www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-15T13:53:28+00:00 www.secnews.physaphae.fr Network World - Magazine Info Darkweb marketplaces can get you more than just spam and phish Image by ThinkstockUnderground markets offer a great variety of services for cyber criminals to profit from. These forums offer items ranging from physical world items like drugs and weapons to digital world items such as spam/phishing delivery, exploit kit services, "Crypters", "Binders", custom malware development, zero-day exploits, and bulletproof hosting.To read this article in full or to leave a comment, please click here]]> 2016-10-13T05:46:00+00:00 http://www.networkworld.com/article/3130813/security/darkweb-marketplaces-can-get-you-more-than-just-spam-and-phish.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=195441 False None None None Network World - Magazine Info Yahoo shows that breach impacts can go far beyond remediation expenses Yahoo breach, for example, which could lead to a $1 billion drop in the company's value.To read this article in full or to leave a comment, please click here]]> 2016-10-13T05:42:00+00:00 http://www.networkworld.com/article/3130611/security/yahoo-shows-that-breach-impacts-can-go-far-beyond-remediation-expenses.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=195442 False Guideline Yahoo None Network World - Magazine Info IDG Contributor Network: Beyond logging: Using SIEM to combat security, compliance issues SIEM market dynamics in play +To read this article in full or to leave a comment, please click here]]> 2016-10-13T05:30:00+00:00 http://www.networkworld.com/article/3130306/data-center/beyond-logging-using-siem-to-combat-security-compliance-issues.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=195443 False None None None Network World - Magazine Info How CSOs can better manage third-party risks 2016-10-13T05:00:00+00:00 http://www.networkworld.com/video/70075/how-csos-can-better-manage-third-party-risks#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=195455 False None None None Network World - Magazine Info Cisco fashions tactical ransomware defense Ransomware Defense can incorporate a range of Cisco products and address different levels of concern customers might have about ransomware, says Dan Hubbard, the CTO for Cisco's security business.More on Network World: Cisco Talos: Spam at levels not seen since 2010To read this article in full or to leave a comment, please click here]]> 2016-10-12T14:59:00+00:00 http://www.networkworld.com/article/3130805/cisco-subnet/cisco-fashions-tactical-ransomware-defense.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=194467 False None None None Network World - Magazine Info Feds want to set a trail for future AI advances Preparing for the Future of Artificial Intelligence. In it, the report comes to several conclusions – some obvious and some perhaps less so. For example, it accepts that AI technologies will continue to grow in sophistication and ubiquity, thanks to AI R&D investments by government and industry.To read this article in full or to leave a comment, please click here]]> 2016-10-12T14:43:00+00:00 http://www.networkworld.com/article/3130750/security/feds-want-to-set-a-trail-for-future-ai-advances.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=194434 False None None None Network World - Magazine Info Putin denies any Russian interest in alleged US election hacking publicly blamed the Russian government last Friday for hacking U.S. officials and political groups in an effort to influence the upcoming presidential election.Stolen documents from those hacks, including sensitive emails, have been leaking online over the past months, potentially hurting the election chances of Democratic presidential candidate Hillary Clinton.To read this article in full or to leave a comment, please click here]]> 2016-10-12T12:37:21+00:00 http://www.networkworld.com/article/3130745/putin-denies-any-russian-interest-in-alleged-us-election-hacking.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=194325 False None None None Network World - Magazine Info The Truth About Cybersecurity Certifications To read this article in full or to leave a comment, please click here]]> 2016-10-12T11:52:00+00:00 http://www.networkworld.com/article/3130704/security/the-truth-about-cybersecurity-certifications.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=194210 False None None None Network World - Magazine Info IDG Contributor Network: A night to remember: Engineering lessons from the Titanic RMS Titanic was discovered resting on the ocean floor. The legend of its sinking has been retold many times in books and movies. One compelling aspect of the story is the safety claims made by its creators. Even as reports of the disaster began to filter into New York, the vice president of the White Star Line stated, without qualification, “We place absolute confidence in the Titanic. We believe that the boat is unsinkable.” Obviously reality betrayed those maritime engineers' confidence.What lessons might this famous disaster teach engineers in modern data centers? In particular, how do we prevent hostile attacks-the “icebergs” that lurk on the seas we sail-from causing catastrophic breaches?To read this article in full or to leave a comment, please click here]]> 2016-10-12T08:31:00+00:00 http://www.networkworld.com/article/3129246/security/a-night-to-remember-engineering-lessons-from-the-titanic.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=193831 False None APT 32 None Network World - Magazine Info Foreign spies used RAT to hack Australian weather bureau with weak security controls Bureau of Meteorology systems was hacked, unnamed government officials immediately blamed China and China immediately denied the “groundless accusations.” When the hack hit the news in December 2015, the Bureau of Meteorology (BOM) would not confirm if its systems had been compromised. In April, Australian's Prime Minister did confirm there had been a “significant cyber intrusion” at the Bureau.To read this article in full or to leave a comment, please click here]]> 2016-10-12T08:18:00+00:00 http://www.networkworld.com/article/3130472/security/foreign-spies-used-rat-to-hack-australian-weather-bureau-with-weak-security-controls.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=193832 False None None None Network World - Magazine Info 10 highest-paying IT security jobs Image by ThinkstockData breaches, DDOS attacks, hacks and threats continue to dominate the headlines, so it's no surprise that some of the most in-demand IT jobs are in the security area. And with a massive skills gap, companies are willing to pay handsomely for skilled security talent at all levels. "One area we're still seeing huge demand for is in cybersecurity, and hiring companies are willing to pay whatever it takes for talent that can help secure data and mitigate threats while simultaneously ensuring consistent and simplified accessibility from desktop to mobile devices. Companies are sending the message with their budgets: you can't put a price on that," says Jack Cullen, CEO of IT staffing firm Modis. Here are the top 10 highest-paying security roles, culled from career site Dice.com clients' job postings and median salary range data from cloud compensation solutions firm PayScale.com. 1. Lead Software Security Engineer1. Lead Software Security EngineerImage by ThinkstockTo read this article in full or to leave a comment, please click here]]> 2016-10-12T05:36:00+00:00 http://www.networkworld.com/article/3130451/it-skills-training/10-highest-paying-it-security-jobs.