www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-14T12:25:22+00:00 www.secnews.physaphae.fr Network World - Magazine Info How to approach keeping your IoT devices safe Image by Shardayyy With the recent take down of DYN and Brian Krebs' web site, cybercriminals have found a way to use your own devices to bring the Internet to its knees. Portnox's CEO Ofer Amitai provides some ways to keep those devices safe from these attacks.To read this article in full or to leave a comment, please click here]]> 2016-10-25T12:29:00+00:00 http://www.networkworld.com/article/3135265/internet-of-things/how-to-approach-keeping-your-iot-devices-safe.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=223408 False None None None Network World - Magazine Info Rise of the IoT machines Friday's distributed denial-of-service attack on domain name service provider Dyn may have seemed like the end of the world for millions of Netflix, Twitter and Spotify users, but security professionals say the service disruption was merely a nuisance attack – although an eye opening one – compared to the potential damage that can be unleashed by billions of unsecure IoT devices.“It's really just the tip of the iceberg,” says Nicholas Evans, vice president and general manager within the Office of the CTO at Unisys, where he leads its worldwide applied innovation program. “You can grade the threat intensity as the IoT devices become more autonomous, like self-driving cars, or more controllable, like some of factory-type devices that actually manipulate the physical environment. That's where the real threat is.”To read this article in full or to leave a comment, please click here]]> 2016-10-25T12:25:00+00:00 http://www.networkworld.com/article/3135052/internet-of-things/rise-of-the-iot-machines.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=223295 False Guideline None None Network World - Magazine Info DoJ: What does it take to prosecute federal computer crimes? blog post this week that defined how it decides whether or not to prosecute a federal computer-related crime.+More on Network World:  Gartner: Artificial intelligence, algorithms and smart software at the heart of big network changes+To read this article in full or to leave a comment, please click here]]> 2016-10-25T10:46:00+00:00 http://www.networkworld.com/article/3135039/security/doj-what-does-it-take-to-prosecute-federal-computer-crimes.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=223017 False None None None Network World - Magazine Info IDG Contributor Network: Residential routers easy to hack Answers to 'Is the internet broken?' and other Dyn DDoS questions +“Approximately 7 percent of the routers tested show vulnerabilities of high or medium severity,” ESET says in an article on its Welivesecurity editorial website. “Fifteen percent of the tested routers used weak passwords, with 'admin' left as the username in most cases.”To read this article in full or to leave a comment, please click here]]> 2016-10-25T10:37:00+00:00 http://www.networkworld.com/article/3135007/security/residential-routers-easy-to-hack.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=223018 False None None None Network World - Magazine Info Workstation software flaw exposes industrial control systems to hacking To read this article in full or to leave a comment, please click here]]> 2016-10-25T10:00:02+00:00 http://www.networkworld.com/article/3135033/security/workstation-software-flaw-exposes-industrial-control-systems-to-hacking.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=222783 True Guideline None None Network World - Magazine Info Critical account creation flaws patched in popular Joomla CMS released Tuesday, fixes a high-priority flaw in the account creation component that could be exploited to create accounts on a Joomla-based website even if user registration has been disabled on it.To read this article in full or to leave a comment, please click here]]> 2016-10-25T09:56:14+00:00 http://www.networkworld.com/article/3135086/security/critical-account-creation-flaws-patched-in-popular-joomla-cms.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=222784 False None None None Network World - Magazine Info ARM builds up security in the tiniest IoT chips Mirai botnet, which recently took over thousands of IP cameras to mount denial-of-service attacks.To read this article in full or to leave a comment, please click here]]> 2016-10-25T09:25:01+00:00 http://www.networkworld.com/article/3135023/cpu-processors/arm-builds-up-security-in-the-tiniest-iot-chips.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=222785 False None None None Network World - Magazine Info Privacy and security problems in TrackR, iTrack Easy and Nut IoT trackers @Percent_X, and Adam Compton, senior security consultant at Rapid7, aka @tatanus, took aim at four different trackers: iTrack Easy, Nut Smart Tracker, TrackR Bravo and Tile. They looked at the devices as well as the companion iOS apps and found issues with each.To read this article in full or to leave a comment, please click here]]> 2016-10-25T08:06:00+00:00 http://www.networkworld.com/article/3134531/security/privacy-and-security-problems-in-trackr-itrack-easy-and-nut-iot-trackers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=222619 False None None None Network World - Magazine Info Schneider Electric PLC simulator flaw exposes workstations to hacking To read this article in full or to leave a comment, please click here]]> 2016-10-25T05:46:30+00:00 http://www.networkworld.com/article/3134937/security/schneider-electric-plc-simulator-flaw-exposes-workstations-to-hacking.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=222041 False Guideline None None Network World - Magazine Info REVIEW: BIO-key\'s plug-in fingerprint readers for Windows 10 computers BIO-key launched three fingerprint reader devices for the business and everyday computer user. Each sells for $40: the EcoID, the SideSwipe, and the SideTouch. You plug these readers into an USB port on your computer. They're meant to be used with Windows 10 and this OS' biometric sign-in feature, Windows Hello. (The EcoID and SideSwipe also run on Windows 7.)To read this article in full or to leave a comment, please click here]]> 2016-10-25T04:59:00+00:00 http://www.networkworld.com/article/3134935/security/review-bio-key-s-plug-in-fingerprint-readers-for-windows-10-computers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=222042 False None None None Network World - Magazine Info Cybersecurity staffing issues may be putting you at risk study from Spiceworks found that even though 80 percent of organizations experienced a "security incident" in 2015, only 29 percent of companies have a cybersecurity expert working in their IT department and only 7 percent have a cybersecurity expert on their executive team. And a majority -- 55 percent to be exact - said that their business didn't have "regular access" to any IT security experts at all, internal or third-party, with the majority of companies also reporting they had no plans to hire or contract one within the next year.To read this article in full or to leave a comment, please click here]]> 2016-10-25T04:53:00+00:00 http://www.networkworld.com/article/3134874/malware-cybercrime/cybersecurity-staffing-issues-may-be-putting-you-at-risk.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=221894 False None None None Network World - Magazine Info US transport agency guidance on vehicle cybersecurity irks lawmakers To read this article in full or to leave a comment, please click here]]> 2016-10-24T23:10:40+00:00 http://www.networkworld.com/article/3134730/security/us-transport-agency-guidance-on-vehicle-cybersecurity-irks-lawmakers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=221137 False None None None Network World - Magazine Info Lyft customers face potential hack from recycled phone numbers To read this article in full or to leave a comment, please click here]]> 2016-10-24T17:34:11+00:00 http://www.networkworld.com/article/3134866/security/lyft-customers-face-potential-hack-from-recycled-phone-numbers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=220214 False None None None Network World - Magazine Info White House: Small satellites bring “Moore\'s Law” into space To read this article in full or to leave a comment, please click here]]> 2016-10-24T14:43:00+00:00 http://www.networkworld.com/article/3134727/security/white-house-small-satellites-bring-moore-s-law-into-space.