www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-14T10:34:38+00:00 www.secnews.physaphae.fr Network World - Magazine Info Microsoft opens up its \'million dollar\' bug-finder Project Springfield, that it calls one of its most sophisticated tools for finding potential security vulnerabilities.Project Springfield uses "whitebox fuzzing," which uncovered one-third of the "million dollar" security bugs during the development of Windows 7. Microsoft has been using a component of the project called SAGE since the mid-2000s to test products prior to release, including fuzzing both Windows and Office applications. [ From Docker containers and Nano Server to software-defined storage and networking improvements, Windows Server 2016 is packed with great additions: Get the scoop on Windows Server 2016 from InfoWorld. | Stay up on key Microsoft technologies with the Windows Report newsletter. ] For this project, SAGE is bundled with other tools for fuzz testing, featuring a dashboard and other interfaces that enable use by people without an extensive security background. The tests are run using Microsoft's Azure cloud.To read this article in full or to leave a comment, please click here]]> 2016-09-29T10:42:00+00:00 http://www.networkworld.com/article/3124939/application-development/microsoft-opens-up-its-million-dollar-bug-finder.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=144592 False None None None Network World - Magazine Info IDG Contributor Network: Passwords will be wirelessly transmitted through bodies University of Washington article. The secret passphrases and such are confined to the human body, so they can't be eavesdropped on.To read this article in full or to leave a comment, please click here]]> 2016-09-29T09:00:00+00:00 http://www.networkworld.com/article/3125541/security/passwords-will-be-wirelessly-transmitted-through-bodies.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=144335 False None None None Network World - Magazine Info IDG Contributor Network: The future of security: A combination of cyber and physical defense The IoT is uranium +After all, the boundaries between cyber and physical attacks are already blurring. In March, the U.S. Department of Justice claimed seven Iranians hacked the control systems of a small dam in New York state in 2013. The dam was offline for repair, preventing the hackers from controlling the flow of water. However, the incident demonstrated that hackers could take over infrastructure that was controlled by computers.To read this article in full or to leave a comment, please click here]]> 2016-09-29T06:48:00+00:00 http://www.networkworld.com/article/3125476/security/the-future-of-security-a-combination-of-cyber-and-physical-defense.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=143766 False None None None Network World - Magazine Info Why employees are still a security risk 2016-09-29T05:00:00+00:00 http://www.networkworld.com/video/70035/why-employees-are-still-a-security-risk#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=143574 False None None None Network World - Magazine Info Doctors: E-health records raise costs, don\'t help patient outcomes 2016 Survey of US Physicians" released this week found little had changed since its last report two years ago, when doctors surveyed at the time generally held negative opinions of EHRs.The latest survey found nearly all physicians would like to see improvements in EHRs, with 62% calling for them to be more interoperable and 57% looking for improved workflow and increased productivity.To read this article in full or to leave a comment, please click here]]> 2016-09-29T04:56:00+00:00 http://www.networkworld.com/article/3125609/software/doctors-e-health-records-raise-costs-dont-help-patient-outcomes.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=143561 False None Deloitte None Network World - Magazine Info FBI reports more attempts to hack voter registration system breached state election databases in Illinois and Arizona, but it appears that there have been other attempts as well, besides frequent scanning activities, which the FBI describes as preludes for possible hacking attempts."There have been a variety of scanning activities, which is a preamble for potential intrusion activities, as well as some attempted intrusions at voter registration databases beyond those we knew about in July and August," FBI Director James Comey told the House Judiciary Committee on Wednesday.To read this article in full or to leave a comment, please click here]]> 2016-09-29T01:06:39+00:00 http://www.networkworld.com/article/3125749/fbi-reports-more-attempts-to-hack-voter-registration-system.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=142863 False None None None Network World - Magazine Info The Yahoo hackers weren\'t state-sponsored, a security firm says data breach that exposed information about millions of Yahoo user accounts, a security firm said Wednesday. Yahoo has blamed state actors for the attack, but it was actually elite hackers-for-hire who did it, according to InfoArmor, which claims to have some of the stolen information.    The independent security firm found the alleged data as part of its investigation into "Group E," a team of five professional hackers believed to be from Eastern Europe.To read this article in full or to leave a comment, please click here]]> 2016-09-28T16:32:33+00:00 http://www.networkworld.com/article/3125594/the-yahoo-hackers-werent-state-sponsored-a-security-firm-says.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=141096 False None Yahoo None Network World - Magazine Info Most dangerous cyber celebrities of 2016 Intel has reeled off the 10th annual McAfee Most Dangerous Celebrities list based on likelihood of getting hit with a virus or malware when searching on the celebs' names. “Consumers today remain fascinated with celebrity culture and go online to find the latest pop culture news,” said Gary Davis, chief consumer security evangelist at Intel Security. “With this craving for real-time information, many search and click without considering potential security risks.” Last year, ]]> 2016-09-28T10:40:00+00:00 http://www.networkworld.com/article/3125490/security/most-dangerous-cyber-celebrities-of-2016.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=139703 False None None None Network World - Magazine Info Meet Apache Spot, a new open source project for cybersecurity largest known data breach in history, Cloudera and Intel on Wednesday announced that they've donated a new open source project to the Apache Software Foundation with a focus on using big data analytics and machine learning for cybersecurity.Originally created by Intel and launched as the Open Network Insight (ONI) project in February, the effort is now called Apache Spot and has been accepted into the ASF Incubator."The idea is, let's create a common data model that any application developer can take advantage of to bring new analytic capabilities to bear on cybersecurity problems," Mike Olson, Cloudera co-founder and chief strategy officer, told an audience at the Strata+Hadoop World show in New York. "This is a big deal, and could have a huge impact around the world."To read this article in full or to leave a comment, please click here]]> 2016-09-28T09:41:12+00:00 http://www.networkworld.com/article/3125017/meet-apache-spot-a-new-open-source-project-for-cybersecurity.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=139455 False None Yahoo None Network World - Magazine Info Down the rabbit hole, part 2: To ensure security and privacy, open source is required my article introducing this endeavor.What I'd like to talk about right now are some pretty high-level things-laying out the ground rules, if you will, for what I'm trying to accomplish.First, let me start by saying none of this is about open source or free software. Licensing of software, while extremely important, is not the focus here. This is about privacy and security and absolutely nothing else.To read this article in full or to leave a comment, please click here]]> 2016-09-28T08:46:00+00:00 http://www.networkworld.com/article/3125015/security/down-the-rabbit-hole-part-2-to-ensure-security-and-privacy-open-source-is-required.