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=193262 False Guideline None None Network World - Magazine Info 12 hardware and software vulnerabilities you should address now State of the Enterprise Report (Q2 2016) indicates, many organizations are unaware of the potential liabilities, which can cost millions of dollars in the case of a successful attack after a vulnerability is exploited.To read this article in full or to leave a comment, please click here]]> 2016-10-12T05:31:00+00:00 http://www.networkworld.com/article/3130507/security/12-hardware-and-software-vulnerabilities-you-should-address-now.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=193263 False None None None Network World - Magazine Info Leaky IoT devices help hackers attack e-commerce sites which produced the report.The problem first came to Akamai's attention when the content delivery network noticed attacks against its customers where the attackers were checking to see whether particular user name and password combinations were valid on the site.To read this article in full or to leave a comment, please click here]]> 2016-10-12T05:29:00+00:00 http://www.networkworld.com/article/3130333/internet-of-things/leaky-iot-devices-help-hackers-attack-e-commerce-sites.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=193264 False None None None Network World - Magazine Info Thousands of internet-connected devices are a security disaster in the making Image by ThinkstockWe talked to a host of tech experts about the state of security in the internet of things world, and found out the good, the bad, and the very ugly.Under attack by ... cameras?internet of insecure things 1Image by ThinkstockTo read this article in full or to leave a comment, please click here]]> 2016-10-12T05:28:00+00:00 http://www.networkworld.com/article/3130332/internet-of-things/thousands-of-internet-connected-devices-are-a-security-disaster-in-the-making.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=193265 False None None None Network World - Magazine Info Record IoT DDoS attacks raise bar for defenders say security researchers at Incapsula. “Likely, these are signs of things to come and we expect to deal with Mirai-powered attacks in the near future,” they say in their blog post.That concern is echoed by researchers at F5, who say, “we can definitely expect the IoT DDoSing trend to rise massively in the global threat landscape.”To read this article in full or to leave a comment, please click here]]> 2016-10-12T04:38:00+00:00 http://www.networkworld.com/article/3130504/security/record-iot-ddos-attacks-raise-bar-for-defenders.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=193078 False None None None Network World - Magazine Info Facebook, Twitter cut access to monitoring tool used by police Tuesday report.Through a public records request, the ACLU found that Geofeedia had entered into agreements with Facebook, Twitter, and Instagram for their users' data.To read this article in full or to leave a comment, please click here]]> 2016-10-11T13:18:55+00:00 http://www.networkworld.com/article/3130174/facebook-twitter-cut-access-to-monitoring-tool-used-by-police.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=191444 False None None None Network World - Magazine Info Microsoft released 10 patches, 6 rated critical, 5 fixed zero-day flaws new patching model. Older Windows OSes will be treated like Windows 10, with the patches all rolled into a big bundle meant to fix security and non-security issues. However, there will also be a monthly security update that is supposed to resolve that month's issues without the previous month's fixes as well. On the third Tuesday of the month, the week after Patch Tuesday, Microsoft will release a preview of the upcoming patches so the non-security fixes can be tested to make sure the big rolled up patch doesn't blow anything up on some systems.To read this article in full or to leave a comment, please click here]]> 2016-10-11T11:59:00+00:00 http://www.networkworld.com/article/3130109/security/microsoft-released-10-patches-6-rated-critical-5-fixed-zero-day-flaws.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=191281 False None None None Network World - Magazine Info Second group of hackers found also targeting SWIFT users Tuesday report from security firm Symantec.A "rough guess" is that about 100 organizations have been hit so far, based on the 74 individual computer infections detected, the security firm added.As part of their attacks, the hackers used malware to cover up records of fraudulent transactions made over SWIFT, preventing their victims from learning about the money theft.To read this article in full or to leave a comment, please click here]]> 2016-10-11T11:02:38+00:00 http://www.networkworld.com/article/3130132/second-group-of-hackers-found-also-targeting-swift-users.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=191082 False None None None Network World - Magazine Info Encrypted communications could have an undetectable backdoor To read this article in full or to leave a comment, please click here]]> 2016-10-11T09:12:31+00:00 http://www.networkworld.com/article/3130156/encrypted-communications-could-have-an-undetectable-backdoor.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=190792 False None None None Network World - Magazine Info President Obama, NASA desire Mars habitation too Obama wrote in an editorial for CNN this week. “The next step is to reach beyond the bounds of Earth's orbit. I'm excited to announce that we are working with our commercial partners to build new habitats that can sustain and transport astronauts on long-duration missions in deep space. These missions will teach us how humans can live far from Earth -- something we'll need for the long journey to Mars.”To read this article in full or to leave a comment, please click here]]> 2016-10-11T08:41:00+00:00 http://www.networkworld.com/article/3130130/security/president-obama-nasa-desire-mars-habitation-too.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=190659 False None None None Network World - Magazine Info Netgear goes even more flexible with Arlo Pro video security cameras To read this article in full or to leave a comment, please click here]]> 2016-10-11T08:07:00+00:00 http://www.networkworld.com/article/3130210/consumer-electronics/netgear-goes-even-more-flexible-with-arlo-pro-video-security-cameras.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=190660 False None None None Network World - Magazine Info Microsoft fleshes out seismic change to Windows patching post to a company blog accompanied by graphics that resembled a periodic table, Michael Niehaus, a product marketing director for Windows 10, fleshed out the massive change in how Windows 7, the standard in business and the most popular OS on the planet, will be serviced starting with this month's Patch Tuesday.Microsoft announced the new plan two months ago, saying then that as of Oct. 11 it would offer only cumulative security updates for Windows 7 and 8.1, ending the decades-old practice of letting customers choose which patches they apply.To read this article in full or to leave a comment, please click here]]> 2016-10-11T07:04:00+00:00 http://www.networkworld.com/article/3130208/computers/microsoft-fleshes-out-seismic-change-to-windows-patching.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=190571 False None None None Network World - Magazine Info Yahoo Mail suspends automatic mail forwarding as privacy controversies swirl changing email accounts-for Yahoo Mail users. Anyone who has already enabled the feature is not affected, but others cannot activate it.On its help pages, Yahoo says mail forwarding is currently under development. “While we work to improve it, we've temporarily disabled the ability to turn on Mail Forwarding for new forwarding addresses,” the help page says.To read this article in full or to leave a comment, please click here]]> 2016-10-11T06:55:00+00:00 http://www.networkworld.com/article/3130205/cloud-computing/yahoo-mail-suspends-automatic-mail-forwarding-as-privacy-controversies-swirl.