www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-15T05:37:01+00:00 www.secnews.physaphae.fr Network World - Magazine Info Crash Override: Malware that took down a power grid may have been a test run pdf) and Industroyer in the ESET report (pdf), has nothing to do with espionage and everything to do with cyber-sabotage.Crash Override, Dragos says, “is the first ever malware framework designed and deployed to attack electric grids.” It could be “leveraged at multiple sites simultaneously.” Dragos founder Robert M. Lee told Reuters, “The malware is capable of causing outages of up to a few days in portions of a nation's grid, but is not potent enough to bring down a country's entire grid.”To read this article in full or to leave a comment, please click here]]> 2017-06-13T08:52:00+00:00 http://www.networkworld.com/article/3200828/security/crash-override-malware-that-took-down-a-power-grid-may-have-been-a-test-run.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=373560 False None None None Network World - Magazine Info South Korean web hosting company infected by Erebus ransomware news that a South Korean web hosting company had been infected by ransomware, but it was extremely short on details. The ransomware was Erebus; the attack occurred on Saturday and thousands of sites were reportedly infected.Today, Aju Business Daily provided more details. Nayana reportedly said 153 of its Linux servers were infected with Erebus. In turn, about 3,400 sites on the web hosting company's servers were also infected.To read this article in full or to leave a comment, please click here]]> 2017-06-12T07:36:00+00:00 http://www.networkworld.com/article/3200194/security/south-korean-web-hosting-company-infected-by-erebus-ransomware.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=373179 False None None None Network World - Magazine Info Witcher 3 developers won\'t bow to extortion for stolen Cyberpunk 2077 files E3 (Electronic Entertainment Expo) starting this week, we can expect a flood of gaming news. It remains to be seen if the person or people trying to extort Polish game developer CD Projekt Red will choose this week to leak stolen Cyberpunk 2077 game files.Instead of staying quiet about an extortion attempt, CD Projekt Red, the developers behind The Witcher 3, got out ahead of any potential leak by tweeting: An unidentified individual or individuals have just informed us they are in possession of a few internal files belonging to CD PROJEKT RED. Among them are documents connected to early designs for the upcoming game, Cyberpunk 2077.To read this article in full or to leave a comment, please click here]]> 2017-06-11T07:50:00+00:00 http://www.networkworld.com/article/3200424/security/witcher-3-developers-wont-bow-to-extortion-for-stolen-cyberpunk-2077-files.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=372861 False None None None Network World - Magazine Info IDG Contributor Network: Top 5 InfoSec concerns for 2017 Cloudbleed, WannaCry, ransomware, hackers. Each and every day, it seems, the tech community wakes up to news of another attack on data security and privacy. As IT professionals, we spend our days working to the best of our knowledge and ability to keep company information secure. Some days, however, when news of new attacks hit, it can feel like we'll never get ahead. As soon as we learn one method of protection, the hackers have invented a new workaround.To read this article in full or to leave a comment, please click here]]> 2017-06-08T08:15:00+00:00 http://www.networkworld.com/article/3199937/security/top-5-infosec-concerns-for-2017.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=372471 False None Wannacry None Network World - Magazine Info Hackers leak 8 unaired episodes of ABC\'s Steve Harvey\'s Funderdome TV series refused to pay a ransom, has now leaked nearly the entire first season of ABC's upcoming Steve Harvey's Funderdome.Back in April, TDO warned ABC, National Geographic, Fox and IFC that the group wasn't playing games anymore. Then on June 2, TDO tweeted, “American Broadcasting Company may be up next, ladies and gentlemen.”To read this article in full or to leave a comment, please click here]]> 2017-06-05T06:52:00+00:00 http://www.networkworld.com/article/3199684/security/hackers-leak-8-unaired-episodes-of-abcs-steve-harveys-funderdome-tv-series.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=371317 False None None None Network World - Magazine Info OneLogin hack exposed sensitive US customer data and ability to decrypt data claims “over 2000+ enterprise customers in 44 countries across the globe trust OneLogin,” announced the security incident on May 31. It was short on details, primarily saying the unauthorized access it detected had been blocked and law enforcement was notified.To read this article in full or to leave a comment, please click here]]> 2017-06-02T06:37:00+00:00 http://www.networkworld.com/article/3199256/security/onelogin-hack-exposed-sensitive-us-customer-data-and-ability-to-decrypt-data.