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=139183 False None None None Network World - Magazine Info Creepy clowns cause sheriff to consult with FBI and Homeland Security It really ruined clowns for a lot of people, changing their opinion of clowns from funny or cute to scary and creepy as can be. When the evil clown craze first started cranking up, some people suggested the clown sightings were pranks tied to some sort of promotion for the upcoming film It. Others suggested the clown sightings were inspired by Rob Zombie's film 31, which includes kidnapped hostages trying to survive a violent game against a gang of sadistic clowns.To read this article in full or to leave a comment, please click here]]> 2016-09-28T08:17:00+00:00 http://www.networkworld.com/article/3125488/security/creepy-clowns-cause-sheriff-to-consult-with-fbi-and-homeland-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=139184 False None None None Network World - Magazine Info Elon Musk\'s next great adventure: Colonizing Mars To read this article in full or to leave a comment, please click here]]> 2016-09-28T05:31:00+00:00 http://www.networkworld.com/article/3125485/security/elon-musk-s-next-great-adventure-colonizing-mars.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=138569 False Guideline None None Network World - Magazine Info Down the rabbit hole, part 1: Making my life private and secure Living entirely in a terminal. Getting rid of all Google software and services. Using nothing but a version of FreeDOS. That sort of thing. I typically give myself the simple goal of “do it for 30 days, and see how it goes.” In the process, I always learn something-about what I like, about what is possible. And even if I don't learn a cotton-pickin' thing of value, it's still kinda fun-kinda. To read this article in full or to leave a comment, please click here]]> 2016-09-27T11:00:00+00:00 http://www.networkworld.com/article/3124759/security/down-the-rabbit-hole-part-1-making-my-life-private-and-secure.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=134930 False None None None Network World - Magazine Info Six senators demand more details about the Yahoo data breach letter addressed to Yahoo's CEO, the lawmakers said they were particularly "disturbed" that the breach occurred in 2014, but that Yahoo only publicized it last week."That means millions of Americans' data may have been compromised for two years," the letter said. "This is unacceptable."The hacking incident, which Yahoo said it only learned recently, affects at least 500 million users, making it perhaps the largest known data breach in history. Account information, including email addresses, telephone numbers, and hashed passwords, may have been stolen.To read this article in full or to leave a comment, please click here]]> 2016-09-27T10:38:08+00:00 http://www.networkworld.com/article/3124420/six-senators-demand-more-details-about-the-yahoo-data-breach.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=134693 False Guideline Yahoo None Network World - Magazine Info Ransomware roundup: Targeting servers, government, honoring Donald Trump and Voldemort Bleeping Computer forums, there were reports of servers being hit with DXXD ransomware; after a file has been encrypted, “dxxd” is added to the end of a filename such as myimportantfile.jpgdxxd.To read this article in full or to leave a comment, please click here]]> 2016-09-27T08:57:00+00:00 http://www.networkworld.com/article/3124913/security/ransomware-roundup-targeting-servers-government-honoring-donald-trump-and-voldemort.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=134428 False None None None Network World - Magazine Info Swift CEO reveals three more failed attacks on banking network To read this article in full or to leave a comment, please click here]]> 2016-09-27T08:23:02+00:00 http://www.networkworld.com/article/3124410/swift-ceo-reveals-three-more-failed-attacks-on-banking-network.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=134102 False None None None Network World - Magazine Info Security blogger Krebs says IoT DDoS attack was payback for a blog The IoT is uranium+The pair, whom he identifies as Itay Huri and Yarden Bidani, both 18, were arrested in Israel at the request of the FBI six days after Krebs posted his blog and are now under house arrest.To read this article in full or to leave a comment, please click here]]> 2016-09-27T05:52:00+00:00 http://www.networkworld.com/article/3124400/security/security-blogger-krebs-says-iot-ddos-attack-was-payback-for-a-blog.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=133400 False None None None Network World - Magazine Info IDG Contributor Network: Always be prepared: Monitor, analyze and test your security taking inventory of hardware and software, we looked at vulnerability assessment and administrative privileges, and we discussed how to build malware defenses. We also explored how to create a data recovery plan, how to protect your data, and the importance of monitoring and training employees.To read this article in full or to leave a comment, please click here]]> 2016-09-27T04:00:00+00:00 http://www.networkworld.com/article/3124152/security/always-be-prepared-monitor-analyze-and-test-your-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=133124 False None None None Network World - Magazine Info Yahoo\'s claim of \'state-sponsored\' hackers meets with skepticism hack that stole account information from 500 million users."I think there's a lot of fishiness going on here," said Michael Lipinski, the chief security strategist at Securonix.Yahoo didn't respond to a request for comment. The company has protocols in place that can detect state-sponsored hacking into user accounts. In a December 2015 blog post, the company outlined its policy, saying it will warn users when this is suspected. To read this article in full or to leave a comment, please click here]]> 2016-09-26T18:07:35+00:00 http://www.networkworld.com/article/3124785/yahoos-claim-of-state-sponsored-hackers-meets-with-skepticism.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=130816 False None Yahoo None Network World - Magazine Info 34% off Master Lock Bluetooth Keyless Outdoor Padlock - Deal Alert see on Amazon). An indoor version is available, also at a discount (28% off, $50 -- See on Amazon).To read this article in full or to leave a comment, please click here]]> 2016-09-26T14:05:00+00:00 http://www.networkworld.com/article/3124313/security/34-off-master-lock-bluetooth-keyless-outdoor-padlock-deal-alert.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=129959 False None None None Network World - Magazine Info New Mac Trojan uses the Russian space program as a front blog post.In reality, the Trojan is a package of tools that will attempt to secretly communicate with its creators' command-and-control servers. This includes sending back data on the version, username, and process list running on the infected system. The Trojan can also receive instructions, and it will forward the results to the control servers.To read this article in full or to leave a comment, please click here]]> 2016-09-26T12:59:19+00:00 http://www.networkworld.com/article/3124308/new-mac-trojan-uses-the-russian-space-program-as-a-front.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=129900 False None None None Network World - Magazine Info A shout out to Akamai for candor in IoT botnet attack stopped protecting the Krebs on Security Web site last week after defending it for three days from the largest botnet it had ever encountered.It must have been embarrassing for the company to acknowledge that it was a business decision it was forced to make because of the expense and consumption of resources to keep the site up was too great.But the company did so and addressed a more important issue, namely that the attack was generated by a botnet of Internet of Things devices, mainly cameras, routers and DVRs, according to Krebs.To read this article in full or to leave a comment, please click here]]> 2016-09-26T10:55:00+00:00 http://www.networkworld.com/article/3124349/security/a-shout-out-to-akamai-for-candor-in-iot-botnet-attack.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=129008 False None None None Network World - Magazine Info The IoT is uranium Krebs on Security site was smashed. It could happen to you. To read this article in full or to leave a comment, please click here]]> 2016-09-26T10:40:00+00:00 http://www.networkworld.com/article/3124326/internet-of-things/the-iot-is-uranium.