33:00+00:00 http://www.networkworld.com/article/3138030/security/extrahop-package-captures-files-before-ransomware-encrypts-them.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=244742 False None None None Network World - Magazine Info Brace yourselves, commercial drones are coming Image by Magdalena Petrova Now in its second year, the Commercial UAV Expo in Las Vegas attracts companies who what to integrate drones into their workflows. Industries range from security, to construction, to surveying and mapping. Let's check out some of the drones that darted across our radar. To read this article in full or to leave a comment, please click here]]> 2016-11-02T10:50:00+00:00 http://www.networkworld.com/article/3137940/techology-business/slideshow-brace-yourselves-commercial-drones-are-coming.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=244273 False None None None Network World - Magazine Info Cisco seeks faster time to discovery for breaches, compromises To read this article in full or to leave a comment, please click here]]> 2016-11-02T09:04:00+00:00 http://www.networkworld.com/article/3137932/security/cisco-seeks-faster-time-to-discovery-for-breaches-compromises.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=244044 False None None None Network World - Magazine Info NASA: Asteroid mission starts with a marriage of rocks, styrofoam and plywood How to protect Earth from asteroid destruction; Quick look: NASA's ambitious asteroid grabbing mission+To read this article in full or to leave a comment, please click here]]> 2016-11-02T08:16:00+00:00 http://www.networkworld.com/article/3137972/security/nasa-asteroid-mission-starts-with-a-marriage-of-rocks-styrofoam-and-plywood.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=243833 False None None None Network World - Magazine Info Do smartphone trade-ins threaten corporate security? Blancco Technology Group says a whopping 68 percent of mobile users plan to purchase a new smartphone for the holidays. That number seems high to me, but come January, you can be pretty sure there will be a lot of shiny new iPhones, Galaxies and Pixels connecting to your corporate network. But that's not what this post is about. No, this post is about what happens to all those no-longer-shiny BYOD smartphones that used to connect to your corporate network and work with your corporate data, but have now been replaced with something new. To read this article in full or to leave a comment, please click here]]> 2016-11-02T07:55:00+00:00 http://www.networkworld.com/article/3137720/smartphones/do-smartphone-trade-ins-threaten-corporate-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=243650 False None None None Network World - Magazine Info Trump and Clinton should answer these 10 cybersecurity questions Image by REUTERS/Jim YoungThis election has been more about style than substance, more about the candidates' pasts than their plans, more personal attacks than policy proposals. Even the debates, where the moderators attempt to discuss issues in need of decisions and actions, have been more notable for the ferocity of attacks than the shrewdness of the strategies.To read this article in full or to leave a comment, please click here]]> 2016-11-02T07:01:00+00:00 http://www.networkworld.com/article/3137965/security/trump-and-clinton-should-answer-these-10-cybersecurity-questions.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=243651 False None None None Network World - Magazine Info Fixing the communications issues between IT security and the board and c-suite To read this article in full or to leave a comment, please click here]]> 2016-11-02T07:00:00+00:00 http://www.networkworld.com/article/3137599/security/fixing-the-communications-issues-between-it-security-and-the-board-and-c-suite.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=243652 False Guideline None None Network World - Magazine Info Microsoft: Windows 0-day exposed by Google is being exploited by Russian DNC hackers zero-day disclosed by Google on Halloween.Microsoft agreed that the zero-day is being actively exploited and pointed a finger of blame at a hacking group that is believed to be tied to the Russian government; the same group is believed to be responsible for hacks which resulted in data breaches at the Democratic National Committee and the Clinton campaign.Microsoft does not call the APT group “Fancy Bear” as its codename for the threat group is STRONTIUM. Terry Myerson, executive VP of Microsoft's Windows and Devices Group, wrote:To read this article in full or to leave a comment, please click here]]> 2016-11-02T06:41:00+00:00 http://www.networkworld.com/article/3137964/security/microsoft-windows-0-day-exposed-by-google-is-being-exploited-by-russian-dnc-hackers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=243479 False None APT 28 None Network World - Magazine Info Cisco says it\'ll make IoT safe because it owns the network To read this article in full or to leave a comment, please click here]]> 2016-11-01T21:02:06+00:00 http://www.networkworld.com/article/3137714/internet-of-things/cisco-says-itll-make-iot-safe-because-it-owns-the-network.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=242336 False None None None Network World - Magazine Info Police across the globe crackdown on darknet marketplaces statement on Monday.Unlike other websites, these underground marketplaces reside within the darknet -- a sort of parallel internet accessible to visitors via anonymizing software like Tor. While the software has legitimate uses, such as safeguarding communications in authoritarian countries, it has been adopted for more illicit means.To read this article in full or to leave a comment, please click here]]> 2016-11-01T17:32:47+00:00 http://www.networkworld.com/article/3137707/security/police-across-the-globe-crackdown-on-darknet-marketplaces.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=242056 False None None None Network World - Magazine Info 20% off Ring Wi-Fi Enabled Video Doorbell - Deal Alert read reviews) and have given it an average of 4 out of 5 stars. Right now its list price of $199 has been reduced to $160. See it now on Amazon.To read this article in full or to leave a comment, please click here]]> 2016-11-01T14:05:00+00:00 http://www.networkworld.com/article/3137413/access-control/20-off-ring-wi-fi-enabled-video-doorbell-deal-alert.