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=370960 False None None None Network World - Magazine Info IDG Contributor Network: Nothing new to (Wanna)Cry about To read this article in full or to leave a comment, please click here]]> 2017-05-31T05:26:00+00:00 http://www.networkworld.com/article/3198985/malware-cybercrime/nothing-new-to-wannacry-about.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=369911 False None Wannacry None Network World - Magazine Info Hackers can use malicious subtitles to remotely take control of your device revealed that not all subtitles are benign text files and hackers can remotely take control of any device running vulnerable software via malicious subtitles.The attack is not in the wild, since Check Point developed the proof of concept attack vector; however, with news of the attack vector and an estimated 200 million video players and streaming apps running vulnerable software, attackers might jump on the malicious subtitle wagon to gain remote access to victims' systems.To read this article in full or to leave a comment, please click here]]> 2017-05-24T06:48:00+00:00 http://www.networkworld.com/article/3198122/security/hackers-can-use-malicious-subtitles-to-remotely-take-control-of-your-device.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=368236 False None None None Network World - Magazine Info IDG Contributor Network: Educating the public about security – are we doing it all wrong? Breach Level Index, 1,792 data breaches led to almost 1.4 million data records being compromised worldwide, an increase of 86% compared to 2015. Identity theft was the leading type of data breach last year, accounting for 59% of all data breaches. These numbers have helped raise public awareness around the serious threats to personal data that exist in the modern era, and awareness is also growing for some of the solutions that businesses and individuals can use to minimize the risks from data breaches. But is it enough?To read this article in full or to leave a comment, please click here]]> 2017-05-23T09:35:00+00:00 http://www.networkworld.com/article/3197383/security/educating-the-public-about-security-are-we-doing-it-all-wrong.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=367824 False Guideline None None Network World - Magazine Info How to maintain data oversight to avoid \'shadow data\' Image by George HodanBefore his retirement, an employee of the Office of the Comptroller of the Currency (OCC) uploaded more than 10,000 OCC records onto two removable thumb drives. He retired in November 2015; the agency didn't discover the breach until the following September. That left almost a year between breach and detection. The OCC was not able to recover the thumb drives.To read this article in full or to leave a comment, please click here]]> 2017-05-18T09:25:00+00:00 http://www.networkworld.com/article/3197415/security/how-to-maintain-data-oversight-to-avoid-shadow-data.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=366699 False None None None Network World - Magazine Info Shadow Brokers teases more Windows exploits and cyberespionage data WannaCry ransomware program.To read this article in full or to leave a comment, please click here]]> 2017-05-16T08:13:45+00:00 http://www.networkworld.com/article/3197106/security/shadow-brokers-teases-more-windows-exploits-and-cyberespionage-data.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=365753 False None Wannacry None Network World - Magazine Info Why WannaCry won\'t change anything 200,000 machines in more than 150 countries around the world have been infected, but the responses being discussed still center around patches and passwords, updates and antivirus, backups and contingency plans. To read this article in full or to leave a comment, please click here]]> 2017-05-16T07:25:00+00:00 http://www.networkworld.com/article/3197003/security/why-wannacry-won-t-change-anything.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=365755 False None Wannacry None Network World - Magazine Info Cybercrooks fight over DDoS attack resources according to a report released this morning.That translates into a smaller average attack size, said Martin McKeay, senior security advocate at Cambridge, Mass.-based Akamai Technologies Inc.There are only so many devices around that have the kind of vulnerabilities that make them potential targets for a botnet."And other people can come in and take over the device, and take those resources to feed their own botnet," he said. "I'm seeing that over and over."To read this article in full or to leave a comment, please click here]]> 2017-05-16T04:39:00+00:00 http://www.networkworld.com/article/3196858/security/cybercrooks-fight-over-ddos-attack-resources.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=365617 False None None None Network World - Magazine Info Paying the WannaCry ransom will probably get you nothing. Here\'s why. To read this article in full or to leave a comment, please click here]]> 2017-05-15T16:57:38+00:00 http://www.networkworld.com/article/3196875/security/paying-the-wannacry-ransom-will-probably-get-you-nothing-heres-why.