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=219894 False None None None Network World - Magazine Info Answers to \'Is the internet broken?\' and other Dyn DDoS questions To read this article in full or to leave a comment, please click here]]> 2016-10-24T13:49:00+00:00 http://www.networkworld.com/article/3134516/security/answers-to-is-the-internet-broken-and-other-dyn-ddos-questions.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=219723 False None None None Network World - Magazine Info Physical RAM attack can root Android and possibly other devices To read this article in full or to leave a comment, please click here]]> 2016-10-24T11:15:38+00:00 http://www.networkworld.com/article/3134510/physical-ram-attack-can-root-android-and-possibly-other-devices.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=219408 False Guideline None None Network World - Magazine Info Chinese firm recalls camera products linked to massive DDOS attack security vulnerability that can make them easy to hack."The main security problem is that users aren't changing the device's default passwords," Xiongmai said in a Chinese-language statement posted online.To read this article in full or to leave a comment, please click here]]> 2016-10-24T10:45:52+00:00 http://www.networkworld.com/article/3133959/chinese-firm-recalls-camera-products-linked-to-massive-ddos-attack.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=219086 False None None None Network World - Magazine Info Media fails to tell consumers about device flaws in Friday\'s internet outage last Friday's internet outages. The national media reported the event, but it failed to tell consumers what they need to know about buying those types of devices. For example, before making a purchase, consumers need to ask: Does the manufacturer routinely update this device with security patches? Can I change the default passwords when I install the device? The national media could have talked to someone who has first-hand experience with this type of attack, such as Brian Krebs, former Washington Post journalist and now one of the leading security industry bloggers, who would have repeated what he posted on Friday:To read this article in full or to leave a comment, please click here]]> 2016-10-24T09:38:00+00:00 http://www.networkworld.com/article/3133977/security/media-fails-to-tell-consumers-what-they-need-to-know-about-fridays-internet-outage.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=218952 False Guideline None None Network World - Magazine Info SnapChat, Skype among worst messaging apps for not respecting users\' right to privacy resulted in ranking messaging apps of 11 tech companies based on the use of encryption to protect users' privacy.According to the detailed list of Message Privacy Rankings (pdf), Facebook did the best, scoring 73 out of 100 for WhatsApp and Facebook Messenger. Both Apple for iMessage and FaceTime and Telegram for the Telegram Messenger scored 67. Google came in with a score of 53 for Allo, Duo and Hangouts.To read this article in full or to leave a comment, please click here]]> 2016-10-24T07:33:00+00:00 http://www.networkworld.com/article/3134525/security/snapchat-skype-among-worst-messaging-apps-for-not-respecting-users-right-to-privacy.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=218684 False None None None Network World - Magazine Info Does Southwest\'s new \'password\' commercial need to get away? To read this article in full or to leave a comment, please click here]]> 2016-10-24T07:21:00+00:00 http://www.networkworld.com/article/3133953/security/does-southwests-new-password-commercial-need-to-get-away.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=218685 False None None None Network World - Magazine Info Cybersecurity, Business, and IT Relationships report from ESG and the Information Systems Security Association (ISSA), 20% of cybersecurity professionals claim that the relationship between cybersecurity and IT teams is “fair or poor” today, while 27% rate the relationship between cybersecurity and business team as “fair or poor” (Note: I am an ESG employee).To read this article in full or to leave a comment, please click here]]> 2016-10-24T07:07:00+00:00 http://www.networkworld.com/article/3133954/security/cybersecurity-business-and-it-relationships.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=218686 False None None None Network World - Magazine Info Bots may be trumping online polls To read this article in full or to leave a comment, please click here]]> 2016-10-24T05:00:00+00:00 http://www.networkworld.com/article/3134101/security/bots-may-be-trumping-online-polls.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=218492 False None None None Network World - Magazine Info French surveillance law is unconstitutional after all, highest court says a new security law it waved through in July 2015, and found it wanting.A key clause of last year's Surveillance Law essentially allowed security agencies to monitor and control wireless communications without the usual oversight applied to wiretapping operations.This is unconstitutional as the lack of oversight is likely to result in a disproportionate invasion of privacy, the council ruled Friday. It was responding to a complaint filed by La Quadrature du Net (LQDN), an association campaigning for online rights, the ISP French Data Network (FDN) and the Federation of Non-Profit ISPs.To read this article in full or to leave a comment, please click here]]> 2016-10-24T04:31:23+00:00 http://www.networkworld.com/article/3134472/french-surveillance-law-is-unconstitutional-after-all-highest-court-says.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=218379 False None None None Network World - Magazine Info Better safe than sorry: 5 apps for encrypting and shredding files Advanced Encryption Standard (AES) algorithm with a 256-bit key.To read this article in full or to leave a comment, please click here]]> 2016-10-24T03:30:00+00:00 http://www.networkworld.com/article/3133742/security/better-safe-than-sorry-5-apps-for-encrypting-and-shredding-files.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=218380 False None None None Network World - Magazine Info New products of the week 10.24.16 Our roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.The Back-UPS battery backupapcKey features: APC by Schneider Electric's new Back-UPS battery backup solutions are designed to deliver reliable/secure power protection for wireless networks, computers and other home/business electronics to help users stay connected. More info.To read this article in full or to leave a comment, please click here]]> 2016-10-24T02:25:00+00:00 http://www.networkworld.com/article/3133966/cloud-computing/new-products-of-the-week-10-24-16.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=218141 False None None None Network World - Magazine Info WikiLeaks says it doesn\'t collaborate with states statement by the board of the whistleblowing site assumes significance after the  administration of U.S. President Barack Obama charged that it and other sites had released allegedly hacked emails under the direction of Russia. WikiLeaks has leaked mails from the Democratic National Committee that showed that the Democratic Party's national strategy and fund-raising committee had favored Hillary Clinton over her rival Senator Bernie Sanders for the Democratic Party nomination. The website has also published mails from the account of John Podesta, chairman of Clinton's campaign for the presidential election, which could prove to be embarrassing to the candidate.To read this article in full or to leave a comment, please click here]]> 2016-10-23T23:51:20+00:00 http://www.networkworld.com/article/3133859/wikileaks-says-it-doesn-t-collaborate-with-states.