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=241493 False None None None Network World - Magazine Info 11 cool high-tech aerial headquarters photos Image by Reuters/Noah BergerApple's “Spaceship” headquarters building, which is under construction but will soon be completed, gets a lot of attention but there are other high-tech headquarters that look good – especially from above. Here we take a look at just a few of them.To read this article in full or to leave a comment, please click here]]> 2016-11-01T12:11:00+00:00 http://www.networkworld.com/article/3137485/security/11-cool-high-tech-aerial-headquarters-photos.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=241142 False None None None Network World - Magazine Info Researchers build undetectable rootkit for programmable logic controllers will be presented at the Black Hat Europe security conference in London on Thursday, was developed by Ali Abbasi, a doctoral candidate in the distributed and embedded system security group at the University of Twente in the Netherlands, and Majid Hashemi, a research and development engineer at Quarkslab, a Paris-based cybersecurity company.To read this article in full or to leave a comment, please click here]]> 2016-11-01T11:51:24+00:00 http://www.networkworld.com/article/3137420/security/researchers-build-undetectable-rootkit-for-programmable-logic-controllers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=241006 False None None None Network World - Magazine Info Gartner: Despite the DDoS attacks, don\'t give up on Dyn or DNS service providers DDoS attacks that flooded Dyn last month and knocked some high-profile Web sites offline don't mean businesses should abandon it or other DNS service providers, Gartner says.In fact, the best way to go is to make sure critical Web sites are backed by more than one DNS provider, says Gartner analyst Bob Gill.+More on Network World: Gartner Top 10 technology trends you should know for 2017+To read this article in full or to leave a comment, please click here]]> 2016-11-01T10:27:00+00:00 http://www.networkworld.com/article/3137456/security/gartner-despite-the-ddos-attacks-don-t-give-up-on-dyn-or-dns-service-providers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=240881 False None None None Network World - Magazine Info That\'s just wrong: Accusing granny of pirating zombie game 60 million genetically modified mosquitoes a week sounds just wrong, but in theory the mutant mosquitoes will mate with normal mosquitos so the offspring will have a genetic flaw that causes them to die quickly. There is no mention of whether or not the millions of mutant mosquitoes to be released weekly will feed on the people of Brazil. If that's not just wrong, then the three examples below surely are.Saddam Hussein…really Apple?Apple refused to issue a male customer a refund for an iPhone 7 unless he could prove he was not Saddam Hussein – you know, the Iraqi dictator executed by hanging in 2006 – basically a decade ago. Apparently, someone working for Apple was unaware of that fact.To read this article in full or to leave a comment, please click here]]> 2016-11-01T08:54:00+00:00 http://www.networkworld.com/article/3137408/security/that-s-just-wrong-accusing-granny-of-pirating-zombie-game.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=240566 False None None None Network World - Magazine Info UK government to spend $2.3 billion to bolster cybersecurity national cybersecurity strategy, is to make the U.K. one of the "safest places in the world to do business," with a world-class cybersecurity industry and workforce, Hammond said Tuesday.To read this article in full or to leave a comment, please click here]]> 2016-11-01T07:54:50+00:00 http://www.networkworld.com/article/3137157/security/uk-government-to-spend-2-3-billion-to-bolster-cybersecurity.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=240455 False None None None Network World - Magazine Info Google to untrust WoSign and StartCom certificates To read this article in full or to leave a comment, please click here]]> 2016-11-01T07:04:58+00:00 http://www.networkworld.com/article/3137236/security/google-to-untrust-wosign-and-startcom-certificates.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=240456 False None None None Network World - Magazine Info 10 ways to make sure your remote workers are being safe Image by PexelsWith an ever-expanding mobile workforce, infosec teams are increasingly tasked with extending cybersecurity safeguards beyond the physical and virtual walls of their organizations. With endpoints not only increasing but on the move, the challenge is real. In addition to implementing the appropriate technical defenses, there is an important aspect to protecting corporate data and systems: Asking end users to get involved.To read this article in full or to leave a comment, please click here]]> 2016-11-01T06:38:00+00:00 http://www.networkworld.com/article/3137231/mobile-security/10-ways-to-make-sure-your-remote-workers-are-being-safe.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=240300 False None None None Network World - Magazine Info Unencrypted pagers a security risk for hospitals, power plants in hospital settings and in industrial plants.Stephen Hilt, Trend Micro's lead researcher on the project, said they don't have a concrete percentage on the number of encrypted messages.To read this article in full or to leave a comment, please click here]]> 2016-11-01T06:34:00+00:00 http://www.networkworld.com/article/3137424/security/unencrypted-pagers-a-security-risk-for-hospitals-power-plants.