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=365310 False None Wannacry None Network World - Magazine Info 12 ways to improve run-time container security To read this article in full or to leave a comment, please click here]]> 2017-05-15T13:22:00+00:00 http://www.networkworld.com/article/3196677/security/12-ways-to-improve-run-time-container-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=365311 False None None None Network World - Magazine Info Incident response is like tracking down a perpetrator Image by ThinkstockIncident response is like investigating a real burglary. You look for evidence of the intruder at the crime scene, find his targets and his getaway car, and repair any holes. Discover any cuts in your chain link fence. Take a few steps back for more perspective. Find the intruder's targets. What assets are near the compromised fence? Investigate in both directions to find the intruder's target and getaway car. Fix the fence. Resolve any issues and patch vulnerabilities.To read this article in full or to leave a comment, please click here]]> 2017-05-15T05:06:00+00:00 http://www.networkworld.com/article/3196806/security/incident-response-is-like-tracking-down-a-perpetrator.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=365154 False None None None Network World - Magazine Info Microsoft blames US stockpiled vulnerability for ransomware attack works by exploiting a vulnerability in some older versions of Windows. It has been suspected for some time now that the malware came from a cache of hacking tools reportedly stolen by hacking group Shadow Brokers from the NSA and leaked on the internet. WannaCry is said to take advantage of a NSA hacking tool, called EternalBlue, that can make it easy to hijack unpatched older Windows machines.To read this article in full or to leave a comment, please click here]]> 2017-05-14T20:06:41+00:00 http://www.networkworld.com/article/3196519/security/microsoft-blames-us-stockpiled-vulnerability-for-ransomware-attack.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=364719 False None Wannacry None Network World - Magazine Info New WannaCry ransomware variants: Patch old PCs now to avoid becoming a victim took the “highly unusual step of providing a security update for all customers to protect Windows platforms that are in custom support only, including Windows XP, Windows 8, and Windows Server 2003.” Europol chief Rob Wainwright told the BBC, “Companies need to make sure they have updated their systems and 'patched where they should' before staff arrived for work on Monday morning.”To read this article in full or to leave a comment, please click here]]> 2017-05-14T09:17:00+00:00 http://www.networkworld.com/article/3196291/security/new-wannacry-ransomware-variants-patch-old-pcs-now-to-avoid-becoming-a-victim.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=364720 False None Wannacry None Network World - Magazine Info Old Windows PCs can stop WannaCry ransomware with new Microsoft patch blog post about Friday's attack from the WannaCry ransomware.The ransomware, which has spread globally, has been infecting computers by exploiting a Windows vulnerability involving the Server Message Block protocol, a file-sharing feature.To read this article in full or to leave a comment, please click here]]> 2017-05-13T12:14:00+00:00 http://www.networkworld.com/article/3196689/security/old-windows-pcs-can-stop-wannacry-ransomware-with-new-microsoft-patch.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=364721 False None Wannacry None Network World - Magazine Info A \'kill switch\' is slowing the spread of WannaCry ransomware across the globe. It works by exploiting a Windows vulnerability that the U.S. National Security Agency may have used for spying.The malware encrypts data on a PC and shows users a note demanding $300 in bitcoin to have their data decrypted. Images of the ransom note have been circulating on Twitter. Security experts have detected tens of thousands of attacks, apparently spreading over LANs and the internet like a computer worm.To read this article in full or to leave a comment, please click here]]> 2017-05-12T18:24:53+00:00 http://www.networkworld.com/article/3196510/security/a-kill-switch-is-slowing-the-spread-of-wannacry-ransomware.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=364722 False None Wannacry None Network World - Magazine Info A ransomware attack is spreading worldwide, using alleged NSA exploit struck hospitals at the U.K.'s National Health Service on Friday, taking down some of their network.Spain's computer response team CCN-CERT has also warned of  a "massive attack" from the ransomware strain, amid reports that local telecommunications firm Telefonica was hit.To read this article in full or to leave a comment, please click here]]> 2017-05-12T10:22:12+00:00 http://www.networkworld.com/article/3196375/security/a-ransomware-attack-is-spreading-worldwide-using-alleged-nsa-exploit.