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=217887 False None None None Network World - Magazine Info Chinese firm admits its hacked products were behind Friday\'s massive DDOS attack Mirai has been taking advantage of these vulnerabilities by infecting the devices and using them to launch huge distributed denial-of service attacks, including Friday's outage.To read this article in full or to leave a comment, please click here]]> 2016-10-23T12:01:32+00:00 http://www.networkworld.com/article/3134035/chinese-firm-admits-its-hacked-products-were-behind-fridays-massive-ddos-attack.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=216914 False None None None Network World - Magazine Info IoT botnets used in unprecedented DDoS against Dyn DNS; FBI, DHS investigating against Dyn DNS were similar to some thugs shredding an internet address book, since addresses of thousands of websites couldn't be looked up and users couldn't be connected to the right servers; by the third wave of attacks, users across the globe had been affected by the massive disruptions.The FBI and the Department of Homeland Security are investigating the attack on Dyn, one provider of DNS services. A spokeswoman told The New York Times that the FBI and DHS “were looking into the incident and all potential causes, including criminal activity and a nation-state attack.”To read this article in full or to leave a comment, please click here]]> 2016-10-22T23:00:00+00:00 http://www.networkworld.com/article/3134093/security/iot-botnets-used-in-unprecedented-ddos-against-dyn-dns-fbi-dhs-investigating.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=216121 False None None None Network World - Magazine Info U.S. indicts Russian for hacking LinkedIn, Dropbox, Formspring arrest by Czech police in Prague on Oct. 5.LinkedIn has said that Nikulin was involved in the 2012 breach of the company that stole details from over 167 million accounts. However, a U.S. court filing unsealed on Friday only gave limited details on Nikulin's alleged crimes.To read this article in full or to leave a comment, please click here]]> 2016-10-21T17:11:53+00:00 http://www.networkworld.com/article/3134088/us-indicts-russian-for-hacking-linkedin-dropbox-formspring.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=214269 False None None None Network World - Magazine Info How the Dyn DDoS attack unfolded ThousandEye, a network monitoring service.Dyn's service takes human-language internet addresses such as www.networkworld.com and delivers the IP addresses associated with them so routers can direct the traffic to the right locations.To read this article in full or to leave a comment, please click here]]> 2016-10-21T16:52:00+00:00 http://www.networkworld.com/article/3134057/security/how-the-dyn-ddos-attack-unfolded.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=214211 False None None None Network World - Magazine Info An IoT botnet is partly behind Friday\'s massive DDOS attack disrupting access to popular websites by flooding a DNS service provider called Dyn with an overwhelming amount of internet traffic.Some of that traffic has been observed coming from botnets created with the Mirai malware that is estimated to have infected over 500,000 devices, according to Level 3 Communications, a provider of internet backbone services.To read this article in full or to leave a comment, please click here]]> 2016-10-21T15:54:12+00:00 http://www.networkworld.com/article/3134052/an-iot-botnet-is-partly-behind-fridays-massive-ddos-attack.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=214128 False None None None Network World - Magazine Info Extensive DDoS attack against Dyn restarts, could indicate a new use of old criminal tech Dyn hasn't shared details on the type of DDoS attacks used nor the size of those attacks that have affected access to sites including Amazon, Etsy, GitHub, Shopify, Twitter and the New York Times.+More on Network World: Gartner Top 10 strategic technology trends you should know for 2017To read this article in full or to leave a comment, please click here]]> 2016-10-21T12:34:00+00:00 http://www.networkworld.com/article/3133751/security/extensive-ddos-attack-against-dyn-restarts-could-indicate-a-new-use-of-old-criminal-tech.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=213974 False None None None Network World - Magazine Info Easy-to-exploit rooting flaw puts Linux computers at risk are affected.The Red Hat security team describes the flaw as a "race" condition, "in the way the Linux kernel's memory subsystem handles the copy-on-write (COW) breakage of private read-only memory mappings." This allows an attacker who gains access to a limited user account to obtain root privileges and therefore take complete control over the system.To read this article in full or to leave a comment, please click here]]> 2016-10-21T08:29:39+00:00 http://www.networkworld.com/article/3133919/easy-to-exploit-rooting-flaw-puts-linux-computers-at-risk.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=213448 False None None None Network World - Magazine Info DNS provider Dyn gets DDoSed, takes out Twitter, GitHub and plenty others www.networkworld.com into a numerical format that can be used to retrieve the actual web page. Dyn is a managed DNS provider – essentially, a phone book that computers use to correlate IP addresses to web page names.+ALSO ON NETWORK WORLD: Apple sues Amazon supplier over fake iPhone chargers + Technology confirms election ballot error is less than .001%To read this article in full or to leave a comment, please click here]]> 2016-10-21T07:03:00+00:00 http://www.networkworld.com/article/3133988/security/dns-provider-dyn-gets-ddosed-takes-out-twitter-github-and-plenty-others.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=213248 False None None None Network World - Magazine Info IDG Contributor Network: 7 steps to proactive security Ponemon Institute Data Breach report, insecure data cost companies an average of $221 per compromised record in 2016, an increase of 7 percent from the previous year and an all-time high.+ Also on Network World: A breach alone means liability + The key to securing against this threat lies in a common metaphor-if a ship has a hole, it is better to patch the breach than bail the water. Effective cybersecurity means being proactive, getting ahead of the problem and addressing the issue at its core rather than operating in a reactive fashion, constantly fixing the symptoms.To read this article in full or to leave a comment, please click here]]> 2016-10-21T04:00:00+00:00 http://www.networkworld.com/article/3133370/security/7-steps-to-proactive-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=212766 False None None None Network World - Magazine Info Intel asserts its trademark rights against John McAfee To read this article in full or to leave a comment, please click here]]> 2016-10-20T23:56:47+00:00 http://www.networkworld.com/article/3133912/intel-asserts-its-trademark-rights-against-john-mcafee.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=212381 False None None None Network World - Magazine Info Ex-NSA contractor hoarded two decades\' worth of secrets court filing, federal investigators provided new details on their case against 51-year-old Harold Martin, who was arrested in late August. Investigators have seized 50 terabytes of information from Martin, in addition to thousands of pages of documents, the filing said. Among them are classified operational plans against a known enemy of the U.S that Martin had no need to know about.On Wednesday, The New York Times also reported that Martin was found in possession of NSA hacking tools that have recently been put up for sale online. An anonymous group of hackers calling themselves the Shadow Brokers have been trying to sell the tools since mid-August, but it's unclear how they obtained them.To read this article in full or to leave a comment, please click here]]> 2016-10-20T14:42:18+00:00 http://www.networkworld.com/article/3133531/ex-nsa-contractor-hoarded-two-decades-worth-of-secrets.