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=129009 False None None None Network World - Magazine Info Armies of hacked IoT devices launch unprecedented DDoS attacks sounded the alarm on Twitter last week when his company was hit with two concurrent DDoS attacks whose combined bandwidth reached almost 1 terabit per second. One of the two attacks peaked at 799Gbps alone, making it the largest ever reported.To read this article in full or to leave a comment, please click here]]> 2016-09-26T09:20:20+00:00 http://www.networkworld.com/article/3123817/armies-of-hacked-iot-devices-launch-unprecedented-ddos-attacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=128697 False None None None Network World - Magazine Info Illusive Networks seeks to slow Swift attackers through deception their malware interfered with the printing of confirmation messages, delaying the bank's discovery of the electronic heist.To read this article in full or to leave a comment, please click here]]> 2016-09-26T08:53:16+00:00 http://www.networkworld.com/article/3123699/illusive-networks-seeks-to-slow-swift-attackers-through-deception.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=128469 False None None None Network World - Magazine Info The U.S. presidential candidates on technology, privacy issues To read this article in full or to leave a comment, please click here]]> 2016-09-26T08:40:00+00:00 http://www.networkworld.com/article/3124249/tech-debates/the-us-presidential-candidates-on-technology-privacy-issues.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=128470 False None None None Network World - Magazine Info Meet MailSniper, a tool to search Microsoft Exchange emails for sensitive info MailSniper is a penetration testing tool, written in PowerShell, to allow for mass searching through email across every mailbox of an organization's Microsoft Exchange environment.Beau Bullock, from the penetration testing firm Black Hills Information Security, cited a 2016 Mandiant M-Trends Report (pdf) which claimed organizations are compromised an average of 146 days before detecting a breach. That long of a window gives attackers plenty of time to locate, compromise and exfiltrate sensitive data; pen testers, however, may only have a window of five days or less to do the same thing in order to prove risk to an organization.To read this article in full or to leave a comment, please click here]]> 2016-09-26T07:31:00+00:00 http://www.networkworld.com/article/3124212/security/meet-mailsniper-a-tool-to-search-microsoft-exchange-emails-for-sensitive-info.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=128241 False None None None Network World - Magazine Info Why you should embrace SaaS ID management Experian CIO Barry Libenson.To read this article in full or to leave a comment, please click here]]> 2016-09-26T07:09:00+00:00 http://www.networkworld.com/article/3124214/cloud-security/why-cios-are-embracing-saas-id-management.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=128242 False None None None Network World - Magazine Info Here\'s how Microsoft is using containerization to protect Edge users To read this article in full or to leave a comment, please click here]]> 2016-09-26T06:00:01+00:00 http://www.networkworld.com/article/3123740/heres-how-microsoft-is-using-containerization-to-protect-edge-users.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=127988 False None None None Network World - Magazine Info What\'s in your code? Why you need a software bill of materials 19 open source GitHub projects for security pros. | Discover how to secure your systems with InfoWorld's Security newsletter. ] When it comes to software, untangling the code to know what libraries are in use and which dependencies exist is hard. It's a challenge most IT teams don't have the time or resources to unravel.To read this article in full or to leave a comment, please click here]]> 2016-09-26T04:50:00+00:00 http://www.networkworld.com/article/3124148/security/whats-in-your-code-why-you-need-a-software-bill-of-materials.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=127569 False None None None Network World - Magazine Info New products of the week 9.26.16 Our roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Adaptiva OneSite 6.0adaptivaKey features – OneSite 6.0 is the IT industry's first serverless option for distributing software from the cloud at on-premise speeds, using Microsoft System Center Configuration (ConfigMgr). More info.To read this article in full or to leave a comment, please click here]]> 2016-09-26T03:12:00+00:00 http://www.networkworld.com/article/3123632/mobile-wireless/new-products-of-the-week-9-26-16.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=127316 False None None None Network World - Magazine Info Trump hotel chain fined over data breaches To read this article in full or to leave a comment, please click here]]> 2016-09-25T23:42:29+00:00 http://www.networkworld.com/article/3124006/trump-hotel-chain-fined-over-data-breaches.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=126689 False None None None Network World - Magazine Info How to keep terrifying medical device hacks from becoming reality enough ransomware and other attacks on healthcare outfits of late to know they are major cyberattack targets.The reality is that more medical devices are becoming connected ones, and that's increasing the security threat surface, said panelists this past week at the Security of Things Forum in Cambridge, Mass.To read this article in full or to leave a comment, please click here]]> 2016-09-25T22:24:00+00:00 http://www.networkworld.com/article/3123761/security/how-to-keep-terrifying-medical-device-hacks-from-becoming-reality.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=126622 False None None None Network World - Magazine Info KrebsOnSecurity moves to Project Shield for protection against DDoS attack censorship wrote about the DDoS-for-hire company and the two teenagers allegedly behind it were arrested. Although it's nothing new for his site, KrebsOnSecurity, to come under attack, like it did after his vDOS exposé, nearly two weeks later, Krebs' site was hit “with the largest DDoS the internet has ever seen. 665 Gbps” (gigabits per second). Some of the POST request attacks included the string “freeapplej4ck,” referring to one of the alleged teenage owners of vDOS.To read this article in full or to leave a comment, please click here]]> 2016-09-25T08:52:00+00:00 http://www.networkworld.com/article/3123806/security/krebsonsecurity-moves-to-project-shield-for-protection-against-ddos-attack-censorship.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=124006 False None None None Network World - Magazine Info Cisco, IBM may be interested in buying Imperva according to Bloomberg.The Motley Fool reports that Imperva's stock rose 20% today after Bloomberg's report, which the Fool notes could actually drive buyers away because it would mean a more costly deal.Bloomberg named a number of other possible buyers including Forecpoint (owned by Raytheon and Vista Equity Partners), Akamai and Fortinet.To read this article in full or to leave a comment, please click here]]> 2016-09-23T15:08:00+00:00 http://www.networkworld.com/article/3123733/security/cisco-ibm-may-be-interested-in-buying-imperva.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=118139 False None None None Network World - Magazine Info The next target for phishing and fraud: ChatOps To read this article in full or to leave a comment, please click here]]> 2016-09-23T11:21:00+00:00 http://www.networkworld.com/article/3123727/collaboration/the-next-target-for-phishing-and-fraud-chatops.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=117318 False None None None Network World - Magazine Info Largest DDoS attack ever delivered by botnet of hijacked IoT devices To read this article in full or to leave a comment, please click here]]> 2016-09-23T10:53:00+00:00 http://www.networkworld.com/article/3123672/security/largest-ddos-attack-ever-delivered-by-botnet-of-hijacked-iot-devices.