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=364726 False None None None Network World - Magazine Info England hospitals hit by coordinated ransomware attack The Register, a spokesperson for the country's National Health Service's digital division said: "The investigation is at an early stage but we believe the malware variant is Wanna Decryptor.” The spokesperson said the attack was not specifically targeted at the NHS, but affects organizations across a range of sectors, but didn't specify which.To read this article in full or to leave a comment, please click here]]> 2017-05-12T09:53:00+00:00 http://www.networkworld.com/article/3196135/security/england-hospitals-hit-by-coordinated-ransomware-attack.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=364727 False None None None Network World - Magazine Info Latest firmware updates for Asus routers fix CSRF security flaws To read this article in full or to leave a comment, please click here]]> 2017-05-11T09:26:36+00:00 http://www.networkworld.com/article/3196149/security/latest-firmware-updates-for-asus-routers-fix-csrf-security-flaws.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=364299 False None None None Network World - Magazine Info How to protect your Google and Facebook accounts with a security key sends them out when it detects a "government-backed attacker" has attempted to hack an account through phishing or malware.Last time I saw one, I added two-factor authentication to many of my accounts. This time it prompted me to ask: Can I do even better?170427 warning 2 Martyn Williams/IDGNS A security warning message displayed by Google.To read this article in full or to leave a comment, please click here]]> 2017-05-09T15:53:27+00:00 http://www.networkworld.com/article/3195713/authentication/how-to-protect-your-google-and-facebook-accounts-with-a-security-key.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=363499 False None None None Network World - Magazine Info Microsoft fixes remote hacking flaw in Windows Malware Protection Engine announced Saturday on Twitter that he and his colleague found a "crazy bad" vulnerability in Windows and described it as "the worst Windows remote code execution in recent memory."To read this article in full or to leave a comment, please click here]]> 2017-05-09T07:26:55+00:00 http://www.networkworld.com/article/3195429/security/microsoft-fixes-remote-hacking-flaw-in-windows-malware-protection-engine.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=363500 False None None None Network World - Magazine Info Supply chain attack hits Mac users of HandBrake video converter app posted a security warning on the project's website and support forum on Saturday, alerting Mac users who downloaded and installed the program from May 2 to May 6 to check their computers for malware.The attackers compromised only a download mirror hosted under download.handbrake.fr, with the primary download server remaining unaffected. Because of this, users who downloaded HandBrake-1.0.7.dmg during the period in question have a 50/50 chance of having received a malicious version of the file, the HandBreak team said.To read this article in full or to leave a comment, please click here]]> 2017-05-08T08:04:45+00:00 http://www.networkworld.com/article/3195075/security/supply-chain-attack-hits-mac-users-of-handbrake-video-converter-app.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=363110 False None None None Network World - Magazine Info HandBrake mirror server hacked to serve up Proton RAT for Macs security alert after learning one of the mirror download servers was hacked. The attacker replaced the Mac version of the HandBrake client with a malicious version.In case you don't know, HandBrake is an open source video transcoder app which allows users to convert video to other formats.The HandBrake team said an attacker compromised the download mirror server at download.handbrake.fr and replaced the HandBrake-1.0.7.dmg installer file with a version infected with a new variant of the Proton RAT.To read this article in full or to leave a comment, please click here]]> 2017-05-07T09:25:00+00:00 http://www.networkworld.com/article/3195050/security/handbrake-mirror-server-hacked-to-serve-up-proton-rat-for-macs.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=362665 False None None None Network World - Magazine Info Email dump hits French candidate Macron ahead of election To read this article in full or to leave a comment, please click here]]> 2017-05-05T17:59:08+00:00 http://www.networkworld.com/article/3195033/security/email-dump-hits-french-candidate-macron-ahead-of-election.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=362666 False None None None Network World - Magazine Info Google Docs phishing attack underscores OAuth security risks phishing scheme -- which may have circulated to 1 million Gmail users -- is particularly effective because it fooled users with a dummy app that looked like Google Docs.To read this article in full or to leave a comment, please click here]]> 2017-05-04T16:20:18+00:00 http://www.networkworld.com/article/3194813/security/google-docs-phishing-attack-underscores-oauth-security-risks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=362022 False None None None Network World - Magazine Info The BlackBerry KeyOne - a surprising phone with a hardware keyboard To read this article in full or to leave a comment, please click here]]> 2017-05-04T06:00:04+00:00 http://www.networkworld.com/article/3194298/smartphones/the-blackberry-keyone-a-surprising-phone-with-a-hardware-keyboard.