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=211431 False None None None Network World - Magazine Info US intelligence targets advanced security management of virtual systems Gartner: Virtual personal health assistants and other technology eliminate the physician for annual exams+The advanced research arm of the Office of the Director of National Intelligence rolled out the Virtuous User Environment (VirtUE) program which the agency says “is looking to use the federal government's impending migration to commercial cloud-based IT infrastructures and the current explosion of new virtualization and operating system concepts to create and demonstrate a more secure interactive user computing environment than the government has had in the past or likely to have in the near future.”To read this article in full or to leave a comment, please click here]]> 2016-10-20T09:26:00+00:00 http://www.networkworld.com/article/3133448/security/us-intelligence-targets-advanced-security-management-of-virtual-systems.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=210849 False None None None Network World - Magazine Info Indian banks replace millions of debit cards after possible breach To read this article in full or to leave a comment, please click here]]> 2016-10-20T08:50:16+00:00 http://www.networkworld.com/article/3133444/indian-banks-replace-millions-of-debit-cards-after-possible-breach.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=210624 False None None None Network World - Magazine Info GuardiCore helps security teams see into apps and networks before they segment Always be prepared: Monitor, analyze and test your security + To combat this, security professionals have embraced the concept of segmentation. The number of segmentation providers has exploded over the past few years, including VMware repositioning its NSX network virtualization product as a micro-segmentation solution. To read this article in full or to leave a comment, please click here]]> 2016-10-20T08:04:00+00:00 http://www.networkworld.com/article/3133012/security/guardicore-helps-security-teams-see-into-apps-and-networks-before-they-segment.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=210625 False None None None Network World - Magazine Info 3 ways Windows Server 2016 is tackling security To read this article in full or to leave a comment, please click here]]> 2016-10-20T07:48:00+00:00 http://www.networkworld.com/article/3133408/security/3-ways-windows-server-2016-is-tackling-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=210455 False Guideline None None Network World - Magazine Info Free tool protects PCs from master boot record attacks called MBRFilter, functions as a signed system driver and puts the disk's sector 0 into a read-only state. It is available for both 32-bit and 64-bit Windows versions and its source code has been published on GitHub.The master boot record (MBR) consists of executable code that's stored in the first sector (sector 0) of a hard disk drive and launches the operating system's boot loader. The MBR also contains information about the disk's partitions and their file systems.To read this article in full or to leave a comment, please click here]]> 2016-10-20T07:30:39+00:00 http://www.networkworld.com/article/3133176/free-tool-protects-pcs-from-master-boot-record-attacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=210456 False None None None Network World - Magazine Info Technology confirms election ballot error is less than .001% Hacking the Election: Myths & Realities + Clear Ballot, a venture-backed company in Boston, builds an end-to-end voting system that includes precinct voting, accessible voting to serve disabled voters, central tabulation, consolidation and reporting, and an election management system, all using commodity off-the-shelf hardware. Most voting systems are built using proprietary hardware and software platforms. Because the voting system relies on commodity hardware, acquiring and setting up a ballot verification system is straightforward.To read this article in full or to leave a comment, please click here]]> 2016-10-20T07:17:00+00:00 http://www.networkworld.com/article/3133114/hardware/technology-confirms-election-ballot-error-is-less-than-001.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=210457 False None None None Network World - Magazine Info Stupid encryption mistakes criminals make To read this article in full or to leave a comment, please click here]]> 2016-10-20T04:54:00+00:00 http://www.networkworld.com/article/3133112/security/stupid-encryption-mistakes-criminals-make.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=209952 False None None None Network World - Magazine Info LinkedIn blames Russian hacking suspect for 2012 breach arrested recently in the Czech Republic was involved in a massive 2012 data breach at LinkedIn, the professional social networking company says. LinkedIn said Wednesday that it has been working with the FBI to track down the culprits behind the data breach, which exposed hashed passwords from 117 million accounts."We are thankful for the hard work and dedication of the FBI in its efforts to locate and capture the parties believed to be responsible for this criminal activity," LinkedIn said in an email.To read this article in full or to leave a comment, please click here]]> 2016-10-19T14:52:12+00:00 http://www.networkworld.com/article/3132927/linkedin-blames-russian-hacking-suspect-for-2012-breach.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=208951 False None None None Network World - Magazine Info Yahoo asks US for clarity on email scanning controversy sent a letter to the Director of National Intelligence James Clapper, saying the company has been "unable to respond" to news articles earlier this month detailing the alleged government-mandated email scanning."Your office, however, is well positioned to clarify this matter of public interest," the letter said.The scanning allegedly involved searching through the email accounts of every Yahoo user and may have gone beyond other U.S. government requests for information, according to a report from Reuters.  To read this article in full or to leave a comment, please click here]]> 2016-10-19T13:21:29+00:00 http://www.networkworld.com/article/3132839/yahoo-asks-us-for-clarity-on-email-scanning-controversy.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=208795 False None Yahoo None Network World - Magazine Info Russian hacker group used phony Google login page to hack Clinton campaign Secure Works' Counter Threat Unit (CTU) blog.CTU can't directly link the spearphishing operation against the Clinton campaign with the hack of Democratic National Committee emails revealed June 14, but “CTU researchers suspect that TG-4127 used the spearphishing emails or similar techniques to gain an initial foothold in the DNC network. “To read this article in full or to leave a comment, please click here]]> 2016-10-19T11:57:00+00:00 http://www.networkworld.com/article/3131921/security/russian-hacker-group-used-phony-google-login-page-to-hack-clinton-campaign.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=208568 False None APT 28 None Network World - Magazine Info Your robot doctor overlords will see you now Gartner Top 10 strategic technology trends you should know for 2017To read this article in full or to leave a comment, please click here]]> 2016-10-19T11:43:00+00:00 http://www.networkworld.com/article/3131976/careers/gartner-your-robot-doctor-overlords-will-see-you-now.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=208569 False None None None Network World - Magazine Info Flaw in Intel CPUs could help attackers defeat ASLR exploit defense To read this article in full or to leave a comment, please click here]]> 2016-10-19T11:16:57+00:00 http://www.networkworld.com/article/3132965/flaw-in-intel-cpus-could-help-attackers-defeat-aslr-exploit-defense.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=208455 False None None None Network World - Magazine Info Politics keeps the U.S. from securing private-sector networks, says former CIA chief Robert Gates Gartner Symposium/ITxpo laughing over his observations about IT and applauding at some of the things he believes in.On stage here, for instance, Gartner analyst Richard Hunter fired off questions, asking at one point whether Edward Snowden, the former security contract employee who in 2010 took thousands of classified documents, was a "traitor or hero?"To read this article in full or to leave a comment, please click here]]> 2016-10-19T10:42:00+00:00 http://www.networkworld.com/article/3132944/security/politics-keeps-the-u-s-from-securing-private-sector-networks-says-former-cia-chief-robert-gates.