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=190437 False None Yahoo None Network World - Magazine Info A breach alone means liability writer and lawyer, brought an interesting turn of events to my attention last week. We need to pay heed: A litigant can have standing in a U.S. Federal breach case where no personal fraud or identity theft has yet occurred.Usually, a litigant has to have suffered injury-a breech caused them identity theft or other fraudulent activity based upon information released in a security breach. This means if you're cracked, you can be liable if personally identifiable information is released, exfiltrated, absconded, whatever. It also means that should you believe the axiom that currently most of us are hacked, we're in for a litigious treat. To read this article in full or to leave a comment, please click here]]> 2016-10-11T04:00:00+00:00 http://www.networkworld.com/article/3128859/security/a-breach-alone-means-liability.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=190204 False None APT 17 None Network World - Magazine Info WikiLeaks dumps another trove of email, allegedly from Clinton aide publicly blamed the Russian government for hacking the emails of U.S. officials and political groups earlier this year.To read this article in full or to leave a comment, please click here]]> 2016-10-10T16:20:43+00:00 http://www.networkworld.com/article/3129729/wikileaks-dumps-another-trove-of-email-allegedly-from-clinton-aide.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=188805 False None None None Network World - Magazine Info Potential Apple Watch snooping: a not-so-paranoid cyberespionage risk reportedly being told. They've recently been banned from wearing Apple Watches during cabinet meetings on fears that the devices could be hacked by Russian cyberspies, according to The Telegraph.Mobile phones have already been prohibited from cabinet meetings, but the U.K. government has reportedly taken the extra step of also banning smart watches.To read this article in full or to leave a comment, please click here]]> 2016-10-10T13:48:31+00:00 http://www.networkworld.com/article/3129454/potential-apple-watch-snooping-a-not-so-paranoid-cyberespionage-risk.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=188525 False None None None Network World - Magazine Info Certificate policy violations force reform at StartCom and WoSign Apple followed suit and announced its own ban for future WoSign and StartCom certificates last week.To read this article in full or to leave a comment, please click here]]> 2016-10-10T08:05:57+00:00 http://www.networkworld.com/article/3129261/certificate-policy-violations-force-reform-at-startcom-and-wosign.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=187627 False None None None Network World - Magazine Info Doxing, trolling and \'grossly offensive\' communications are now illegal in the UK stressed to the BCC that prosecutors can't use the guidelines to “stifle free speech.” People in the UK better check out what actions are now illegal since saying you didn't know it was illegal just won't cut it.To read this article in full or to leave a comment, please click here]]> 2016-10-10T07:30:00+00:00 http://www.networkworld.com/article/3129362/security/doxing-trolling-and-grossly-offensive-communications-are-now-illegal-in-the-uk.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=187426 False None None None Network World - Magazine Info What IT admins love/hate about 8 top network monitoring tools To read this article in full or to leave a comment, please click here]]> 2016-10-10T03:37:00+00:00 http://www.networkworld.com/article/3126746/network-management/what-it-admins-love-hate-about-8-top-network-monitoring-tools.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=186582 False None None None Network World - Magazine Info New products of the week 10.10.16 Our roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.NetScaler VPX 100G citrixKey features: NetScaler VPX 100G is the industry's first fully-featured, virtualized ADC that delivers 100 Gigabits per second performance on commodity hardware. More info.To read this article in full or to leave a comment, please click here]]> 2016-10-10T02:51:00+00:00 http://www.networkworld.com/article/3128864/cloud-computing/new-products-of-the-week-10-10-16.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=186357 False None None None Network World - Magazine Info 3 replacement Galaxy Note 7 phones caught fire in the past week To read this article in full or to leave a comment, please click here]]> 2016-10-09T09:41:00+00:00 http://www.networkworld.com/article/3129468/security/3-replacement-galaxy-note-7-phones-caught-fire-in-the-past-week.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=183718 False None None None Network World - Magazine Info US may use sanctions to punish Russia for election hacking blames on the Russian government could include sanctions against that country. The administration has said that it has a range of options, including economic sanctions, to respond to Russian cyber attacks. On Friday, a Republican lawmaker said he would propose legislation to move those sanctions forward. Senator Cory Gardner, who represents Colorado, said his planned legislation would mandate that the U.S. government investigate Russian cyber criminals and sanction them when appropriate.To read this article in full or to leave a comment, please click here]]> 2016-10-07T17:40:58+00:00 http://www.networkworld.com/article/3128879/us-may-use-sanctions-to-punish-russia-for-election-hacking.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=177535 False None None None Network World - Magazine Info US officially blames Russian government for election-related hacking statement on Friday.They allege that the Russian government compromised the emails of U.S. officials and institutions and then publicly leaked them online through sites such as WikiLeaks, DCLeaks, and the anonymous hacker Guccifer 2.0, who took credit for breaching the Democratic National Committee earlier this year.To read this article in full or to leave a comment, please click here]]> 2016-10-07T13:50:29+00:00 http://www.networkworld.com/article/3129303/us-officially-blames-russian-government-for-election-related-hacking.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=176845 False None None None Network World - Magazine Info 4 ways Cognizant customers can protect themselves amid corruption probe To read this article in full or to leave a comment, please click here]]> 2016-10-07T06:12:00+00:00 http://www.networkworld.com/article/3129304/security/4-ways-cognizant-customers-can-protect-themselves-amid-corruption-probe.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=175776 False None None None Network World - Magazine Info IDG Contributor Network: DDoS attacks using IoT devices follow The Manchurian Candidate model The Manchurian Candidate, two soldiers are kidnapped and brainwashed into sleeper agents. Later the soldiers become unwitting assassins when activated by a handler.  Sound familiar? It should.Hackers use a similar model for Distributed Denial of Service (DDoS) attacks using IoT devices. This process has four phases. Capture: Identify and take over control of IoT devices Subvert: Reprogram the device to conduct malicious acts Activate: Instruct the hacked device to launch attack Attack: Launch the DDoS attack  Why are such attacks increasing? How can IoT device security be hardened? What DDoS protections are available? What advisory resources are available? Let's take a look.To read this article in full or to leave a comment, please click here]]> 2016-10-07T04:00:00+00:00 http://www.networkworld.com/article/3128372/internet-of-things/ddos-attacks-using-iot-devices-follow-the-manchurian-candidate-model.