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=117061 False None None None Network World - Magazine Info Here\'s what you should know, and do, about the Yahoo breach have stolen the details of at least 500 million accounts shocks both through scale -- it's the largest data breach ever -- and the potential security implications for users.That's because Yahoo, unlike MySpace, LinkedIn and other online services that suffered large breaches in recent years, is an email provider; and email accounts are central to users' online lives. Not only are email addresses used for private communications, but they serve as recovery points and log-in credentials for accounts on many other websites.To read this article in full or to leave a comment, please click here]]> 2016-09-23T10:26:25+00:00 http://www.networkworld.com/article/3123394/heres-what-you-should-know-and-do-about-the-yahoo-breach.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=117062 False None Yahoo None Network World - Magazine Info Privacy groups urge US FTC to investigate WhatsApp promises in a letter sent to the agency Thursday. WhatsApp has long billed itself as a secure and private messaging service. WhatsApp's recently released plan to share user data with Facebook as a way to target advertising could amount to an "unfair and deceptive" trade practice, said the groups, including the Center for Digital Democracy, Consumer Action, Consumer Watchdog, and Demand Progress.To read this article in full or to leave a comment, please click here]]> 2016-09-23T08:25:33+00:00 http://www.networkworld.com/article/3123764/privacy-groups-urge-us-ftc-to-investigate-whatsapp-promises.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=116651 False None None None Network World - Magazine Info Impending cumulative updates unnerve Windows patch experts offer only cumulative security updates for Windows 7 and 8.1, ending the decades-old practice of letting customers choose which patches they apply.To read this article in full or to leave a comment, please click here]]> 2016-09-23T05:00:00+00:00 http://www.networkworld.com/article/3123160/computers/impending-cumulative-updates-unnerve-windows-patch-experts.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=116019 False None None None Network World - Magazine Info Vint Cerf\'s dream do-over: 2 ways he\'d make the internet different ran out of new addresses based on IPv4.  To read this article in full or to leave a comment, please click here]]> 2016-09-23T01:03:40+00:00 http://www.networkworld.com/article/3123439/vint-cerfs-dream-do-over-2-ways-hed-make-the-internet-different.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=115215 False Guideline None None Network World - Magazine Info Yahoo uncovered breach after probing a black market sale data breach, which affects at least 500 million users, but it could be unrelated to the black market sale of alleged Yahoo accounts, according to a source familiar with the matter.The information comes even as security experts have been questioning why Yahoo took so long to warn the public when it was known that a hacker was claiming to be selling the data online around early August.To read this article in full or to leave a comment, please click here]]> 2016-09-22T19:39:15+00:00 http://www.networkworld.com/article/3123532/yahoo-uncovered-breach-after-probing-a-black-market-sale.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=113857 False None Yahoo None Network World - Magazine Info Hackers have a treasure trove of data with the Yahoo breach affected in one of the biggest data breaches in history. Information including names, email addresses, telephone numbers and hashed passwords may have been stolen.Yahoo has blamed the attack on a "state-sponsored actor," but it's far from clear who hacked the internet company and how the culprits pulled off the attack.Blaming it on a state-sponsored actor, however, indicates that Yahoo may have found evidence that the hackers were targeting the company over a long period of time, said Vitali Kremez, a cybercrime analyst at security firm Flashpoint.To read this article in full or to leave a comment, please click here]]> 2016-09-22T17:33:46+00:00 http://www.networkworld.com/article/3122963/hackers-have-a-treasure-trove-of-data-with-the-yahoo-breach.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=113472 False None Yahoo None Network World - Magazine Info The massive Yahoo hack ranks as the world\'s biggest -- so far a ranking by the "Have I been pwned" website. Like the Yahoo breach, the hack was only publicly disclosed this year after data was offered on a hacker forum.And only three breaches had ranked above the 100 million level:LinkedIn reported a loss of 167 million email addresses and passwords. They were originally stolen in 2012 but not publicly disclosed until 2016, again after the data was offered on an underground "dark market" site.To read this article in full or to leave a comment, please click here]]> 2016-09-22T13:36:47+00:00 http://www.networkworld.com/article/3123445/the-massive-yahoo-hack-ranks-as-the-worlds-biggest-so-far.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=112350 False None Yahoo None Network World - Magazine Info Yahoo data breach affects at least 500 million users went on sale on the black market last month.However, the hacker behind the sale claimed that the stolen database involved only 200 million users and was likely obtained in 2012.To read this article in full or to leave a comment, please click here]]> 2016-09-22T12:16:27+00:00 http://www.networkworld.com/article/3123102/yahoo-data-breach-affects-at-least-500-million-users.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=111970 False None Yahoo None Network World - Magazine Info Homeland Security issues call to action on IoT security Security of Things Forum in Cambridge on Thursday wasn't to scare anyone, but then he went ahead and called on everyone in the room to “accelerate everything you're doing” to secure the internet of things. As the Assistant Secretary for Cyber Policy at DHS says, IoT security is a public safety issue that involves protecting both the nation's physical and cyber infrastructures.Acknowledging a growing national dependency on the internet of things, be it in the medical, utility or transportation fields, Silvers says IoT has his department's full attention. And a straightforward undertaking it is not, he says.To read this article in full or to leave a comment, please click here]]> 2016-09-22T12:15:00+00:00 http://www.networkworld.com/article/3123039/security/homeland-security-issues-call-to-action-on-iot-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=111971 False None None None Network World - Magazine Info Federal cyber incidents grew an astounding 1,300% between 2006 and 2015 Government Accountability Office report on Federal cybersecurity out this week offers little in the way of optimism for the cyber-safeguard of the massive resources the government has control over.+More on Network World: Network security weaknesses plague federal agencies+“Federal information systems and networks are inherently at risk. They are highly complex and dynamic, technologically diverse, and often geographically dispersed. This complexity increases the difficulty in identifying, managing, and protecting the myriad of operating systems, applications, and devices comprising the systems and networks. Compounding the risk, systems used by federal agencies are often riddled with security vulnerabilities-both known and unknown. For example, the national vulnerability database maintained by the Mitre Corporation has identified 78,907 publicly known cybersecurity vulnerabilities and exposures as of September 15, 2016, with more being added each day,” the GAO wrote.To read this article in full or to leave a comment, please click here]]> 2016-09-22T12:02:00+00:00 http://www.networkworld.com/article/3123255/security/federal-cyber-incidents-grew-an-astounding-1-300-between-2006-and-2015.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=111972 False None None None Network World - Magazine Info Site that leaked Colin Powell\'s emails dumps First Lady\'s passport DCLeaks began circulating the passport image on Twitter and leaking it to the press. The image includes the U.S. First Lady's alleged passport number. The site tweeted out the scan after obtaining stolen emails it claims are from a White House aide named Ian Mellul. The files, which are posted on DCLeaks, appear to come from Mellul's Gmail account and date back to February 2015.Although DCLeaks claims to be the work of "American hacktivists," some security experts suspect that the site is a front for Russian state-sponsored hackers.  