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=361911 False None None None Network World - Magazine Info Sneaky Gmail phishing attack fools with fake Google Docs app Reddit An example of the phishing email that circulated on Tuesday.To read this article in full or to leave a comment, please click here]]> 2017-05-03T17:28:53+00:00 http://www.networkworld.com/article/3194404/security/sneaky-gmail-phishing-attack-fools-with-fake-google-docs-app.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=361604 False None None None Network World - Magazine Info IDG Contributor Network: Healthcare data breaches skyrocket, but is there good news coming? Bitglass' recent Healthcare Breach Report. As a direct result of the breaches, records of approximately 16.6 million Americans were exposed due to hacks, lost or stolen devices, unauthorized disclosure and more.The good news, however, is that the overall number of compromised records has declined for the second year in a row, and early indications suggest that those numbers will continue to decline in 2017.+ Also on Network World: Healthcare records for sale on Dark Web + The report aggregates data from the U.S. Department of Health and Human Services' Wall of Shame-a database of breach disclosures required as part of the Health Insurance Portability and Accountability Act (HIPAA)-to identify the most common causes of data leakage.To read this article in full or to leave a comment, please click here]]> 2017-05-03T05:00:00+00:00 http://www.networkworld.com/article/3192885/healthcare/healthcare-data-breaches-skyrocket-but-is-there-good-news-coming.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=361418 False None None None Network World - Magazine Info False positives still cause threat alert fatigue 2013 breach at Target, as an example in which thieves stole some 40 million Target credit cards by accessing data on point of sale (POS) systems. Target later revised that number to include theft of private data for 70 million customers.To read this article in full or to leave a comment, please click here]]> 2017-05-03T04:47:00+00:00 http://www.networkworld.com/article/3193878/security/false-positives-still-cause-alert-fatigue.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=361419 False None None None Network World - Magazine Info Shodan search engine starts unmasking malware command-and-control servers Malware Hunter.The new service continuously scans the internet to find control panels for over ten different remote access Trojan (RAT) programs, including Gh0st RAT, DarkComet, njRAT, ZeroAccess and XtremeRAT. These are commercial malware tools sold on underground forums and are used by cybercriminals to take complete control of compromised computers.To read this article in full or to leave a comment, please click here]]> 2017-05-02T14:36:04+00:00 http://www.networkworld.com/article/3193986/security/shodan-search-engine-starts-unmasking-malware-command-and-control-servers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=361085 False None None None Network World - Magazine Info Android gets patches for critical flaws in media handling, hardware drivers published Monday, was split into two "patch levels," which are represented as date strings on the "About" page of Android devices.The 2017-05-01 security patch level covers fixes for vulnerabilities that are common to all Android devices while the 2017-05-05 level covers additional fixes for hardware drivers and kernel components that are present only in some devices.To read this article in full or to leave a comment, please click here]]> 2017-05-02T08:34:24+00:00 http://www.networkworld.com/article/3193812/security/android-gets-patches-for-critical-flaws-in-media-handling-hardware-drivers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=361086 False None None None Network World - Magazine Info SMBs continue to be a target of cybercriminals US National Cyber Security Alliance.To read this article in full or to leave a comment, please click here]]> 2017-05-02T04:37:00+00:00 http://www.networkworld.com/article/3193834/security/smbs-continue-to-be-a-target-of-cybercriminals.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=360953 False None None None Network World - Magazine Info Vulnerability hits Intel enterprise PCs going back 10 years To read this article in full or to leave a comment, please click here]]> 2017-05-01T17:36:57+00:00 http://www.networkworld.com/article/3193707/security/vulnerability-hits-intel-enterprise-pcs-going-back-10-years.