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=175443 False None None None Network World - Magazine Info How to keep IT security together in a company that\'s gone bankrupt Image by peteThe supply chain upon which modern multinational commerce depends was thrown into chaos earlier this year when South Korea's Hanjin Shipping filed for bankruptcy. Dozens of container ships with hundreds of crew and thousands of pounds of cargo onboard were essentially stranded at sea, as ports barred the ships' entry for fear that they wouldn't be able to pay for docking services.To read this article in full or to leave a comment, please click here]]> 2016-10-07T03:41:00+00:00 http://www.networkworld.com/article/3129225/security/how-to-keep-it-security-together-in-a-company-thats-gone-bankrupt.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=175177 True None None None Network World - Magazine Info How Shodan helped bring down a ransomware botnet according to report released last week.The ransomware first appeared in the summer of 2015. It didn't make a big impact -- in March, Cylance reported that it had just 1,818 victims, only eight of whom had paid the ransom.To read this article in full or to leave a comment, please click here]]> 2016-10-07T03:40:00+00:00 http://www.networkworld.com/article/3129224/security/how-shodan-helped-bring-down-a-ransomware-botnet.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=175178 False None None None Network World - Magazine Info IDG Contributor Network: IoT security guidance emerges startling findings and predictions in that report. Since then, questions have arisen as to just how one should approach the security needs of the soon-to-be billions of networked, smart, cheap sensors expanding around the globe like popcorn.To read this article in full or to leave a comment, please click here]]> 2016-10-07T03:01:00+00:00 http://www.networkworld.com/article/3128390/internet-of-things/iot-security-guidance-emerges.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=175179 False None None None Network World - Magazine Info Verizon may want a $1 billion discount on Yahoo Thursday report by the New York Post.Tim Armstrong, the head of AOL, which Verizon acquired in 2015, reportedly has met with Yahoo executives about reducing the acquisition price.  "He's pretty upset about the lack of disclosure and he's saying can we get out of this or can we reduce the price?" the report said, quoting what it called a source familiar with Verizon's thinking.To read this article in full or to leave a comment, please click here]]> 2016-10-06T17:40:02+00:00 http://www.networkworld.com/article/3128976/verizon-may-want-a-1-billion-discount-on-yahoo.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=173258 False None Yahoo None Network World - Magazine Info How companies can deal with insider data theft recent arrest of a former NSA contractor suspected of stealing classified government files is just the latest high-profile example, and security experts say all companies need to be on guard against potential insider threats.How serious is the threat? It's not every day that thieving employees take to the digital black market to sell their company's sensitive information, but it does happen, and incidents have been occurring more frequently, said Andrei Barysevich, a director at security firm Flashpoint.To read this article in full or to leave a comment, please click here]]> 2016-10-06T16:40:25+00:00 http://www.networkworld.com/article/3128968/how-companies-can-deal-with-insider-data-theft.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=173175 False None None None Network World - Magazine Info How to shield your company from cyber enforcement To read this article in full or to leave a comment, please click here]]> 2016-10-06T13:19:00+00:00 http://www.networkworld.com/article/3128763/leadership-management/how-to-shield-your-company-from-cyber-enforcement.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=172793 False Guideline None None Network World - Magazine Info How Google Home\'s \'always on\' will affect privacy Google Home is the company's entry into the smart home market.Want Google Home to play your favorite song? Just say, "OK, Google" and ask for it to play the music. Want the device, which is equipped with its artificial-intelligence based Assistant, to play that funny cat video from YouTube on your TV? You get the picture.To read this article in full or to leave a comment, please click here]]> 2016-10-06T12:31:00+00:00 http://www.networkworld.com/article/3128852/consumer-electronics/how-google-homes-always-on-will-affect-privacy.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=172794 False None None None Network World - Magazine Info Spammers prefer Trump over Clinton, but are rapidly losing faith in Trump To read this article in full or to leave a comment, please click here]]> 2016-10-06T11:16:00+00:00 http://www.networkworld.com/article/3128733/internet/spammers-prefer-trump-over-clinton-but-are-rapidly-losing-faith-in-trump.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=172220 False None None None Network World - Magazine Info What CSOs can learn from the Yahoo breach 2016-10-06T10:51:00+00:00 http://www.networkworld.com/video/70396/what-csos-can-learn-from-the-yahoo-breach#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=172155 False Guideline Yahoo None Network World - Magazine Info FCC to vote on strict privacy rules for ISPs in late October the proposal puts stronger privacy rules in place for them than for internet companies like Google and Facebook. But FCC Chairman Tom Wheeler has scheduled a final vote on the regulations for Oct. 27.Broadband customers should have the ability to make informed decisions about their privacy, and the rules are designed to help them, FCC officials said in a press briefing,To read this article in full or to leave a comment, please click here]]> 2016-10-06T09:54:07+00:00 http://www.networkworld.com/article/3128806/fcc-to-vote-on-strict-privacy-rules-for-isps-in-late-october.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=172071 False None None None Network World - Magazine Info Spotify ads slipped malware onto PCs and Macs support forums. “We have now identified the source of the problem and have shut it down. We will continue to monitor the situation.”To read this article in full or to leave a comment, please click here]]> 2016-10-06T08:00:00+00:00 http://www.networkworld.com/article/3128727/security/spotify-ads-slipped-malware-onto-pcs-and-macs.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=171975 False None None None Network World - Magazine Info The State of Cybersecurity Professional Careers To read this article in full or to leave a comment, please click here]]> 2016-10-06T07:07:00+00:00 http://www.networkworld.com/article/3128222/security/the-state-of-cybersecurity-professional-careers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=171862 False None None None Network World - Magazine Info EU privacy watchdogs have questions about Yahoo\'s secret email scanning Yahoo had built a system for U.S. government agencies to search all of its users' incoming emails. Other tech companies were quick to distance themselves, saying they would have challenged any such request in court.To read this article in full or to leave a comment, please click here]]> 2016-10-06T06:44:03+00:00 http://www.networkworld.com/article/3128377/eu-privacy-watchdogs-have-questions-about-yahoos-secret-email-scanning.