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=240301 False Guideline None None Network World - Magazine Info Here\'s how businesses can prevent point-of-sale attacks Wendy's, clothing retailer Eddie Bauer and Kimpton Hotels have all reported data breaches stemming from such attacks.Security experts, however, are encouraging a variety of approaches to keep businesses secure from point-of-sale-related intrusions. Here are a few to consider:To read this article in full or to leave a comment, please click here]]> 2016-11-01T06:14:11+00:00 http://www.networkworld.com/article/3137151/security/heres-how-businesses-can-prevent-point-of-sale-attacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=240302 False None None None Network World - Magazine Info Google clashes with Microsoft over Windows flaw disclosure posted about the zero-day vulnerability on its security blog, saying Microsoft had yet to publish a fix or issue an advisory about the software flaw."This vulnerability is particularly serious because we know it is being actively exploited," Google said. It lets hackers exploit a bug in the Windows kernel, via a win32k.sys system call, to bypass the security sandbox.To read this article in full or to leave a comment, please click here]]> 2016-10-31T17:27:21+00:00 http://www.networkworld.com/article/3137168/security/google-clashes-with-microsoft-over-windows-flaw-disclosure.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=238951 False None None None Network World - Magazine Info Improve IT security: Start with these 10 topics Domain Name System Security Extensions (DNSSEC) thwarts these-at the cost of understanding how it works, how to deploy it and how it's maintained. There are ways to understand if your own organization is threatened with DDoS attacks. Study them. To read this article in full or to leave a comment, please click here]]> 2016-10-31T13:39:00+00:00 http://www.networkworld.com/article/3137164/security/improve-it-security-start-with-these-10-topics.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=238361 False None None None Network World - Magazine Info IBM deploys machine learning to bolster online banking security program To read this article in full or to leave a comment, please click here]]> 2016-10-31T11:54:00+00:00 http://www.networkworld.com/article/3136392/security/ibm-deploys-machine-learning-to-bolster-online-banking-security-program.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=237809 False None None None Network World - Magazine Info Shadow Brokers leak list of NSA targets and compromised servers releasing message 5 - trick or treat. This time, instead of releasing Equation Group exploit tools, the group dumped a list of servers allegedly compromised by the NSA-linked Equation Group.As usual, the Shadow Brokers included a slaughtered-English rambling message which primarily focused on the upcoming elections. One portion reads: TheShadowBrokers is having suggestion. On November 8th, instead of not voting, maybe be stopping the vote all together? Maybe being grinch who stopped election from coming? Maybe hacking election is being the best idea? #hackelection2016.To read this article in full or to leave a comment, please click here]]> 2016-10-31T07:35:00+00:00 http://www.networkworld.com/article/3137065/security/shadow-brokers-leak-list-of-nsa-targets-and-compromised-servers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=237258 False None None None Network World - Magazine Info Trend Micro\'s Enterprise Play To read this article in full or to leave a comment, please click here]]> 2016-10-31T07:28:00+00:00 http://www.networkworld.com/article/3136630/security/trend-micro-s-enterprise-play.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=237259 False Guideline None None Network World - Magazine Info 17 essential tools to protect your online identity, privacy haveibeenpwned.com to verify whether their email addresses or user names and passwords have been compromised by a known attack.[ Watch out for 11 signs you've been hacked -- and learn how to fight back, in InfoWorld's PDF special report. | Discover how to secure your systems with InfoWorld's Security Report newsletter. ] But these days, computer users should go well beyond tightening their social media account settings. The security elite run a variety of programs, tools, and specialized hardware to ensure their privacy and security is as strong as it can be. Here, we take a look at this set of tools, beginning with those that provide the broadest security coverage down to each specific application for a particular purpose. Use any, or all, of these tools to protect your privacy and have the best computer security possible.To read this article in full or to leave a comment, please click here]]> 2016-10-31T06:08:00+00:00 http://www.networkworld.com/article/3137024/security/17-essential-tools-to-protect-your-online-identity-and-privacy.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=237085 False None None None Network World - Magazine Info Why don\'t developers have a \'spellchecker\' for security\'? To read this article in full or to leave a comment, please click here]]> 2016-10-31T06:02:00+00:00 http://www.networkworld.com/article/3136653/software/why-dont-developers-have-a-spellchecker-for-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=237086 False None None None Network World - Magazine Info Why Blockchain\'s growing pains will be worth it Constellation Research Connected Enterprise conference From left to right: Shawn Wiora, CEO of Maxxsure, Silicon Valley Product Exec Chirag Mehta, and Aron Dutta, Global Head of Blockchain at IBMTo read this article in full or to leave a comment, please click here]]> 2016-10-31T06:00:00+00:00 http://www.networkworld.com/article/3136965/security/why-blockchain-s-growing-pains-will-be-worth-it.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=237087 False Guideline None None Network World - Magazine Info Joomla websites attacked en masse using recently patched exploits were patched in Joomla 3.6.4, released Tuesday.Hackers didn't waste any time reverse engineering the patches to understand how the two vulnerabilities can be exploited to compromise websites, according to researchers from Web security firm Sucuri.To read this article in full or to leave a comment, please click here]]> 2016-10-31T05:13:48+00:00 http://www.networkworld.com/article/3136987/security/joomla-websites-attacked-en-masse-using-recently-patched-exploits.