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=208286 False None None None Network World - Magazine Info Czech police arrest Russian hacker suspected of targeting the US statement from the Czech police.The arrest comes as the U.S. has blamed Russian government for hacking U.S. officials and political groups in an effort to influence this year's upcoming election. However, it's unclear if the Russian hacker is in any way involved.To read this article in full or to leave a comment, please click here]]> 2016-10-19T09:49:27+00:00 http://www.networkworld.com/article/3132438/czech-police-arrest-russian-hacker-suspected-of-targeting-the-us.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=208150 False None None None Network World - Magazine Info Half of American adults are in face recognition databases, report 26 states “enroll their residents in a virtual-line up.” That covers more than 117 million American adults, an investigation found, but since not all drivers are adults, then the total number of drivers in face recognition networks is more than 131 million.To read this article in full or to leave a comment, please click here]]> 2016-10-19T07:57:00+00:00 http://www.networkworld.com/article/3132908/security/half-of-american-adults-are-in-face-recognition-databases-report.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=208002 False None None None Network World - Magazine Info Oracle fixes 100s of vulnerabilities that put enterprise data at risk contains 253 security fixes across hundreds of products including database servers, networking components, operating systems, application servers and ERP systems.To read this article in full or to leave a comment, please click here]]> 2016-10-19T07:19:49+00:00 http://www.networkworld.com/article/3132383/oracle-fixes-100s-of-vulnerabilities-that-put-enterprise-data-at-risk.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=207849 False None None None Network World - Magazine Info Recruiting and Retaining Cybersecurity Talent report from ESG and the Information Systems Security Association (ISSA), cybersecurity teams can be in a constant state of flux due to issues with employee satisfaction, a lack of adequate training, and staff attrition.  The report also exposes the fact that 46% of cybersecurity professionals are actually recruited to pursue new job opportunities at least once per week!  In other words, if your cybersecurity people aren't happy, they won't be around long. To read this article in full or to leave a comment, please click here]]> 2016-10-19T07:08:00+00:00 http://www.networkworld.com/article/3132382/security/recruiting-and-retaining-cybersecurity-talent.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=207850 False None None None Network World - Magazine Info Tim Cook or Bill Gates as Clinton\'s VP? It was considered on the list, published by WikiLeaks, was Gates' wife Melinda. She co-founded the charitable foundation that bears both their names.MORE ON NETWORK WORLD: 6 simple tricks for protecting your passwords Other business leaders that made the cut were General Motors CEO Mary Barra, Bloomberg News founder and former New York Mayor Michael Bloomberg, Xerox CEO Ursula Burns, Coca-Cola CEO Muhtar Kent, Rockefeller Foundation president Judith Rodin, and Starbucks CEO Howard Schultz.To read this article in full or to leave a comment, please click here]]> 2016-10-19T05:19:00+00:00 http://www.networkworld.com/article/3132538/techology-business/tim-cook-or-bill-gates-as-clintons-vp-it-was-considered.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=207521 False Guideline None None Network World - Magazine Info CISOs, it\'s time to bury the hatchet with your CIO To read this article in full or to leave a comment, please click here]]> 2016-10-19T05:03:00+00:00 http://www.networkworld.com/article/3132380/security/cisos-it-s-time-to-bury-the-hatchet-with-your-cio.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=207522 False None None None Network World - Magazine Info IoT botnets powered by Mirai continue to grow Beyond Bandwidth blog, and some of these botnets use overlapping infrastructure.Source code for Mirai was released Sept. 30, “which has inspired a significant number of new bad actors, all working to exploit similar pools of vulnerable devices,” the Level 3 researchers write.To read this article in full or to leave a comment, please click here]]> 2016-10-19T04:57:00+00:00 http://www.networkworld.com/article/3132834/security/iot-botnets-powered-by-mirai-continue-to-grow.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=207523 False None None None Network World - Magazine Info Murphy\'s Law: The security version To read this article in full or to leave a comment, please click here]]> 2016-10-19T04:00:00+00:00 http://www.networkworld.com/article/3132566/security/murphys-law-the-security-version.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=207427 False None None None Network World - Magazine Info Ecuador says it cut WikiLeaks founder\'s internet access to prevent U.S. election interference statement. "It does not interfere in external electoral processes or support a particular candidate."As result, the government has temporarily cut access to some private communications at the embassy, where Assange has resided for four years.To read this article in full or to leave a comment, please click here]]> 2016-10-18T17:04:10+00:00 http://www.networkworld.com/article/3132417/ecuador-says-it-cut-wikileaks-founders-internet-access-to-prevent-us-election-interference.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=206725 False None None None Network World - Magazine Info Gartner Top 10 strategic technology trends you should know for 2017 significance Gartner is placing the future influence of artificial intelligence and algorithms, it comes as little surprise that the group is saying that technology will be one of the most strategic and potentially disruptive for 2017.At its Gartner Symposium/ITxpo, David Cearley, vice president and Gartner Fellow detailed the key technology trends for 2017 as the group sees them including how data science technologies are evolving to include advanced machine learning and artificial intelligence is helping create intelligent physical and software-based systems that are programmed to learn and adapt. Other key trends include the impact of melding of the physical and digital environments and how digital technology platforms are influencing the enterprise.To read this article in full or to leave a comment, please click here]]> 2016-10-18T14:53:00+00:00 http://www.networkworld.com/article/3132363/security/gartner-top-10-strategic-technology-trends-you-should-know-for-2017.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=206427 False None None None Network World - Magazine Info Hackers create more IoT botnets with Mirai source code blog post.Hackers have been taking advantage of the Mirai malware's source code, following its role in launching a massive DDOS (distributed denial-of-service) attack that took down the website of cybersecurity reporter Brian Krebs.To read this article in full or to leave a comment, please click here]]> 2016-10-18T13:50:56+00:00 http://www.networkworld.com/article/3132567/hackers-create-more-iot-botnets-with-mirai-source-code.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=206328 False None None None Network World - Magazine Info Microsoft\'s Nadella takes on privacy fears about LinkedIn, Cortana all-knowing virtual assistant, Cortana.Helen Huntley, one of the Gartner analysts questioning Nadella at a conference here, was particularly pointed about the fears.Cortana, said Huntley, "knows everything about me when I'm working. She knows what files I'm looking at, she knows what I'm downloading, she knows when I'm working, when I'm not working," she said.To read this article in full or to leave a comment, please click here]]> 2016-10-18T12:14:00+00:00 http://www.networkworld.com/article/3132370/security/microsoft-s-nadella-takes-on-privacy-fears-about-linkedin-cortana.