To read this article in full or to leave a comment, please click here]]> 2016-09-22T11:37:37+00:00 http://www.networkworld.com/article/3123108/site-that-leaked-colin-powells-emails-dumps-first-ladys-passport.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=111738 False None None None Network World - Magazine Info Yahoo reportedly to confirm massive data breach reported Thursday, citing unnamed sources familiar with the investigation.To read this article in full or to leave a comment, please click here]]> 2016-09-22T08:03:00+00:00 http://www.networkworld.com/article/3123034/security/yahoo-reportedly-to-confirm-massive-data-breach.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=110676 False None Yahoo None Network World - Magazine Info Keeping Up with Incident Response To read this article in full or to leave a comment, please click here]]> 2016-09-22T08:02:00+00:00 http://www.networkworld.com/article/3123097/security/keeping-up-with-incident-response.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=110677 False None None None Network World - Magazine Info Lockdown! Harden Windows 10 for maximum security To read this article in full or to leave a comment, please click here]]> 2016-09-22T05:48:00+00:00 http://www.networkworld.com/article/3122996/security/lockdown-harden-windows-10-for-maximum-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=110008 True None None None Network World - Magazine Info How to watch the 2016 Ig Nobels Why there's no Nobel Prize in ComputingTo read this article in full or to leave a comment, please click here]]> 2016-09-21T14:06:00+00:00 http://www.networkworld.com/article/3123047/education/how-to-watch-the-2016-ig-nobels.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=107512 False None None None Network World - Magazine Info New legislation seeks to prevent US voting systems from being hacked high-profile hack of the Democratic National Committee publicized in June has citizens worried that U.S. election systems may be vulnerable, Johnson said.To read this article in full or to leave a comment, please click here]]> 2016-09-21T13:52:54+00:00 http://www.networkworld.com/article/3123049/new-legislation-seeks-to-prevent-us-voting-systems-from-being-hacked.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=107361 False None None None Network World - Magazine Info IDG Contributor Network: IoT security: Intel EPID simplifies authentication of IoT devices 75 million tourists visit the United States every year? Or that the Transport Security Administration (TSA) screens over 2 million people daily?The TSA processes 150 passengers per security lane. Imagine the public outrage if it took 20 minutes to screen a passenger and the process publicly disclosed personal information. That's the average time and result of installing an IoT device today.What lessons can be applied from security screenings to accelerate IoT device adoption? How can the authentication and installation of new IoT devices be streamlined?To read this article in full or to leave a comment, please click here]]> 2016-09-21T12:10:00+00:00 http://www.networkworld.com/article/3121981/internet-of-things/iot-security-intel-epid-simplifies-authentication-of-iot-devices.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=106934 False None None None Network World - Magazine Info Cisco Talos: Spam at levels not seen since 2010 blog's author Jaeson Schultz.+More on Network World: The weirdest, wackiest and coolest sci/tech stories of 2016 (so far!)+“Many of the host IPs sending Necurs' spam have been infected for more than two years. To help keep the full scope of the botnet hidden, Necurs will only send spam from a subset of its minions. An infected host might be used for two to three days, and then sometimes not again for two to three weeks. This greatly complicates the job of security personnel who respond to spam attacks, because while they may believe the offending host was subsequently found and cleaned up, the reality is that the miscreants behind Necurs are just biding their time, and suddenly the spam starts all over again. At Talos, we see this pattern over, and over again for many Necurs-affiliated IPs,” he wrote.To read this article in full or to leave a comment, please click here]]> 2016-09-21T11:43:00+00:00 http://www.networkworld.com/article/3123065/security/cisco-talos-spam-at-levels-not-seen-since-2010.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=106714 False None None None Network World - Magazine Info More than 840,000 Cisco devices are vulnerable to NSA-related exploit To read this article in full or to leave a comment, please click here]]> 2016-09-21T10:50:00+00:00 http://www.networkworld.com/article/3122867/more-than-840000-cisco-devices-are-vulnerable-to-nsa-related-exploit.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=106287 False Guideline None None Network World - Magazine Info Hackers sell tool to spread malware through torrent files said they discovered the so-called "RAUM" tool in underground forums.It leverages torrenting -- a popular file-sharing method associated with piracy -- to spread the malware. Popular torrent files, especially games, are packaged with malicious coding and then uploaded for unsuspecting users to download.Using torrents to infect computers is nothing new. But the makers of the RAUM tool have streamlined the whole process with a "Pay-Per-Install" model, according to InfoArmor.To read this article in full or to leave a comment, please click here]]> 2016-09-21T09:57:59+00:00 http://www.networkworld.com/article/3122596/hackers-sell-tool-to-spread-malware-through-torrent-files.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=106288 False None None None Network World - Magazine Info How to protect your mission-critical information Information Security Forum (ISF) announced the availability of Protecting the Crown Jewels: How to Secure Mission-Critical Information Assets, the latest in a series of reports geared to helping organizations do just that."Businesses must prioritize the protection of mission-critical information assets," says Steve Durbin, managing director of the ISF. "Far too often, organizations consider the value of these assets, but fail to recognize the extent to which they are exposed to global security threats."To read this article in full or to leave a comment, please click here]]> 2016-09-21T09:47:00+00:00 http://www.networkworld.com/article/3122808/security/how-to-protect-your-mission-critical-information.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=105954 False None None None Network World - Magazine Info IDG Contributor Network: 3D printers hackable via smartphone 3D printers wide-open to hacking +To read this article in full or to leave a comment, please click here]]> 2016-09-21T09:42:00+00:00 http://www.networkworld.com/article/3122519/security/3d-printers-hackable-via-smartphone.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=105955 False None None None Network World - Magazine Info Education needs to study up on fighting ransomware “The Rising Face of Cyber Crime: Ransomware” report.The study looks at businesses in finance, retail, healthcare, energy/utilities, government and education, which are listed in order from best to worst for ransomware infection rate. Education's score is far behind that of the others, more than double that for government. The rate ranges from 13% of those in education down to 1.5% for those in finance.To read this article in full or to leave a comment, please click here]]> 2016-09-21T08:38:00+00:00 http://www.networkworld.com/article/3122833/security/education-needs-to-study-up-on-fighting-ransomware.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=105724 False None None None Network World - Magazine Info Apple\'s new macOS Sierra fixes over 60 security flaws new and interesting features, it has a large number of important security fixes.The new OS patches 65 vulnerabilities in various core and third-party components. Some of these vulnerabilities are critical and can result in arbitrary code execution with kernel privileges.Flaws that allow local applications to execute malicious code with kernel or system privileges were fixed in Apple's HSSPI support component, AppleEFIRuntime, AppleMobileFileIntegrity, AppleUUC, the Bluetooth stack, DiskArbitration, the Intel Graphics Driver, the IOAcceleratorFamily and IOThunderboltFamily, the S2 Camera, the Security service and the kernel itself.To read this article in full or to leave a comment, please click here]]> 2016-09-21T08:00:32+00:00 http://www.networkworld.com/article/3122796/apples-new-macos-sierra-fixes-over-60-security-flaws.