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=171674 False None Yahoo None Network World - Magazine Info Security vs. privacy: The endless fiery debate continues To read this article in full or to leave a comment, please click here]]> 2016-10-06T06:16:00+00:00 http://www.networkworld.com/article/3128370/security/security-vs-privacy-the-endless-fiery-debate-continues.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=171677 False None None None Network World - Magazine Info Yahoo\'s secret email scans helped the FBI probe terrorists new report from The New York Times that provided more details on Yahoo's email scanning.  The report on Wednesday report didn't identify the signature or say if it involved any cryptographic computer code. But the article said it was the U.S. Department of Justice, and not the National Security Agency, that had obtained a court order forcing Yahoo to comply. A Reuters report on Tuesday wasn't clear about what agencies were involved in the probe.To read this article in full or to leave a comment, please click here]]> 2016-10-05T16:06:20+00:00 http://www.networkworld.com/article/3128308/yahoos-secret-email-scans-helped-the-fbi-probe-terrorists.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=168746 False None Yahoo None Network World - Magazine Info Phishing still fools people, but at least more are cautious Carnegie Mellon University's CyLab in a study titled "Quantifying Phishing Susceptibility for Detection and Behavior Decisions" that published recently in the journal Human Factors.MORE: New tech can help catch spearphishing attacksTo read this article in full or to leave a comment, please click here]]> 2016-10-05T14:03:00+00:00 http://www.networkworld.com/article/3127606/security/phishing-still-fools-people-but-at-least-more-are-cautious.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=168392 False None None None Network World - Magazine Info FBI arrests an NSA contractor suspected of stealing hacking tools said on Wednesday.Martin, who held a top-secret national security clearance, allegedly took six classified documents produced in 2014."These documents were produced through sensitive government sources, methods, and capabilities, which are critical to a wide variety of national security issues," the DOJ said. To read this article in full or to leave a comment, please click here]]> 2016-10-05T11:32:24+00:00 http://www.networkworld.com/article/3128225/fbi-arrests-an-nsa-contractor-suspected-of-stealing-hacking-tools.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=167763 False None None None Network World - Magazine Info IDG Contributor Network: Many people abandon security, risky behavior surges report (subscription) on the subject in IEEE's IT Professional Journal.The study's participants “expressed a sense of resignation and loss of control” when the scientists asked them about their online activity, such as shopping and banking.To read this article in full or to leave a comment, please click here]]> 2016-10-05T11:28:00+00:00 http://www.networkworld.com/article/3128054/security/many-people-abandon-security-risky-behavior-surges.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=167764 False None None None Network World - Magazine Info Creepy clown craze actually addressed at White House press conference sheriff consulting with the FBI and Homeland Security over the clown threat, and now creepy clowns have even been addressed during a White House press conference.On Tuesday, Bloomberg's Justin Sink asked White House press secretary Josh Earnest about the creepy clown craze. Sink mentioned that the New York Times reported 12 people have been arrested for either making fake clown reports, threats, or chasing people, and law enforcement is seeking clown advise from DHS and the FBI. He asked if President Obama was keeping tabs on the creepy clown phenomena and if the White House had any comments to discourage clown pranks.To read this article in full or to leave a comment, please click here]]> 2016-10-05T10:02:00+00:00 http://www.networkworld.com/article/3128164/security/creepy-clown-craze-actually-addressed-at-white-house-press-conference.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=167590 False None None None Network World - Magazine Info Guccifer 2.0 claims to have hacked the Clinton Foundation posted several documents Tuesday that he claims to have taken from servers at the Clinton Foundation, the charity founded by former U.S. President Bill Clinton, husband of Democratic presidential candidate Hillary Clinton.Earlier this year, Guccifer 2.0 claimed to have hacked both the Democratic National Committee and the Democratic Congressional Campaign Committee (DCCC), and the new documents appear to be more of the same. To read this article in full or to leave a comment, please click here]]> 2016-10-05T08:07:43+00:00 http://www.networkworld.com/article/3127574/guccifer-2-0-claims-to-have-hacked-the-clinton-foundation.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=167250 False None None None Network World - Magazine Info Yahoo calls report of secret email scanning \'misleading\' Reuters article claimed that Yahoo had created the custom software program after receiving a classified U.S. government order.  That software program is reportedly capable of scanning all incoming emails from Yahoo customers for information provided by U.S. intelligence officials.However, on Wednesday Yahoo disputed the report.“We narrowly interpret every government request for user data to minimize disclosure. The mail scanning described in the article does not exist on our systems," the company said in an email. To read this article in full or to leave a comment, please click here]]> 2016-10-05T07:30:06+00:00 http://www.networkworld.com/article/3128124/yahoo-calls-report-of-secret-email-scanning-misleading.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=167099 False Guideline Yahoo None Network World - Magazine Info Cerber ransomware kills database connections to access important data To read this article in full or to leave a comment, please click here]]> 2016-10-05T06:46:05+00:00 http://www.networkworld.com/article/3127811/cerber-ransomware-kills-database-connections-to-access-important-data.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=166933 False None None None Network World - Magazine Info Q&A: The myths and realities of hacking an election To read this article in full or to leave a comment, please click here]]> 2016-10-05T04:40:00+00:00 http://www.networkworld.com/article/3128079/security/qa-the-myths-and-realities-of-hacking-an-election.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=166492 False None None None Network World - Magazine Info Hacking an election is about influence and disruption, not voting machines it's because the vote was rigged.To read this article in full or to leave a comment, please click here]]> 2016-10-05T04:39:00+00:00 http://www.networkworld.com/article/3128086/security/hacking-an-election-is-about-influence-and-disruption-not-voting-machines.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=166493 False None None None Network World - Magazine Info One election-system vendor uses developers in Serbia Voting machines are privately manufactured and developed and, as with other many other IT systems, the code is typically proprietary.The use of proprietary systems in elections has its critics. One Silicon Valley group, the Open Source Election Technology Foundation, is pushing for an election system that shifts from proprietary, vendor-owned systems to one that that is owned "by the people of the United States."To read this article in full or to leave a comment, please click here]]> 2016-10-05T04:37:00+00:00 http://www.networkworld.com/article/3127599/election-hacking/one-election-system-vendor-uses-developers-in-serbia.