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=236892 False None None None Network World - Magazine Info Beat the bad guys at their own game with SafeBreach\'s simulated cyberattacks To read this article in full or to leave a comment, please click here]]> 2016-10-31T03:15:00+00:00 http://www.networkworld.com/article/3135724/security/beat-the-bad-guys-at-their-own-game-with-safebreach-s-simulated-cyberattacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=236590 False None None None Network World - Magazine Info New products of the week 10.31.16 Our roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Atlantis Workspace Infrastructure integrated with CitrixatlantisKey features: Atlantis integrated workspace infrastructure into the Citrix management suite. The combination of applications, management and infrastructure into a single PaaS solution will lower cost and complexity for managing virtual workspaces. More info.To read this article in full or to leave a comment, please click here]]> 2016-10-31T03:08:00+00:00 http://www.networkworld.com/article/3136209/mobile-wireless/new-products-of-the-week-10-31-16.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=236591 False None None None Network World - Magazine Info FBI doesn\'t have a warrant to review new emails linked to Clinton investigation made it personal” and accused Comey of a smear campaign. Comey, ironically the same FBI guy who recommended no criminal charges for Clinton, is now being treated like her enemy.“It is pretty strange to put something like that out with such little information right before an election,” Clinton said during a rally at Daytona Beach on Saturday. “In fact, it's not just strange; it's unprecedented and deeply troubling.” She added, “So we've called on Directory Comey to explain everything right away, put it all out on the table.”To read this article in full or to leave a comment, please click here]]> 2016-10-30T08:26:00+00:00 http://www.networkworld.com/article/3136734/security/fbi-doesnt-have-a-warrant-to-review-new-emails-linked-to-clinton-investigation.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=235097 False None None None Network World - Magazine Info Hacking forum cuts section allegedly linked to DDoS attacks posting. "I do need to make sure that we continue to exist and given the recent events I think it's more important that the section be permanently shut down," he wrote. The section was designed to let members offer so-called stress testing services for websites as a way to check their resiliency. However, security firms claim Hack Forums was actually promoting DDoS-for-hire services that anyone can use to launch cyber attacks.To read this article in full or to leave a comment, please click here]]> 2016-10-28T17:47:55+00:00 http://www.networkworld.com/article/3136727/hacking/hacking-forum-cuts-section-allegedly-linked-to-ddos-attacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=232475 False None None None Network World - Magazine Info Lost thumb drives bedevil US banking agency To read this article in full or to leave a comment, please click here]]> 2016-10-28T14:39:49+00:00 http://www.networkworld.com/article/3136701/regulation/lost-thumb-drives-bedevil-us-banking-agency.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=232136 False None None None Network World - Magazine Info Companies complacent about data breach preparedness To read this article in full or to leave a comment, please click here]]> 2016-10-28T11:59:00+00:00 http://www.networkworld.com/article/3136332/security/companies-complacent-about-data-breach-preparedness.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=231913 False None None None Network World - Magazine Info After DDOS attack, senator seeks industry-led security standards for IoT devices attack has prompted an urgent focus on the need for industry-led cybersecurity standards for internet of things devices.U.S. Sen. Mark Warner, (D-Va.) said Thursday that he favors an industry-based approach before seeking some form of government regulation of IoT security.“Last week's attack does reveal a new level of vulnerability, and I'm trying to make it clear ... that this is not a problem that the government ought to be the first actor in solving,” he said in a telephone interview.To read this article in full or to leave a comment, please click here]]> 2016-10-28T11:58:00+00:00 http://www.networkworld.com/article/3136706/security/after-ddos-attack-senator-seeks-industry-led-security-standards-for-iot-devices.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=231914 False None None None Network World - Magazine Info FBI to probe new emails related to Clinton\'s private server tweeted on Friday.These emails "appear to be pertinent" to the FBI's original investigation into Clinton's private server use, which the agency wrapped up back in July, Comey said. Clinton, now the Democratic nominee for U.S. president, used the privacy server while she served as secretary of state.To read this article in full or to leave a comment, please click here]]> 2016-10-28T11:39:33+00:00 http://www.networkworld.com/article/3136668/security/fbi-to-probe-new-emails-related-to-clintons-private-server.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=231829 False None None None Network World - Magazine Info New Windows code injection method could let malware bypass detection blog post. "We also found that the legitimate program, now containing the malicious code, can be manipulated to execute that code."To read this article in full or to leave a comment, please click here]]> 2016-10-28T10:18:39+00:00 http://www.networkworld.com/article/3136689/security/new-windows-code-injection-method-could-let-malware-bypass-detection.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=231598 False None None None Network World - Magazine Info Security apps you need on your new Pixel Image by GoogleAll the brand new features of the Pixel will not protect it from increasingly frequent security threats: each user should take necessary precautions in order to protect their data, passwords or any sensitive online transactions. A new smartphone is also an attractive one-stop location for hackers who'd like to access personal bank account data, credit card passwords, name, address, social media accounts and so on.To read this article in full or to leave a comment, please click here]]> 2016-10-28T07:43:00+00:00 http://www.networkworld.com/article/3136555/security/security-apps-you-need-on-your-new-pixel.