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=105725 False None None None Network World - Magazine Info ACLU: Cops accidentally recorded themselves making up bogus criminal charges To read this article in full or to leave a comment, please click here]]> 2016-09-21T06:54:00+00:00 http://www.networkworld.com/article/3122829/security/aclu-cops-accidentally-recorded-themselves-making-up-bogus-criminal-charges.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=105299 False None None None Network World - Magazine Info IT security: 3 things you need to know now 2016-09-21T03:00:00+00:00 http://www.networkworld.com/video/69720/it-security-3-things-you-need-to-know-now#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=104540 False Guideline None None Network World - Magazine Info Cisco CEO Robbins: Wait til you see what\'s in our innovation pipeline Chuck Robbins took the reins at Cisco from the venerated John Chambers. In that time, the face and pace of the IT realm has transformed -- from Dell buying EMC and HP splitting up to the swift rise of IoT and harsh impact of security challenges. Robbins has embraced this rapid change and, he says in this wide-ranging interview, moved the company forward with relentless speed to address everything from hyperconvergence to application-centric infrastructures. To read this article in full or to leave a comment, please click here]]> 2016-09-21T03:00:00+00:00 http://www.networkworld.com/article/3122139/lan-wan/cisco-ceo-robbins-wait-til-you-see-what-s-in-our-innovation-pipeline.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=104527 False None None None Network World - Magazine Info Russia has previously tried to influence US elections, says spy chief in an interview to The Washington Post.The remarks are the closest the U.S. spy chief has come to suggesting that Russia could be involved in recent hacks of Democratic party organizations.To read this article in full or to leave a comment, please click here]]> 2016-09-20T23:22:22+00:00 http://www.networkworld.com/article/3122609/russia-has-previously-tried-to-influence-us-elections-says-spy-chief.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=103979 False None None None Network World - Magazine Info Receive alerts when your data is leaked with this tool Matchlight, which crawls the dark recesses of the internet, looking for stolen data that's circulating on the black market.On Tuesday, Terbium Labs opened the product to the public. That means any user can sign up to have five of their personal records monitored for free.To read this article in full or to leave a comment, please click here]]> 2016-09-20T13:22:49+00:00 http://www.networkworld.com/article/3122505/receive-alerts-when-your-data-is-leaked-with-this-tool.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=101733 False None None None Network World - Magazine Info IDG Contributor Network: Data breaches: This time it\'s more personal Democratic National Committee was hacked, leading to the resignation of DNC Chair Debbie Wasserman Schultz and driving a wedge between Democratic Party members.Later, the World Anti-Doping Agency (WADA) announced that Russian hackers had illegally accessed its Anti-Doping Administration and Management System (ADAMS) database, leaking confidential medical information for U.S. athletes, including Simone Biles and Serena Williams.To read this article in full or to leave a comment, please click here]]> 2016-09-20T11:09:00+00:00 http://www.networkworld.com/article/3121992/security/data-breaches-this-time-its-more-personal.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=100934 False Guideline None None Network World - Magazine Info TLS 1.3 gets early adoption boost through CloudFlare To read this article in full or to leave a comment, please click here]]> 2016-09-20T10:29:06+00:00 http://www.networkworld.com/article/3122017/tls-13-gets-early-adoption-boost-through-cloudflare.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=100617 False None None None Network World - Magazine Info Data hoarding site represents the dark side of data breach monitoring LeakedSource, a giant repository online that can potentially make hacking easier. Your email address and the associated Internet accounts -- including the passwords -- is probably in it.In fact, the giant repository is made up of stolen databases taken from LinkedIn, Myspace, Dropbox, and thousands of other sites. It bills itself as a data breach monitoring site and for months now, it's been collecting details on hacks, both old and new, and alerting the media about them.To read this article in full or to leave a comment, please click here]]> 2016-09-20T09:56:48+00:00 http://www.networkworld.com/article/3121937/data-hoarding-site-represents-the-dark-side-of-data-breach-monitoring.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=100618 False None None None Network World - Magazine Info SIEM Market Dynamics in Play To read this article in full or to leave a comment, please click here]]> 2016-09-20T08:46:00+00:00 http://www.networkworld.com/article/3122392/security/siem-market-dynamics-in-play.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=100005 False None None None Network World - Magazine Info Researchers demonstrate remote attack against Tesla Model S blog post Monday. "We have verified the attack vector on multiple varieties of Tesla Model S. It is reasonable to assume that other Tesla models are affected."To read this article in full or to leave a comment, please click here]]> 2016-09-20T07:55:10+00:00 http://www.networkworld.com/article/3121995/researchers-demonstrate-remote-attack-against-tesla-model-s.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=99736 True None Tesla None Network World - Magazine Info Researchers remotely hack Tesla Model S while it is being driven announced that they could chain multiple vulnerabilities together which allowed them to remotely hack the Tesla Model S P85 and 75D from as far as 12 miles away.The researchers said: As far as we know, this is the first case of remote attack which compromises CAN Bus to achieve remote controls on Tesla cars. We have verified the attack vector on multiple varieties of Tesla Model S. It is reasonable to assume that other Tesla models are affected.To read this article in full or to leave a comment, please click here]]> 2016-09-20T07:12:00+00:00 http://www.networkworld.com/article/3121934/security/researchers-remotely-hack-tesla-model-s-while-it-is-being-driven.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=99737 False None Tesla None Network World - Magazine Info Be careful not to fall for these ransomware situations Image by ThinkstockIn a world where ransomware hackers are expected to extort $1 billion in damages throughout 2016 in the US alone, businesses and individuals are being forced to be on high-alert when it comes to digital security. Carbonite's customer support team has handled over 7,300 ransomware-related calls just since January 2015 (365/month), encountering breaches occurring through everything from Xerox scans to fake Microsoft IT representatives.To read this article in full or to leave a comment, please click here]]> 2016-09-20T05:53:00+00:00 http://www.networkworld.com/article/3122353/security/these-ransomware-situations-can-result-in-colossal-outcomes.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=99153 True None None None Network World - Magazine Info Swift hopes daily reporting will help stem payment fraud issue fraudulent payment instructions over the Swift network. Swift's network wasn't comprimised, but because genuine credentials were used on authorized bank terminals, no alarms were raised until some time after the transfers were made, leaving victims struggling to recover their funds from the destination accounts.To read this article in full or to leave a comment, please click here]]> 2016-09-20T04:02:58+00:00 http://www.networkworld.com/article/3122384/swift-hopes-daily-reporting-will-help-stem-payment-fraud.