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=166494 False None None None Network World - Magazine Info If the election is hacked, we may never know The upcoming U.S. presidential election can be rigged and sabotaged, and we might never even know it happened.This Election Day voters in 10 states, or parts of them, will use touch-screen voting machines with rewritable flash memory and no paper backup of an individual's vote; some will have rewritable flash memory. If malware is inserted into these machines that's smart enough to rewrite itself, votes can be erased or assigned to another candidate with little possibility of figuring out the actual vote.To read this article in full or to leave a comment, please click here]]> 2016-10-05T04:35:00+00:00 http://www.networkworld.com/article/3128035/election-hacking/if-the-election-is-hacked-we-may-never-know.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=166495 False None None None Network World - Magazine Info 3 nightmare election hack scenarios To read this article in full or to leave a comment, please click here]]> 2016-10-05T04:00:00+00:00 http://www.networkworld.com/article/3127803/security/3-nightmare-election-hack-scenarios.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=166506 False None None None Network World - Magazine Info Hacked voter registration systems: a recipe for election chaos To read this article in full or to leave a comment, please click here]]> 2016-10-05T04:00:00+00:00 http://www.networkworld.com/article/3127798/security/hacked-voter-registration-systems-a-recipe-for-election-chaos.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=166507 False None None None Network World - Magazine Info 5 ways to improve voting security in the US To read this article in full or to leave a comment, please click here]]> 2016-10-05T04:00:00+00:00 http://www.networkworld.com/article/3128068/security/5-ways-to-improve-voting-security-in-the-us.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=166505 False None None None Network World - Magazine Info IDG Contributor Network: Building an insider threat program that works - Part 2 Part I of this post). As a result, they have a better sense of what they require to prevail in today's evolving insider threat landscape.There is an emerging consensus that any world-class insider threat program must have the following three core characteristics:1. Preventive: Organizations want more than just a threat detection system that tells them an attack has already taken place. They need an early-warning system that allows them to prevent insider threat events through a comprehensive threat assessment framework that leverages all available internal and external data and produces far fewer false negatives and positives.To read this article in full or to leave a comment, please click here]]> 2016-10-05T03:30:00+00:00 http://www.networkworld.com/article/3127226/security/building-an-insider-threat-program-that-works-part-2.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=166272 False None None None Network World - Magazine Info US tech giants say they didn\'t do Yahoo-style email spying reportedly created last year through a classified U.S. order, involves Yahoo searching through hundreds of millions of user accounts at the behest of the National Security Agency or FBI.Other U.S. tech companies, including Google, Microsoft, Twitter and Facebook, denied doing anything like it. Most also said they would challenge such a request in court.Privacy advocates said the government enlisting Yahoo to assist in email monitoring would be wrong.To read this article in full or to leave a comment, please click here]]> 2016-10-04T17:37:53+00:00 http://www.networkworld.com/article/3127153/us-tech-giants-say-they-didnt-do-yahoo-style-email-spying.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=164312 False None Yahoo None Network World - Magazine Info WikiLeaks plans to dump more sensitive files on US election press conference.  All the U.S. election documents will be released before Nov. 8, when voters cast their ballots. The leaks pertain to "U.S. power factions and how they operate," Assange said. However, he denied deliberately trying to sabotage Democratic presidential candidate Hillary Clinton's election chances.To read this article in full or to leave a comment, please click here]]> 2016-10-04T13:19:07+00:00 http://www.networkworld.com/article/3127751/wikileaks-plans-to-dump-more-sensitive-files-on-us-election.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=163477 False None None None Network World - Magazine Info New insulin pump flaws highlights security risks from medical devices To read this article in full or to leave a comment, please click here]]> 2016-10-04T13:09:53+00:00 http://www.networkworld.com/article/3127769/new-insulin-pump-flaws-highlights-security-risks-from-medical-devices.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=163478 False None None None Network World - Magazine Info Yahoo may have allowed US government to search user emails Tuesday report from Reuters.Yahoo reportedly created the program to comply with a U.S. classified government directive. It's unclear if the mass email searching program is still in use."Yahoo is a law-abiding company and complies with the laws of the United States," the company said in a statement.To read this article in full or to leave a comment, please click here]]> 2016-10-04T11:47:19+00:00 http://www.networkworld.com/article/3127612/yahoo-may-have-allowed-us-government-to-search-user-emails.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=163129 False None Yahoo None Network World - Magazine Info After Mozilla inquiry, Apple untrusts Chinese certificate authority both iOS and macOS. "Apple products will no longer trust the WoSign CA Free SSL Certificate G2 intermediate CA."To read this article in full or to leave a comment, please click here]]> 2016-10-04T09:12:43+00:00 http://www.networkworld.com/article/3127063/after-mozilla-inquiry-apple-untrusts-chinese-certificate-authority.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=162478 False None None None Network World - Magazine Info Hackers can remotely exploit insulin pump for unauthorized insulin injections OneTouch Ping is a medical device which comes with a wireless remote control that patients can use to deliver insulin instead of accessing the device under their clothes. The Johnson & Johnson Animas device is described as a “two-part system;” the pump and a meter remote which communicates wirelessly via RF communication “to deliver insulin from the pump.”To read this article in full or to leave a comment, please click here]]> 2016-10-04T07:23:00+00:00 http://www.networkworld.com/article/3127223/security/hackers-can-remotely-exploit-insulin-pump-for-unauthorized-insulin-injections.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=162174 False None None None Network World - Magazine Info IDG Contributor Network: SoftLayer founder\'s new company, StackPath, releases app security product Application-layer DDoS attacks will increase, Kaspersky Labs predicts +To read this article in full or to leave a comment, please click here]]> 2016-10-04T06:00:00+00:00 http://www.networkworld.com/article/3126906/security/softlayer-founders-new-company-stackpath-releases-app-security-product.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=161945 False None None None Network World - Magazine Info Security for your collaborative software To read this article in full or to leave a comment, please click here]]> 2016-10-04T04:48:00+00:00 http://www.networkworld.com/article/3127389/collaboration/security-for-your-collaborative-software.