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=231192 False None None None Network World - Magazine Info IDG Contributor Network: How the government can help businesses fight cyber attacks cause more damage than robberies.Blame cyber criminals, not nation-states, for attacks While nation-states are typically blamed for breaches, the culprits are usually cyber criminals who are using nation-state techniques and procedures. Companies likely claim infiltration by nation-state attackers because it provides them with some cover from lawsuits and preserves business deals and partnerships. (Yahoo is using this tactic with little success.) The reasoning could look like this: how could our organization protect itself from attackers who have the support and resources of a major government? We're simply outgunned.To read this article in full or to leave a comment, please click here]]> 2016-10-28T04:30:00+00:00 http://www.networkworld.com/article/3135864/security/how-the-government-can-help-businesses-fight-cyber-attacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=230771 False None Yahoo None Network World - Magazine Info IDG Contributor Network: How much does a data breach actually cost? Target and Sony become almost forgettable when confronted with the recently disclosed half-billion accounts compromised at Yahoo in 2014.The numbers are simply staggering. It is estimated over 900,000,000 records of personally identifiable information (PII) have been stolen in the U.S. over the past few years. Keeping a memory of all the hacks and when they happened may require the use of complex data visualization.To read this article in full or to leave a comment, please click here]]> 2016-10-28T04:00:00+00:00 http://www.networkworld.com/article/3135522/security/how-much-does-a-data-breach-actually-cost.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=230772 False None Yahoo None Network World - Magazine Info Pennsylvania man sentenced to 18 months for celeb hacking To read this article in full or to leave a comment, please click here]]> 2016-10-27T23:42:34+00:00 http://www.networkworld.com/article/3136546/security/pennsylvania-man-sentenced-to-18-months-for-celeb-hacking.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=230293 False None None None Network World - Magazine Info Personal data of 550,000 Red Cross blood donors was breached information about blood donors, such as name, gender, physical address, email address, phone number, date of birth, blood type, country of birth, and previous donations, according to security researcher Troy Hunt.To read this article in full or to leave a comment, please click here]]> 2016-10-27T21:13:51+00:00 http://www.networkworld.com/article/3136564/security/personal-data-of-550000-red-cross-blood-donors-was-breached.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=230181 False None None None Network World - Magazine Info Malware from Friday\'s DDoS attack continues to harass in short bursts MalwareTech.He has tracked Mirai-powered botnets and helped produce a Twitter feed that monitors their DDoS attacks. On Wednesday alone, the feed posted close to 60 attacks, many of them lasting from 30 seconds to over a minute long.To read this article in full or to leave a comment, please click here]]> 2016-10-27T13:48:27+00:00 http://www.networkworld.com/article/3136350/security/malware-from-fridays-ddos-attack-continues-to-harass-in-short-bursts.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=229582 False None None None Network World - Magazine Info The secret behind the success of Mirai IoT botnets Trend Micro's assessment that “the Internet of Things ecosystem is completely, and utterly, broken.”+More on Network World: US Senator wants to know why IoT security is so anemic+To read this article in full or to leave a comment, please click here]]> 2016-10-27T12:57:00+00:00 http://www.networkworld.com/article/3136314/security/the-secret-behind-the-success-of-mirai-iot-botnets.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=229540 False None None None Network World - Magazine Info The FIDO Alliance provides strong authentication for online services   here to subscribe.  For many security professionals, passwords are the scourge of the authentication world, and their death can't come soon enough. Passwords are too often stolen, shared, forgotten or simply too weak or obvious to be effective. According to the 2016 Verizon Data Breach Investigations Report, 63% of confirmed data breaches involve the use of weak, default or stolen passwords.End users hate passwords too, because they create a bad user experience (UX). We are advised (or forced) to use complex combinations of numbers, characters and symbols that are practically impossible to remember, and we are supposed to have a different password for every system and application we use. Years ago I resorted to a password manager to keep track of my 300+ sets of credentials.To read this article in full or to leave a comment, please click here]]> 2016-10-27T12:24:00+00:00 http://www.networkworld.com/article/3136210/security/the-fido-alliance-provides-strong-authentication-for-online-services.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=229507 False None None None Network World - Magazine Info A spam-control issue unique to Australia? F-bomb-laden phishing email that had eluded his company's spam filter despite the filter having been set to weed out such cursing. Then this exchange ensued:102716blog reddit profanity blocking Reddit I also laughed out loud.To read this article in full or to leave a comment, please click here]]> 2016-10-27T12:04:00+00:00 http://www.networkworld.com/article/3136175/security/a-spam-control-issue-unique-to-australia.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=229508 False None None None Network World - Magazine Info To solve IoT security, look at the big picture, ARM says To read this article in full or to leave a comment, please click here]]> 2016-10-27T11:16:10+00:00 http://www.networkworld.com/article/3136304/internet-of-things/to-solve-iot-security-look-at-the-big-picture-arm-says.