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=98893 False None None None Network World - Magazine Info Explaining security automation and its evolving definitions Network World article on security automation last year focused mostly on threat detection, a Gartner report on Intelligent and Automated Security Controls focused on the threat intelligence component, and another recent piece referenced security automation simply as “the automation of cybersecurity controls.”To read this article in full or to leave a comment, please click here]]> 2016-09-19T10:11:00+00:00 http://www.networkworld.com/article/3121275/security/explaining-security-automation-and-its-evolving-definitions.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=94332 False None None None Network World - Magazine Info Cisco discloses PIX firewall, IOS software security holes has warned of a high priority security hole in its IOS software that could have let attackers snatch memory contents from a variety of products that could lead to the disclosure of confidential information.+More on Network World: Cisco buys into containers with Container X acquisition+Specifically Cisco said the vulnerability is due to “insufficient condition checks in the part of the code that handles [Internet Key Exchange] IKEv1 security negotiation requests. An attacker could exploit this vulnerability by sending a crafted IKEv1 packet to an affected device configured to accept IKEv1 security negotiation requests.”To read this article in full or to leave a comment, please click here]]> 2016-09-19T07:59:00+00:00 http://www.networkworld.com/article/3121580/security/cisco-discloses-pix-firewall-ios-software-security-holes.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=93736 False Guideline None None Network World - Magazine Info Teenager claims to have accessed FTPs, downloaded data from every state with .us domain on GitHub. “The login must be completed in less than five seconds to qualify for this list.”If an FTP server was meant to be public, he did not include it in the list. In his post describing “mass-analyzing a chunk of the internet,” Minxomat said he set up filters to exclude other results such as “POS system firmware update servers and printers (firmware|printer).”To read this article in full or to leave a comment, please click here]]> 2016-09-19T07:56:00+00:00 http://www.networkworld.com/article/3121655/security/teenager-claims-to-have-accessed-ftps-downloaded-data-from-every-state-with-us-domain.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=93737 False None None None Network World - Magazine Info Cisco patches Equation group exploit in IOS, IOS XE and IOS XR devices To read this article in full or to leave a comment, please click here]]> 2016-09-19T07:08:07+00:00 http://www.networkworld.com/article/3121574/cisco-patches-equation-group-exploit-in-ios-ios-xe-and-ios-xr-devices.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=93397 False Guideline None None Network World - Magazine Info New products of the week 9.19.16 Our roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.ContempoaleyaKey features: Contempo is a real-time political news app: swipe left for “the left” and right for “the right.” Integration with Rock the Vote provides an opportunity to register to vote, check registration status. More info.To read this article in full or to leave a comment, please click here]]> 2016-09-19T06:00:00+00:00 http://www.networkworld.com/article/3120603/mobile-wireless/new-products-of-the-week-9-19-16.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=93038 False None None None Network World - Magazine Info Oracle will acquire cloud security vendor Palerra To read this article in full or to leave a comment, please click here]]> 2016-09-18T19:50:53+00:00 http://www.networkworld.com/article/3121486/oracle-will-acquire-cloud-security-vendor-palerra.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=90268 False None None None Network World - Magazine Info Valve nukes Digital Homicide\'s games after developer sues to unmask 100 Steam users suing 100 Steam users for $18 million.After Digital Homicide developer James Romine filed a lawsuit, an Arizona judge granted a subpoena to obtain the personal “identification and associated data” of 100 anonymous Steam users. Romine alleges that the Steam group of Jane and John Does created a “hate and harassment group, Digital Homicides Poop Games.”To read this article in full or to leave a comment, please click here]]> 2016-09-18T09:20:00+00:00 http://www.networkworld.com/article/3121337/security/valve-nukes-digital-homicides-games-after-developer-sues-to-unmask-100-steam-users.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=87357 False None None None Network World - Magazine Info Continuous Authentication: The future of Identity and Access Management (IAM) survey by B2B International and Kaspersky Lab, 32% of respondents who share an Internet-enabled device with their relatives, colleagues or friends noted that they do not take any precautions in protecting their information. To read this article in full or to leave a comment, please click here]]> 2016-09-16T13:07:00+00:00 http://www.networkworld.com/article/3121240/security/continuous-authentication-the-future-of-identity-and-access-management-iam.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=78156 False None None None Network World - Magazine Info Judge paves the way for British hacker\'s extradition to US ruling.To read this article in full or to leave a comment, please click here]]> 2016-09-16T12:41:29+00:00 http://www.networkworld.com/article/3121344/judge-paves-the-way-for-british-hackers-extradition-to-us.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=77937 False None None None Network World - Magazine Info FBI faces lawsuit because it\'s stayed mum on iPhone 5c hack reportedly large sum that the agency hasn't officially disclosed.The lack of details prompted USA Today to submit a Freedom of Information Act request to the FBI, regarding the costs paid to the third-party contractor. But in June, the FBI denied the request, claiming that the disclosure could interfere with law enforcement.To read this article in full or to leave a comment, please click here]]> 2016-09-16T10:02:12+00:00 http://www.networkworld.com/article/3121231/fbi-faces-lawsuit-because-its-stayed-mum-on-iphone-5c-hack.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=77029 False None None None Network World - Magazine Info Tech jobs that will get you the biggest raise next year annual guide to U.S. tech salaries, which finds IT workers will be getting slightly bigger pay bumps than many other professionals. Across all fields, U.S. starting salaries for professional occupations are projected to increase 3.6% in 2017. The largest gains will occur in tech – where starting salaries for newly hired IT workers are forecast to climb 3.8%.To read this article in full or to leave a comment, please click here]]> 2016-09-16T09:52:00+00:00 http://www.networkworld.com/article/3120908/careers/tech-jobs-that-will-get-you-the-biggest-raise-next-year.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=76647 True None None None Network World - Magazine Info Remote Safe Mode attack defeats Windows 10 pass-the-hash defenses To read this article in full or to leave a comment, please click here]]> 2016-09-16T09:15:52+00:00 http://www.networkworld.com/article/3121264/remote-safe-mode-attack-defeats-windows-10-pass-the-hash-defenses.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=76648 False None None None Network World - Magazine Info Bank of England wants next payment system to be blockchain-ready A new RTGS service for the U.K.: safeguarding stability, enabling innovation," published Friday. Among them, it lists the need to interface with new technologies such as distributed ledgers. These are often referred to as blockchains, and include systems such as bitcoin and Ethereum.To read this article in full or to leave a comment, please click here]]> 2016-09-16T08:22:53+00:00 http://www.networkworld.com/article/3121226/bank-of-england-wants-next-payment-system-to-be-blockchain-ready.