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=161552 False None None None Network World - Magazine Info Turn data from risk liability into an asset reported that worldwide mobile traffic is expected to grow eightfold from 2015 to 2020 reaching 30.6 exabytes, monthly. Planning for that data inflation raises a very important question: “How can organizations ensure their data is an asset and not a liability?” To read this article in full or to leave a comment, please click here]]> 2016-10-04T04:46:00+00:00 http://www.networkworld.com/article/3127388/security/turn-data-from-risk-liability-into-an-asset.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=161553 False None None None Network World - Magazine Info IoT botnet highlights the dangers of default passwords huge DDOS attack. Unlike most botnets, which rely on infected PCs, this one used IoT devices to target its victims.It turns out the botnet was specifically designed to scan the internet for poorly secured products like cameras and then access them through easily guessable passwords like "admin" or "12345." Last Friday, the botnet's maker released its source code, and security experts have noticed it's built to try a list of more than 60 combinations of user names and passwords.To read this article in full or to leave a comment, please click here]]> 2016-10-03T17:22:47+00:00 http://www.networkworld.com/article/3127253/iot-botnet-highlights-the-dangers-of-default-passwords.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=159669 False None None None Network World - Magazine Info IoT: We\'re serfs and pawns used in large swarms and masses to wreak havoc. A colleague of mine, Stephen Satchell, says misbehaving IoT devices should bear the full front of the Consumer Product Safety Commission and be recalled, every last one of them.  Recalled. Why won't this happen? Let me speculate. It's because our own government, that is to say the more covert parts of the U.S. government, has its own cadre of botnets and control vectors that allows them interesting windows into foreign lands. To read this article in full or to leave a comment, please click here]]> 2016-10-03T12:11:00+00:00 http://www.networkworld.com/article/3126805/internet-of-things/in-the-internet-of-things-we-are-serfs-and-pawns.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=158747 False None None None Network World - Magazine Info Dell EMC patches critical flaws in VMAX enterprise storage systems To read this article in full or to leave a comment, please click here]]> 2016-10-03T12:05:14+00:00 http://www.networkworld.com/article/3126815/dell-emc-patches-critical-flaws-in-vmax-enterprise-storage-systems.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=158748 False Guideline None None Network World - Magazine Info Hackers find little demand for their stolen NSA hacking tools posted online, using broken English."TheShadowBrokers is not being interested in fame. TheShadowBrokers is selling to be making money," the hackers said.As of Monday, their auction only had one substantial bid at 1.5 bitcoins, or US $918. Many of the other bids were valued at less than $1. To read this article in full or to leave a comment, please click here]]> 2016-10-03T11:13:17+00:00 http://www.networkworld.com/article/3126806/hackers-find-little-demand-for-their-stolen-nsa-hacking-tools.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=158386 False None None None Network World - Magazine Info The craziest stories of the tech sector To read this article in full or to leave a comment, please click here]]> 2016-10-03T09:25:00+00:00 http://www.networkworld.com/article/2201498/wi-fi/wireless-network-world-s-wider-net.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=158070 False None None None Network World - Magazine Info Trump calls for US to use offensive cyberweapons To read this article in full or to leave a comment, please click here]]> 2016-10-03T08:27:48+00:00 http://www.networkworld.com/article/3126574/trump-calls-for-us-to-use-offensive-cyberweapons.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=157961 False Guideline None None Network World - Magazine Info Can credit cards with CVVs that automatically change every hour kill off card fraud? To read this article in full or to leave a comment, please click here]]> 2016-10-03T07:57:00+00:00 http://www.networkworld.com/article/3126664/security/can-credit-cards-with-cvvs-that-automatically-change-every-hour-kill-off-card-fraud.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=157962 False None None None Network World - Magazine Info IDG Contributor Network: Decoy networks are the secret to deflecting hackers International Journal of Digital Evidence (PDF).To read this article in full or to leave a comment, please click here]]> 2016-10-03T07:03:00+00:00 http://www.networkworld.com/article/3126463/security/decoy-networks-are-the-secret-to-deflecting-hackers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=157665 False None None None Network World - Magazine Info Designing your business for the 21st century 2016-10-03T07:03:00+00:00 http://www.networkworld.com/video/68837/designing-your-business-for-the-21st-century#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=157677 False None None None Network World - Magazine Info IoT malware behind record DDoS attack is now available to all hackers reported over the weekend. Krebs' website was the target of a record DDoS attack two weeks ago that was launched from the Mirai botnet.The trojan's creator, who uses the online handle Anna-senpai, said that the decision to release the source code was taken because there's a lot of attention now on IoT-powered DDoS attacks and he wants to get out of this business.To read this article in full or to leave a comment, please click here]]> 2016-10-03T07:02:14+00:00 http://www.networkworld.com/article/3126358/iot-malware-behind-record-ddos-attack-is-now-available-to-all-hackers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=157666 False None None None Network World - Magazine Info Down the rabbit hole, part 3: Linux and Tor are key to ensuring privacy, security improve the privacy and security of my life (especially as it relates to computing). And I've come to the conclusion that in order to effectively do this, I need to focus on utilizing open source software as much as possible.  What next? Let's start at a very simple, basic level: the operating system of my laptop computers (I don't actually have a desktop currently, but the same ideas will apply) and how they connect to the internet.To read this article in full or to leave a comment, please click here]]> 2016-10-03T06:27:00+00:00 http://www.networkworld.com/article/3124541/security/down-the-rabbit-hole-part-3-linux-and-tor-are-key-to-ensuring-privacy-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=157354 False None None None Network World - Magazine Info Waratek upgrades Java protection To read this article in full or to leave a comment, please click here]]> 2016-10-03T05:43:00+00:00 http://www.networkworld.com/article/3126625/security/waratek-upgrades-java-protection.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=157115 False None None None Network World - Magazine Info ICANN will generate new DNSSec key The tools you need to encrypt your communications and web data. • Maximum-security essential tools for everyday encryption. • InfoWorld's encryption Deep Dive how-to report. | Discover how to secure your systems with InfoWorld's Security newsletter. ] As the phone book of the Internet, DNS translates easy-to-remember domain names into IP addresses so that users don't have to remember strings of numbers in order to access web applications and services. However, attackers can hijack legitimate DNS requests to divert users to fraudulent sites through DNS cache poisoning or DNS spoofing.To read this article in full or to leave a comment, please click here]]> 2016-10-03T05:34:00+00:00 http://www.networkworld.com/article/3126568/security/a-first-icann-will-generate-new-dnssec-key.