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=229423 False None None None Network World - Magazine Info CIO security lessons: Dark thinking on IoT & exploding enterprise networks Bryce Austin kicked off his talk Tuesday at SIMposium 2016, a big gathering of CIOs and IT execs at the Mohegan Sun resort in Connecticut, on the "Unintended Consequences of the Internet of Things." Uncomfortable laughter ensued. Austin, who then went on to make attendees even more uncomfortable, swears that even though his session didn't make the original program, it wasn't added to the agenda as a result of the now notorious IoT-exploiting Dyn DDoS attack that unfolded Friday.To read this article in full or to leave a comment, please click here]]> 2016-10-27T10:29:00+00:00 http://www.networkworld.com/article/3135723/security/cio-security-simposium-iot-mohegansun-botnets-ddos.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=229290 False None None None Network World - Magazine Info IDG Contributor Network: Securing the breach trumps breach prevention the changing face of data breaches and the reality distortion field surrounding today's IT security professionals when they talk about effective ways to combat data breaches. Three things we know for certain, though, is that data breaches are not going away, our adversaries are continuing to innovate and attack, and the costs of a breach are becoming more tangible.Just this month, Verizon claimed the massive hack on Yahoo caused irreparable harm to the tech company in terms of customer trust, possibly allowing the wireless provider to withdraw from or renegotiate the terms of its $4.83 billion acquisition agreement. Also, in October, the U.K. Information Commissioner's Office hit TalkTalk with more than $400,000 in fines for its 2015 cyber attack.To read this article in full or to leave a comment, please click here]]> 2016-10-27T08:53:00+00:00 http://www.networkworld.com/article/3135772/security/securing-the-breach-trumps-breach-prevention.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=228968 False None Yahoo None Network World - Magazine Info FCC tells ISPs to get customer permission before sharing sensitive info broadband privacy rules, which also include requirements that ISPs promptly notify customers of serious data breaches.Broadband customers need transparency and control over how their data is used, said Jessica Rosenworcel, one of three Democratic commissioners voting for the rules. Broadband providers are increasingly sharing customer data with third-party companies such as advertising networks and analytics firms, she said.To read this article in full or to leave a comment, please click here]]> 2016-10-27T08:04:17+00:00 http://www.networkworld.com/article/3135993/internet/fcc-tells-isps-to-get-customer-permission-before-sharing-sensitive-info.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=228969 False None None None Network World - Magazine Info No need to shoot down drones! Many of them can now be hijacked To read this article in full or to leave a comment, please click here]]> 2016-10-27T06:45:27+00:00 http://www.networkworld.com/article/3136151/security/no-need-to-shoot-down-drones-many-of-them-can-now-be-hijacked.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=228633 False None None None Network World - Magazine Info DARPA looking to develop drone destroying, personnel protection system Mobile Force Protection will in the next few years potentially develop a prototype system that could sense an attack, identify the attacker and then use a number of techniques, from communications jamming to capturing mid-flight any attacking drones. DARPA says it will offer $3 million for each phase 1 developer.To read this article in full or to leave a comment, please click here]]> 2016-10-27T06:39:00+00:00 http://www.networkworld.com/article/3136150/security/darpa-looking-to-develop-drone-destroying-personnel-protection-system.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=228634 False None None None Network World - Magazine Info Why studying security in college is a waste of time Image by ThinkstockYou hear a lot about the skills gap in technology. And nowhere is that gap wider, many say, than security. Some companies are taking matters into their own hands. For example, Facebook is trying to teach middle schoolers how to hack so it might raise a generation savvy in security.To read this article in full or to leave a comment, please click here]]> 2016-10-27T03:55:00+00:00 http://www.networkworld.com/article/3136145/careers/why-studying-security-in-college-is-a-waste-of-time.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=228505 False None None None Network World - Magazine Info DDoS attack against overwhelmed despite mitigation efforts says in a status update.The attacks, which knocked out access to some high-profile Web sites, threw as many packets at Dyn's infrastructure as it could and the company responded with its own mitigation actions as well as cooperation from upstream internet providers who blocked some of the attack flow. “These techniques included traffic-shaping incoming traffic, rebalancing of that traffic by manipulation of [DNS querying] anycast policies, application of internal filtering and deployment of scrubbing services,” the company says.To read this article in full or to leave a comment, please click here]]> 2016-10-26T15:24:00+00:00 http://www.networkworld.com/article/3135435/security/ddos-attack-against-overwhelmed-despite-mitigation-efforts.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=226931 False None None None Network World - Magazine Info Lessons learned from the DYN attack To read this article in full or to leave a comment, please click here]]> 2016-10-26T14:01:00+00:00 http://www.networkworld.com/article/3135274/security/lessons-learned-from-the-dyn-attack.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=226802 False None None None Network World - Magazine Info Friday\'s DDoS attack came from 100,000 infected devices blog post.The malware known as Mirai had already been blamed for causing at least part of Friday's distributed denial-of-service attack, which targeted Dyn and slowed access to many popular sites in the U.S.To read this article in full or to leave a comment, please click here]]> 2016-10-26T13:58:46+00:00 http://www.networkworld.com/article/3135270/security/fridays-ddos-attack-came-from-100000-infected-devices.