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=76246 False None None None Network World - Magazine Info Small, low flying drones the target of newfangled DARPA defense system Hot stuff: The coolest drones+“Using sensor technologies that can look over and between buildings, the surveillance nodes would maintain UAS tracks even when the craft disappear from sight around corners or behind objects. The output of the Aerial Dragnet system would be a continually updated common operational picture of the airspace at altitudes below where current aircraft surveillance systems can monitor, disseminated electronically to authorized users via secure data links,” DARPA stated.To read this article in full or to leave a comment, please click here]]> 2016-09-16T08:18:00+00:00 http://www.networkworld.com/article/3121184/security/small-low-flying-drones-the-target-of-newfangled-darpa-defense-system.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=76247 False None None None Network World - Magazine Info FBI urges ransomware victims to step forward One nasty variant even takes your money and still deletes your files.To read this article in full or to leave a comment, please click here]]> 2016-09-16T06:38:00+00:00 http://www.networkworld.com/article/3120889/security/fbi-urges-ransomware-victims-to-step-forward.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=75750 False None Tesla None Network World - Magazine Info Don\'t pardon Snowden, lawmakers tell Obama letter said.The letter was sent amid calls from tech leaders and liberal activists for Obama to pardon Snowden. The campaign, supported by Apple co-founder Steve Wozniak and celebrities including actor Daniel Radcliffe, argues that Snowden sparked an important debate about government mass surveillance.To read this article in full or to leave a comment, please click here]]> 2016-09-15T16:19:26+00:00 http://www.networkworld.com/article/3120753/dont-pardon-snowden-lawmakers-tell-obama.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=72115 False Guideline None None Network World - Magazine Info Infocyte HUNT sets out to answer the question, "Have we been hacked?" here to subscribe.  Your company's senior executives are discussing cyber security and the possibility of suffering a data breach. The CEO read that if a company has valuable data, then a breach is statistically inevitable. Thankfully your company hasn't discovered a breach, but that means very little. FireEye says that a breach can go undetected for as long as 200 days. The worried CEO picks up the phone, calls you and asks, "Has our enterprise network been hacked?" He wants a definitive yes or no answer, right then and there. What do you tell him?To read this article in full or to leave a comment, please click here]]> 2016-09-15T13:58:00+00:00 http://www.networkworld.com/article/3120944/security/infocyte-hunt-sets-out-to-answer-the-question-have-we-been-hacked.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=71446 False None None None Network World - Magazine Info The FBI could have saved money with this iPhone 5c hack new paper that disputes the FBI's assertion that the San Bernardino shooter's iPhone couldn't be accessed with the NAND mirroring technique.  To read this article in full or to leave a comment, please click here]]> 2016-09-15T13:48:00+00:00 http://www.networkworld.com/article/3120358/the-fbi-could-have-saved-money-with-this-iphone-5c-hack.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=71243 False None None None Network World - Magazine Info IDG Contributor Network: Security talent management for the digitization era High-demand cybersecurity skill sets +Digitization is transforming organizations' products, channels and operations. While this change comes with the potential for higher profit margins through enhanced efficiency, it also brings an increase in the number and variety of advanced threats, board oversight and regulatory compliance issues.To read this article in full or to leave a comment, please click here]]> 2016-09-15T11:26:00+00:00 http://www.networkworld.com/article/3119867/careers/security-talent-management-for-the-digitization-era.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=70743 False Guideline None None Network World - Magazine Info Federal CISO\'s define greatest challenges to authority The 7 most common challenges to cloud computing+The GAO said that 13 of the 24 agencies it reviewed – including the Departments of Defense, Commerce Energy, Justice and State-- for its report “had not fully defined the role of their CISO in accordance with these requirements. For example, these agencies did not always identify a role for the CISO in ensuring that security controls are periodically tested; procedures are in place for detecting, reporting, and responding to security incidents; or contingency plans and procedures for agency information systems are in place. Thus, CISOs' ability to effectively oversee these agencies' information security activities can be limited,” the GAO stated.To read this article in full or to leave a comment, please click here]]> 2016-09-15T10:13:00+00:00 http://www.networkworld.com/article/3120699/security/federal-ciso-s-define-greatest-challenges-to-authority.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=70220 False None None None Network World - Magazine Info Chrome OS gets cryptographically verified enterprise device management To read this article in full or to leave a comment, please click here]]> 2016-09-15T10:07:38+00:00 http://www.networkworld.com/article/3120694/chrome-os-gets-cryptographically-verified-enterprise-device-management.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=70221 False None None None Network World - Magazine Info The Era of Identity-based Applications To read this article in full or to leave a comment, please click here]]> 2016-09-15T08:43:00+00:00 http://www.networkworld.com/article/3120600/security/the-era-of-identity-based-applications.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=69652 False None None None Network World - Magazine Info Pokémon Go guide app with half a million downloads hacks Android devices blog post.The app contains a malicious module that doesn't execute immediately. Instead, the app waits for another application to be installed or uninstalled in order to determine if it's running on a real device or in an emulated environment, like the ones used to detect malware.To read this article in full or to leave a comment, please click here]]> 2016-09-15T07:40:44+00:00 http://www.networkworld.com/article/3120376/pokmon-go-guide-app-with-half-a-million-downloads-hacks-android-devices.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=69373 False None None None Network World - Magazine Info Tech leaders, activists call for Obama to pardon Snowden PardonSnowden.org campaign, launched Wednesday, are Harvard law professor and tech policy author Lawrence Lessig; tech investor Esther Dyson; noted cryptographer and MIT professor Ron Rivest; and Electronic Frontier Foundation co-founder John Perry Barlow.The campaign, supported by the American Civil Liberties Union, Amnesty International, and Human Rights Watch, asks supporters to sign a letter asking President Barack Obama to pardon the former NSA contractor. "Snowden's actions ... set in motion the most important debate about government surveillance in decades, and brought about reforms that continue to benefit our security and democracy," the letter says.To read this article in full or to leave a comment, please click here]]> 2016-09-15T07:18:04+00:00 http://www.networkworld.com/article/3120459/tech-leaders-activists-call-for-obama-to-pardon-snowden.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=69374 False Guideline None None Network World - Magazine Info FCC Chair\'s update on 5G wireless, robocalls, business data services & more To read this article in full or to leave a comment, please click here]]> 2016-09-15T07:00:00+00:00 http://www.networkworld.com/article/3120730/mobile-wireless/fcc-chairs-update-on-5g-wireless-robocalls-business-data-services-more.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=69375 False None None None Network World - Magazine Info Sophos rolls out Intercept X for endpoint protection To read this article in full or to leave a comment, please click here]]> 2016-09-15T05:02:00+00:00 http://www.networkworld.com/article/3120322/security/sophos-rolls-out-intercept-x-for-endpoint-protection.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=68818 False None None None