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=157116 True None None None Network World - Magazine Info Duct tape, modeling clay and a handgun are not standard computer parts TSA The TSA notes: “These 5-bladed floggers were discovered in a carry-on bag at Houston (IAH). All bladed items should be packed in checked baggage.”To read this article in full or to leave a comment, please click here]]> 2016-10-03T05:28:00+00:00 http://www.networkworld.com/article/3126442/security/duct-tape-modeling-clay-and-a-handgun-are-not-standard-computer-parts.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=157118 False None None None Network World - Magazine Info New products of the week 10.3.16 Our roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Daptiv TTMchangepointKey features: With Daptiv TTM, teams can better track tasks and submit timesheets, stakeholders get a more accurate view of project status, and initiatives move forward on time and on budget. More info.To read this article in full or to leave a comment, please click here]]> 2016-10-03T04:11:00+00:00 http://www.networkworld.com/article/3126259/data-center/new-products-of-the-week-10-3-16.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=156903 False None None None Network World - Magazine Info Demo: Hacking a voting machine 2016-10-03T03:00:00+00:00 http://www.networkworld.com/video/70297/demo-hacking-a-voting-machine#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=156764 False None None None Network World - Magazine Info Can you hack the vote? Yes, but not how you might think Was Trump bitten by Twitter time-stamp bug that stung Alec Baldwin's wife?+They found that while it's possible to change the number of votes cast for each candidate, it would be very difficult to do so on a large enough scale to swing the election one way or the other.To read this article in full or to leave a comment, please click here]]> 2016-10-03T03:00:00+00:00 http://www.networkworld.com/article/3126389/security/can-you-hack-the-vote-yes-but-not-how-you-might-think.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=156750 False None None None Network World - Magazine Info Shadow Brokers rant about people wanting stolen NSA-linked hacking tools for free third message. The hackers sound hurt that people don't trust them and – if cursing is any indication – the hackers are angry that the Equation Group cyber weapons auction has flopped so far.The Shadow Brokers want $1 million dollars and sound irritated that interested parties want the stolen hacking tools for free. “Peoples is having interest in free files. But people is no interest in #EQGRP_Auction.”To read this article in full or to leave a comment, please click here]]> 2016-10-02T10:19:00+00:00 http://www.networkworld.com/article/3126299/security/shadow-brokers-rant-about-people-wanting-stolen-nsa-linked-hacking-tools-for-free.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=153996 False None None None Network World - Magazine Info We don\'t need more InfoSec analysts: We need analysts to train AI infrastructures to detect attacks To read this article in full or to leave a comment, please click here]]> 2016-09-30T13:34:00+00:00 http://www.networkworld.com/article/3124538/security/we-dont-need-more-infosec-analysts-we-need-analysts-to-train-ai-infrastructures-to-detect-attacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=149327 False None None None Network World - Magazine Info By 2020, your Wi-Fi-connected car will pay for parking, gas a new report from Gartner.Over the next four years, the total number of connected cars and trucks will reach 220 million, a number that will drive a huge uptick in the delivery of digital content, such as streaming music and video, navigation and location-based services.Connected vehicles increasingly will be able to direct drivers to, and pay for, parking spaces, fuel and other services, and the technology will eventually enable increased levels of automated driving, Gartner's report stated.To read this article in full or to leave a comment, please click here]]> 2016-09-30T12:57:00+00:00 http://www.networkworld.com/article/3126350/wi-fi/by-2020-your-wi-fi-connected-car-will-pay-for-parking-gas.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=149249 False None None None Network World - Magazine Info Android malware that can infiltrate corporate networks is spreading said on Friday.DressCode hides itself inside games, user interface themes, and phone optimization boosters. It can also be difficult to detect because the malicious coding only makes up a small portion of the overall app.To read this article in full or to leave a comment, please click here]]> 2016-09-30T12:10:22+00:00 http://www.networkworld.com/article/3126428/android-malware-that-can-infiltrate-corporate-networks-is-spreading.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=149136 False None None None Network World - Magazine Info Splunk Intent on Extending Cybersecurity Leadership To read this article in full or to leave a comment, please click here]]> 2016-09-30T10:16:00+00:00 http://www.networkworld.com/article/3126347/security/splunk-intent-on-extending-cybersecurity-leadership.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=148731 False Guideline None None Network World - Magazine Info White House asks: Do you need more data portability? issued a request for information about how much is too much or too little data portability and what are the implications?+More on Network World: The weirdest, wackiest and coolest sci/tech stories of 2016 (so far!)+To read this article in full or to leave a comment, please click here]]> 2016-09-30T10:01:00+00:00 http://www.networkworld.com/article/3126031/security/white-house-asks-do-you-need-more-data-portability.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=148732 False None None None Network World - Magazine Info Firefox blocks websites with vulnerable encryption keys devised a downgrade attack that could compromise the encryption connection between browsers and servers if those servers supported DHE_EXPORT, a version of Diffie-Hellman key exchange imposed on exported cryptographic systems by the U.S. National Security Agency in the 1990s and which limited the key size to 512 bits. In May 2015 around 7 percent of websites on the internet were vulnerable to the attack, which was dubbed LogJam.To read this article in full or to leave a comment, please click here]]> 2016-09-30T09:36:16+00:00 http://www.networkworld.com/article/3126263/firefox-blocks-websites-with-vulnerable-encryption-keys.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=148463 False None None None Network World - Magazine Info Ransomware spreads through weak remote desktop credentials To read this article in full or to leave a comment, please click here]]> 2016-09-30T06:11:57+00:00 http://www.networkworld.com/article/3126252/ransomware-spreads-through-weak-remote-desktop-credentials.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=147748 False None None None Network World - Magazine Info Bounty for iOS jailbreak exploit jumps to $1.5 million $1 million last year for an exclusive iOS zero-day exploit that can remotely jailbreak a device. However, that bounty was only temporary, and it was eventually awarded last November.Zerodium's new $1.5 million bounty is asking for a remote jailbreak exploit targeting iOS 10. The bounty will be offered all year long, Chaouki Bekrar, the company's CEO, said in an email. The company's original offer was a maximum of $500,000.To read this article in full or to leave a comment, please click here]]> 2016-09-29T13:33:03+00:00 http://www.networkworld.com/article/3126013/bounty-for-ios-jailbreak-exploit-jumps-to-15-million.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=145352 False None None None