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=226803 False None None None Network World - Magazine Info Robocall Strike Force: Trial of one technique cut IRS scam complaints 90% To read this article in full or to leave a comment, please click here]]> 2016-10-26T12:33:00+00:00 http://www.networkworld.com/article/3135268/mobile-wireless/robocall-strike-force-trial-of-one-technique-cut-irs-scam-complaints-90.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=226683 False None None None Network World - Magazine Info Startup Nubeva pitches Security as a Service in the cloud How the Dyn DDoS attack unfolded +To read this article in full or to leave a comment, please click here]]> 2016-10-26T11:56:00+00:00 http://www.networkworld.com/article/3135432/security/startup-nubeva-pitches-security-as-a-service-in-the-cloud.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=226575 False None None None Network World - Magazine Info DDoS attacks from webcams, routers hit Singapore\'s StarHub posting on Wednesday.In addition, the company has reportedly said that malware-infected broadband routers and webcams were involved in the two attacks, producing a spike in internet traffic that overwhelmed the company's services.To read this article in full or to leave a comment, please click here]]> 2016-10-26T10:59:10+00:00 http://www.networkworld.com/article/3135075/security/ddos-attacks-from-webcams-routers-hit-singapores-starhub.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=226401 False None None None Network World - Magazine Info Do you know where your sensitive documents are? Accusoft, a provider of document and imaging software, 34 percent of IT managers say their organization "has had sensitive information compromised due to poor file management practices." Yet 90 percent of them report being "confident they have the tools they need to protect their organizations' documents."The survey of more than 100 U.S. IT managers and 250 full-time employees revealed an alarming disconnect between IT managers and their users. "Seventy-four percent of IT managers report that their firms have a formalized document management solution," according to the report. "At the same time, less than half (49 percent) of end users believed these resources were available." And 20 percent of employees "claim they don't know what document management tools their employer uses."To read this article in full or to leave a comment, please click here]]> 2016-10-26T10:35:00+00:00 http://www.networkworld.com/article/3135716/security/do-you-know-where-your-sensitive-documents-are.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=226268 False None None None Network World - Magazine Info Emergency Flash Player patch fixes zero-day critical flaw a security advisory Wednesday.Users are advised to upgrade to Flash Player 23.0.0.205 on Windows and Mac and to version 11.2.202.643 on Linux. The Flash Player runtime bundled with Google Chrome and Microsoft Edge or Internet Explorer 11 on Windows 10 and 8.1 will be updated automatically through those browsers' update mechanisms.To read this article in full or to leave a comment, please click here]]> 2016-10-26T10:33:44+00:00 http://www.networkworld.com/article/3135712/security/emergency-flash-player-patch-fixes-zero-day-critical-flaw.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=226269 False Guideline None None Network World - Magazine Info Attackers are now abusing exposed LDAP servers to amplify DDoS attacks To read this article in full or to leave a comment, please click here]]> 2016-10-26T09:36:58+00:00 http://www.networkworld.com/article/3135767/security/attackers-are-now-abusing-exposed-ldap-servers-to-amplify-ddos-attacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=226064 False None None None Network World - Magazine Info FBI snags group that allegedly pinched 23,000 or $6.7 million worth of iPhones US Senator wants to know why IoT security is so anemic+To read this article in full or to leave a comment, please click here]]> 2016-10-26T08:58:00+00:00 http://www.networkworld.com/article/3135706/security/fbi-snags-group-that-allegedly-pinched-23-000-or-6-7-million-worth-of-iphones.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=226065 False None None None Network World - Magazine Info Samy Kamkar hacks IoT security camera to show exploitable dangers to enterprise pdf) which identified seven IoT devices that can be hacked in as little as three minutes: IP-connected security systems, smart HVACs and energy meters, VoIP phones, connected printers, video conferencing systems, smart light bulbs and smart refrigerators. Although the hack might only take a few minutes to pull off, it might take weeks to find and fix.Other “key findings” of the report include: Should any of these devices become infected, hackers can plant backdoors to create and launch an automated IoT botnet DDoS attack. Cybercriminals can leverage jamming or spoofing techniques to hack smart enterprise security systems, enabling them to control motion sensors, locks and surveillance equipment. With VoIP phones, exploiting configuration settings to evade authentication can open opportunities for snooping and recording of calls. Via connected HVAC systems and energy meters, hackers can force critical rooms (e.g. server rooms) to overheat critical infrastructure and ultimately cause physical damage. Potential scenarios for after an IoT device is hacked include using compromised smart video conferencing systems for spying via camera and microphone, disabling security cameras to allow physical break-ins, snooping on calls via VoIP phones and snagging private company information via connected printers. If an attacker were to exploit a smart light bulb, Wi-Fi credentials could be extracted and used to carry out more attacks. A smart fridge could be exploited so that an attacker obtains user credentials.To read this article in full or to leave a comment, please click here]]> 2016-10-26T08:01:00+00:00 http://www.networkworld.com/article/3135650/security/samy-kamkar-hacks-iot-security-camera-to-show-exploitable-dangers-to-enterprise.