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=206148 False None None None Network World - Magazine Info Hackers hide stolen payment card data inside website product images reported last week that almost 6,000 online shops, most of them built with the Magento content management system, have malicious code that intercepts and steals payment card data during online transactions. The online storefront of the U.S. National Republican Senatorial Committee (NRSC) was among those websites until earlier this month.To read this article in full or to leave a comment, please click here]]> 2016-10-18T10:50:34+00:00 http://www.networkworld.com/article/3132390/hackers-hide-stolen-payment-card-data-inside-website-product-images.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=205826 False None None None Network World - Magazine Info WikiLeaks blames US for cutting Assange\'s internet connection tweeted on Tuesday that Kerry had asked the Ecuadorian government to prevent WikiLeaks' founder Julian Assange from releasing more documents.   Assange is currently residing in the Ecuadorian embassy in London, where he has been helping to run the WikiLeaks site. But on Saturday, the Ecuadorian government shut down his internet connection. WikiLeaks claimed that Kerry had private negotiations with Ecuador last month. However, the U.S. Department of State is denying any involvement with cutting Assange's internet connection.To read this article in full or to leave a comment, please click here]]> 2016-10-18T10:39:00+00:00 http://www.networkworld.com/article/3132215/wikileaks-blames-us-for-cutting-assanges-internet-connection.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=205827 False None None None Network World - Magazine Info Down the rabbit hole, part 4: Securing your email safe and secure from prying eyes, one area stands out as being astoundingly critical: email.Heck, you can barely go 24 hours without another example of leaked or hacked emails being released to the public. Add to that the recent revelations that Yahoo has been working secretly with United States government agencies to scan all email going through their system, and it quickly becomes clear that the majority of us have email accounts that are not even remotely private or secure.To read this article in full or to leave a comment, please click here]]> 2016-10-18T10:34:00+00:00 http://www.networkworld.com/article/3131060/security/down-the-rabbit-hole-part-4-securing-your-email.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=205828 False None Yahoo None Network World - Magazine Info Half of US adults are profiled in police facial recognition databases said the report from the Center on Privacy & Technology at Georgetown Law. The search of facial recognition databases is largely unregulated, the report said. "A few agencies have instituted meaningful protections to prevent the misuse of the technology," its authors wrote. "In many more cases, it is out of control."To read this article in full or to leave a comment, please click here]]> 2016-10-18T09:03:17+00:00 http://www.networkworld.com/article/3132404/half-of-us-adults-are-profiled-in-police-facial-recognition-databases.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=205688 False None None None Network World - Magazine Info FDA to healthcare execs on DMCA exemption: Researchers will find new medical device flaws new exemptions (pdf) last year, there was a one year hold supposedly so various agencies could update their policies. It's silly, since the exemptions are not permanent; they must be argued and renewed every three years, which basically means security researchers can take advantage of it for two years. They can hope that if their research will take longer than two years, that the exemption is renewed.To read this article in full or to leave a comment, please click here]]> 2016-10-18T08:46:00+00:00 http://www.networkworld.com/article/3132385/security/fda-to-healthcare-execs-on-dmca-exemption-researchers-will-find-new-medical-device-flaws.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=205539 False None None None Network World - Magazine Info Critical flaws found in open-source encryption software VeraCrypt To read this article in full or to leave a comment, please click here]]> 2016-10-18T06:44:48+00:00 http://www.networkworld.com/article/3132364/critical-flaws-found-in-open-source-encryption-software-veracrypt.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=205226 False None None None Network World - Magazine Info Roqos Core router combines cybersecurity with parental controls To read this article in full or to leave a comment, please click here]]> 2016-10-18T06:01:00+00:00 http://www.networkworld.com/article/3131994/mobile-wireless/roqos-core-router-combines-cybersecurity-with-parental-controls.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=205227 False None None None Network World - Magazine Info Younger consumers more likely to fall for tech support con jobs To read this article in full or to leave a comment, please click here]]> 2016-10-18T05:27:00+00:00 http://www.networkworld.com/article/3132156/security/younger-consumers-more-likely-to-fall-for-tech-support-con-jobs.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=205002 False None None None Network World - Magazine Info Asylum of WikiLeaks\' Assange not in question continuation of asylum that it had extended to Assange for the last four years. It said that the protection would continue as long  as the circumstances that had led to that decision continues.Assange was given asylum by Ecuador in 2012 after he slipped into the country's embassy in London, where he continues to be holed for fear of arrest by U.K. police, who have said that they have to arrest Assange if he steps out of the embassy to meet an extradition request from Sweden.To read this article in full or to leave a comment, please click here]]> 2016-10-17T23:59:16+00:00 http://www.networkworld.com/article/3132147/asylum-of-wikileaks-assange-not-in-question.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=204523 False None None None Network World - Magazine Info Breaches, IT skills & innovation keeping CIOs up at night being released to SIM members this week as a lead-in to next week's annual SIMposium conference that's taking place in Connecticut. Non-members can get a peek at the study next week.To read this article in full or to leave a comment, please click here]]> 2016-10-17T14:07:00+00:00 http://www.networkworld.com/article/3131834/careers/breaches-it-skills-innovation-keeping-cios-up-at-night.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=203545 False Guideline None None Network World - Magazine Info Air Force gets space telescope that can see space objects like no ground-based system before it curved charge coupled device (CCD) system,  as well as very wide field-of-view, large-aperture optics, and doesn't require the long optics train of a more traditional telescopes. The design makes the SST less cumbersome on its moveable mount, letting it survey the sky rapidly, the Air Force says. The telescope's mount uses advanced servo-control technology, making the SST one of the most agile telescopes of its size ever built.To read this article in full or to leave a comment, please click here]]> 2016-10-17T13:53:00+00:00 http://www.networkworld.com/article/3131596/security/air-force-gets-space-telescope-that-can-see-space-objects-like-no-ground-based-system-before-it.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=203462 False None None None Network World - Magazine Info To unlock phones, feds demand all occupants surrender fingerprints Forbes. Those fingerprints were crucial to unlocking the smartphones, the Department of Justice argued.However, the federal investigators went beyond asking for the fingerprints of one suspect. Instead, they the sought authority to "depress the fingerprints" of everyone located at the California property.To read this article in full or to leave a comment, please click here]]> 2016-10-17T13:29:44+00:00 http://www.networkworld.com/article/3131555/to-unlock-phones-feds-demand-all-occupants-surrender-fingerprints.