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=225826 False None None None Network World - Magazine Info Cybersecurity Isn\'t Always a “Boardroom Issue” report in collaboration with the Information Systems Security Association (ISSA) titled, The State of Cyber Security Professional Careers, to ask a number of questions and truly capture the voice of cybersecurity professionals. As part of this project, cybersecurity professionals were asked if their CISO's (or similar role) participation with executive management (i.e. CEO, board of directors, etc.) was at an adequate level.  Just over (56%) half answered “yes,” but 16% thought the level of CISO participation with executive management should increase somewhat while another 12% believe that the CISO's level of participation with executive management should increase significantly.  The remaining 16% responded, “don't know” (note: I am an ESG employee).   To read this article in full or to leave a comment, please click here]]> 2016-10-26T07:46:00+00:00 http://www.networkworld.com/article/3135511/security/cybersecurity-isn-t-always-a-boardroom-issue.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=225702 False None None None Network World - Magazine Info Flash mobs the latest threat this holiday season according to a report released today. Plus, this year, there's an extra surprise -- flash mobs.Not the dancing, music-playing, watching-a-couple-get-engaged kind of flash mobs. But the kind of flash mobs where a bunch of people all show up at a store at once, pull hats low over their heads, grab everything in sight, and split.Just last week, there was a flash mob at an Apple store in Natick, Mass., that took off with more than $13,000 worth of iPhones in less than a minute.To read this article in full or to leave a comment, please click here]]> 2016-10-26T05:27:00+00:00 http://www.networkworld.com/article/3135665/security/flash-mobs-the-latest-threat-this-holiday-season.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=225349 False None None None Network World - Magazine Info Russian criminals\' bank attacks go global according to a new report -- and a new breed of mobile attack apps is coming up next.Criminals stole nearly $44 million directly from Russian banks in the last half of 2015 and the first half of 2016, according to Dmitiry Volkov, co-founder and head of threat intelligence at Moscow-based Group-IB.That was up 292 percent from the same period a year earlier. Direct, targeted attacks against banks now account for 45 percent of all bank-related cybercrime in Russia.To read this article in full or to leave a comment, please click here]]> 2016-10-26T05:25:00+00:00 http://www.networkworld.com/article/3135100/security/russian-criminals-bank-attacks-go-global.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=225350 False None None None Network World - Magazine Info Cyber after Snowden Edward Snowden leaked classified information from the National Security Agency (NSA) in 2013, the FBI and Apple had a public battle around privacy, Shadow Brokers leaked some of the NSA's hacking tools, and Hal Martin, an ex-NSA contractor was arrested for stealing classified information.To read this article in full or to leave a comment, please click here]]> 2016-10-26T05:24:00+00:00 http://www.networkworld.com/article/3135445/security/cyber-after-snowden.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=225351 False None None None Network World - Magazine Info IDG Contributor Network: OwnBackup: Don\'t rely on SaaS vendors to do their own backup and recovery Why it takes a cloud service to manage cloud services + Given this fact, you could be forgiven for assuming that there would be no opportunity for a vendor whose core mission is to help users backup their SaaS data. For one thing, SaaS vendors hardly ever fail and for another, even if short-term outages and small-scale losses occur, SaaS vendors can be relied upon to do their own backup and recovery. Right?To read this article in full or to leave a comment, please click here]]> 2016-10-26T04:00:00+00:00 http://www.networkworld.com/article/3132956/saas/ownbackup-dont-rely-on-saas-vendors-to-do-their-own-backup-and-recovery.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=225251 False None None None Network World - Magazine Info Was the Dyn DDoS attack actually a script kiddie v. PSN? a blog by Allison Nixon, director of security research at Flashpoint.She says the company has discovered the infrastructure used in the Dyn attack also targeted “a well-known video game company” that she doesn't name. A post on hackforums.net seems to agree with this possibility. It indicates the target was PlayStation Network and that Dyn was hit because it provides DNS services to PSN. Going after the name servers (NS) that provide lookups for PSN would prevent traffic from reaching PSN.To read this article in full or to leave a comment, please click here]]> 2016-10-25T15:32:00+00:00 http://www.networkworld.com/article/3135097/security/was-the-dyn-ddos-attack-actually-a-script-kiddie-v-psn.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=223821 False None None None Network World - Magazine Info Dyn attack: US Senator wants to know why IoT security is so anemic letter to the Federal Communications Commission (FCC), the Federal Trade Commission (FTC) and the Department of Homeland Security (DHS) to ask why and what can be done to fix the problem.Sen. Mark Warner (D-VA) Sen. Mark Warner (D-VA) In the letter Warner, who is member of the Senate Select Committee on Intelligence and co-founder of the bipartisan Senate Cybersecurity Caucus, asked questions such as: What types of network management practices are available for internet service providers to respond to DDoS threats? And would it be a reasonable network management practice for ISPs to designate insecure network devices as “insecure” and thereby deny them connections to their networks, including by refraining from assigning devices IP addresses?To read this article in full or to leave a comment, please click here]]> 2016-10-25T14:24:00+00:00 http://www.networkworld.com/article/3135248/security/dyn-attack-us-senator-wants-to-know-why-iot-security-is-so-anemic.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=223597 False None None None