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=203463 False None None None Network World - Magazine Info Assange\'s internet allegedly cut by \'state party;\' Guccifer 2.0 springs back to life three Goldman Sachs speeches that Clinton was paid about $225,000 to give, but a series of unusual tweets sent parts of the internet into a tizzy, claiming Assange had been killed and the tweets were triggered by a dead man's switch.Yesterday, WikiLeaks' regular tweets were interrupted by three tweets which contained hashes.To read this article in full or to leave a comment, please click here]]> 2016-10-17T11:45:00+00:00 http://www.networkworld.com/article/3131991/security/assanges-internet-allegedly-cut-by-state-party-guccifer-20-springs-back-to-life.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=203232 False None None None Network World - Magazine Info UK spy agencies illegally collected data for years, court rules a June 2015 complaint by campaign group Privacy International, the tribunal said the secret intelligence agencies had breached the ECHR for years because of the way they gathered bulk communications data (BCD) and bulk personal data (BPD).To read this article in full or to leave a comment, please click here]]> 2016-10-17T11:00:16+00:00 http://www.networkworld.com/article/3131986/uk-spy-agencies-illegally-collected-data-for-years-court-rules.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=203039 False None None None Network World - Magazine Info Gartner: Artificial intelligence, algorithms and smart software at the heart of big network changes Peter Sondergaard, senior vice president and global head of Research opening remarks at today's Gartner Symposium/ITxpo show in Orlando.More on Network World: Will future developments in the realm of Artificial Intelligence be like the wild west or a more controlled situation? +To read this article in full or to leave a comment, please click here]]> 2016-10-17T10:37:00+00:00 http://www.networkworld.com/article/3132006/data-center/gartner-artificial-intelligence-algorithms-and-smart-software-at-the-heart-of-big-network-changes.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=203040 False None None None Network World - Magazine Info WikiLeaker Assange\'s internet access cut by a \'state actor\' published thousands of leaked emails from the account of John Podesta, chairman of U.S. presidential candidate Hillary Clinton's campaign. Clinton's campaign, along with President Barack Obama's administration, have accused WikiLeaks of cooperating with Russian hackers in an effort to raise questions about the legitimacy of the upcoming U.S. presidential election.To read this article in full or to leave a comment, please click here]]> 2016-10-17T08:48:54+00:00 http://www.networkworld.com/article/3131383/wikileaker-assanges-internet-access-cut-by-a-state-actor.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=202815 False None None None Network World - Magazine Info Lawmakers question DOJ\'s appeal of Microsoft Irish data case July court decision quashing a search warrant that would have required Microsoft to disclose contents of emails stored on a server in Ireland.Last Thursday, Preet Bharara, U.S. Attorney for the Southern District of New York, filed an appeal of the ruling by a three-judge panel of the U.S. Court of Appeals for the Second Circuit.To read this article in full or to leave a comment, please click here]]> 2016-10-17T08:19:04+00:00 http://www.networkworld.com/article/3131542/lawmakers-question-dojs-appeal-of-microsoft-irish-data-case.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=202816 False None None None Network World - Magazine Info Dyre banking Trojan successor rears its ugly head To read this article in full or to leave a comment, please click here]]> 2016-10-17T07:19:39+00:00 http://www.networkworld.com/article/3131537/dyre-banking-trojan-successor-rears-its-ugly-head.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=202657 False None None None Network World - Magazine Info Cybersecurity Canon Book Report: There Will Be Cyberwar Cybersecurity Canon.  For those that are not, the goal of the cybersecurity canon is as follows:To identify a list of must-read books for all cybersecurity practitioners – be they from industry, government or academia -- where the content is timeless, genuinely represents an aspect of the community that is true and precise, reflects the highest quality and, if not read, will leave a hole in the cybersecurity professional's education that will make the practitioner incomplete.                To read this article in full or to leave a comment, please click here]]> 2016-10-17T06:55:00+00:00 http://www.networkworld.com/article/3131380/security/cybersecurity-canon-book-report-there-will-be-cyberwar.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=202495 False None None None Network World - Magazine Info 5 tools for making sense of system logs investigate security problems, prevent outages and improve the online customer experience. In essence, logs are a specialized source of business intelligence, while also providing an audit trail for regulatory compliance.Five of the top log management software products are Splunk, LogRhythm, AlienVault, HPE ArcSight Logger and SevOne, according to online reviews by enterprise users in the IT Central Station community. Those users say that the most important criteria to consider when choosing log management software are speed, stability, ease of use, and robust search capabilities.To read this article in full or to leave a comment, please click here]]> 2016-10-17T06:33:00+00:00 http://www.networkworld.com/article/3131003/security/5-tools-for-making-sense-of-system-logs.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=202496 False None None None Network World - Magazine Info How to avoid being the next Yahoo VArmour CEO Tim Eades offers a few questions decision makers should be asking to ensure they keep their organizations from being the next Yahoo.If we were subject to a data breach, how would our controls and processes appear when described on tomorrow's front page news?  Why is this important?To read this article in full or to leave a comment, please click here]]> 2016-10-17T06:26:00+00:00 http://www.networkworld.com/article/3131618/security/how-to-avoid-being-the-next-yahoo.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=202497 False None Yahoo None Network World - Magazine Info Check Point SandBlast takes endpoint protection to another level its SandBlast line.SandBlast has been around for several years, but received several significant updates over the past year to make it a truly effective endpoint protection product that can handle a wide variety of zero-day exploits across your entire enterprise.The goal behind SandBlast is simply stated: you want to lock down as many entry points for malware as possible, and make your network less of a target for hackers to establish a beachhead and run these exploits.To read this article in full or to leave a comment, please click here]]> 2016-10-17T02:59:00+00:00 http://www.networkworld.com/article/3130820/endpoint-protection/check-point-sandblast-takes-endpoint-protection-to-another-level.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=202251 False None None None Network World - Magazine Info New products of the week 10.17.16 Our roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.ScreenBeam 960actiontech960Key features: ScreenBeam 960 is an enterprise-grade wireless display receiver for business professionals, medical practitioners and educators who need wireless display connectivity to collaborate, create and communicate. More info.§Â  For medium-to-large scale deployments§Â  Designed specifically for commercial applications and dense wireless environments§Â  No Wi-Fi network required§Â  Supports Windows 7/8, 8.1 and 10To read this article in full or to leave a comment, please click here]]> 2016-10-17T02:56:00+00:00 http://www.networkworld.com/article/3130993/lan-wan/new-products-of-the-week-10-17-16.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=202252 False None None None Network World - Magazine Info 13% off AmazonBasics 17-Sheet Micro-Cut Paper, CD, and Credit Card Shredder - Deal Alert read reviews). Its typical list price of $165 has been reduced 13% to $144.To read this article in full or to leave a comment, please click here]]> 2016-10-16T13:02:00+00:00 http://www.networkworld.com/article/3131339/security/13-off-amazonbasics-17-sheet-micro-cut-paper-cd-and-credit-card-shredder-deal-alert.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=201152 False None None None Network World - Magazine Info GitLab deleted then restored list of online stores infected with skimming software hidden skimming software” in the form of malicious JavaScript code; it was far from the only store which hackers had compromised via exploiting vulnerabilities in unpatched versions of ecommerce platforms, such as Magento. In fact, at least 5,925 stores were unwittingly participating in online skimming attacks run by multiple cybercriminal groups. Dutch researcher Willem de Groot estimated that 85 stores are compromised daily.To read this article in full or to leave a comment, please click here]]> 2016-10-16T08:31:00+00:00 http://www.networkworld.com/article/3131608/security/gitlab-deleted-then-restored-list-of-online-stores-infected-with-skimming-software.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=200794 False None None None Network World - Magazine Info Secret Service IT security lambasted by Homeland Security inspector general scathing report on the agency tasked with protecting the President and other important government officials.+More on Network World: Federal cyber incidents grew an astounding 1,300% between 2006 and 2015+To read this article in full or to leave a comment, please click here]]> 2016-10-14T13:49:00+00:00 http://www.networkworld.com/article/3131584/security/secret-service-it-security-lambasted-by-homeland-security-inspector-general.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=198115 False None None None Network World - Magazine Info US lawmakers want answers on Yahoo email surveillance in a letter to the two agencies.The first news reports about the program contained "conflicting reports about which legal authority was used" for the email scans, said the letter, organized by Representatives Justin Amash, a Michigan Republican, and Ted Lieu, a California Democrat.To read this article in full or to leave a comment, please click here]]> 2016-10-14T08:31:04+00:00 http://www.networkworld.com/article/3131008/us-lawmakers-want-answers-on-yahoo-email-surveillance.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=197489 False None Yahoo None Network World - Magazine Info British navy sends robots to sea in military exercise To read this article in full or to leave a comment, please click here]]> 2016-10-14T07:31:32+00:00 http://www.networkworld.com/article/3131509/british-navy-sends-robots-to-sea-in-military-exercise.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=197356 False None None None Network World - Magazine Info GlobalSign certificate revocation error leaves websites inaccessible To read this article in full or to leave a comment, please click here]]> 2016-10-14T07:15:16+00:00 http://www.networkworld.com/article/3131317/globalsign-certificate-revocation-error-leaves-websites-inaccessible.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=197357 False None None None Network World - Magazine Info IT Attrition Could Help Address the Cybersecurity Skills Shortage report by ESG and the Information Systems Security Association (ISSA), 46% of cybersecurity professionals are solicited to consider other cybersecurity jobs by various types of recruiters at least once per week!  This situation has led to salary inflation and massive disruption. To read this article in full or to leave a comment, please click here]]> 2016-10-14T06:52:00+00:00 http://www.networkworld.com/article/3131348/security/it-attrition-could-help-address-the-cybersecurity-skills-shortage.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=197217 False None None None Network World - Magazine Info University IT employees fighting for jobs question security To read this article in full or to leave a comment, please click here]]> 2016-10-14T04:53:00+00:00 http://www.networkworld.com/article/3131369/careers/university-it-employees-fighting-for-jobs-question-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=197052 False None None None Network World - Magazine Info Survey says many companies want to phase out passwords the study. Not surprisingly, SecureAuth sells alternatives to password-based logins.To read this article in full or to leave a comment, please click here]]> 2016-10-13T18:07:20+00:00 http://www.networkworld.com/article/3131307/survey-says-many-companies-want-to-phase-out-passwords.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=196593 False None None None Network World - Magazine Info Verizon signals Yahoo data breach may affect acqusition To read this article in full or to leave a comment, please click here]]> 2016-10-13T14:11:36+00:00 http://www.networkworld.com/article/3130720/verizon-signals-yahoo-data-breach-may-affect-acqusition.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=196311 False None Yahoo None Network World - Magazine Info Thousands of online shops compromised for credit card theft blog post.To read this article in full or to leave a comment, please click here]]> 2016-10-13T11:17:37+00:00 http://www.networkworld.com/article/3131036/thousands-of-online-shops-compromised-for-credit-card-theft.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=196145 False None None None Network World - Magazine Info What is MANRS and does your network have it? Internet Society (ISOC), a cause-driven nonprofit organization that seeks to promote the open development, evolution and use of the Internet and the parent organization of the Internet Engineering Task Force (IETF) standards body, is moving to change that. In 2014, ISOC introduced its Mutually Agreed Norms for Routing Security (MANRS) initiative. Today ISOC announced that the initiative membership has more than quadrupled in its first two years, growing from its initial nine network operators to 42 network operators today.To read this article in full or to leave a comment, please click here]]> 2016-10-13T09:48:00+00:00 http://www.networkworld.com/article/3130818/security/what-is-manrs-and-does-your-network-have-it.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=195930 False Guideline None None Network World - Magazine Info The OPM breach report: A long time coming To read this article in full or to leave a comment, please click here]]> 2016-10-13T09:46:00+00:00 http://www.networkworld.com/article/3131029/security/the-opm-breach-report-a-long-time-coming.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=195931 False None None None Network World - Magazine Info President Obama targets nasty space weather response with Executive Order Executive Order that defines what the nation's response should be to a catastrophic space weather event that takes out large portions of the electrical power grid, resulting in cascading failures that would affect key services such as water supply, healthcare, and transportation.+More on Network World: NASA: Top 10 space junk missions+To read this article in full or to leave a comment, please click here]]> 2016-10-13T09:03:00+00:00 http://www.networkworld.com/article/3130650/security/president-obama-targets-nasty-space-weather-response-with-executive-order.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=195932 False None None None Network World - Magazine Info Cisco patches critical authentication flaw in conferencing servers an advisory.The flaw affects Cisco Meeting Server versions prior to 2.0.6 with XMPP enabled, as well as versions of the Acano Server prior to 1.8.18 and prior to 1.9.6. If upgrading to the latest releases is not immediately possible, administrators are advised to disable XMPP on their servers and keep using the other available protocols.To read this article in full or to leave a comment, please click here]]> 2016-10-13T06:45:03+00:00 http://www.networkworld.com/article/3130761/cisco-patches-critical-authentication-flaw-in-conferencing-servers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=195567 False None None None