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=360534 False None None None Network World - Magazine Info IDG Contributor Network: Data breaches: It\'s still personal blog post last September, I highlighted how data breaches for the first half of 2016 shifted from stolen credit card data and financial information to the theft of something much more personal-identities. Unsurprisingly, this trend continued throughout the remainder of the year.According to the recently released Breach Level Index, 1,792 data breaches led to almost 1.4 million data records being compromised worldwide, an increase of 86 percent compared to 2015. Once again, identity theft was the leading type of data breach last year, accounting for 59 percent of all data breaches. To read this article in full or to leave a comment, please click here]]> 2017-05-01T12:45:00+00:00 http://www.networkworld.com/article/3193155/security/data-breaches-its-still-personal.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=360535 False Guideline None None Network World - Magazine Info Trump seeks to upgrade US government IT services executive order from Trump, released on Monday.The order seeks to "promote the secure, efficient and economical use" of IT. As part of that goal, Trump is establishing the American Technology Council, which he will chair.To read this article in full or to leave a comment, please click here]]> 2017-05-01T11:16:33+00:00 http://www.networkworld.com/article/3193586/government/trump-seeks-to-upgrade-us-government-it-services.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=360536 False None None None Network World - Magazine Info Report: Bad policies and practices put data at risk [Infographic] 2017 Varonis Data Risk Report. The report is based on assessments that Varonis conducts for its customers and prospects to determine which data is at risk. The report data is aggregated and anonymized. download 2017 Varonis Data Risk Report Highlights Varonis What this year's report revealed is that much of the risk is due to bad policy or failure to follow an established policy. For example, files were accessible to people who should not have access, complex permissions rules negatively impacted enforceability, and some companies fail to properly audit data for risk. The report also found that these risks were consistent across geographies and industries.To read this article in full or to leave a comment, please click here]]> 2017-05-01T10:36:00+00:00 http://www.networkworld.com/article/3193612/security/report-bad-policies-and-practices-put-data-at-risk-infographic.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=360537 False None None None Network World - Magazine Info The differences among the white, grey, and black hats Exigent Networks. As the infographic explains, there are some, well, grey areas between categories-for example, there is sometimes a fine line between grey hats and black hats.Some might also disagree with the choices of white hat hacker examples. The telecom industry, for example, might consider Steve Wozniak's early hacking exploits theft of services rather than hacking for the greater good. And Julian Assange's qualifications will be tinted by whatever political lens through which an individual judges his actions.To read this article in full or to leave a comment, please click here]]> 2017-05-01T09:03:00+00:00 http://www.networkworld.com/article/3193584/security/the-differences-among-the-white-grey-and-black-hats.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=360542 True None None None Network World - Magazine Info Facebook able to target emotionally vulnerable teens for ads The Australian (paywall) got its hands on a 23-page Facebook document, dated in 2017, marked as “Confidential: Internal Only,” and authored by two Australian Facebook executives, Andy Sinn and David Fernandez. While no screenshots were included, the report allegedly explained how Facebook could analyze posts, photos and interactions to help determine the emotional states of 6.4 million “high schoolers,” “tertiary” (college) students and “young Australians and New Zealanders ... in the workforce.”To read this article in full or to leave a comment, please click here]]> 2017-05-01T07:11:00+00:00 http://www.networkworld.com/article/3193382/security/leaked-document-shows-how-facebook-can-target-emotionally-vulnerable-teens-for-ads.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=360543 False None None None Network World - Magazine Info NSA suggests using virtualization to secure smartphones HTC A9 smartphone security-hardened by Cog Systems using its D4 virtualization platform is now on that list, alongside devices without virtualization from Samsung Electronics, LG Electronics, and BlackBerry.To read this article in full or to leave a comment, please click here]]> 2017-05-01T07:07:02+00:00 http://www.networkworld.com/article/3193417/mobile/nsa-suggests-using-virtualization-to-secure-smartphones.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=360544 False None None None Network World - Magazine Info Career Watch: Be wary of IT employment contracts Jeffrey Scolaro, an attorney at Daley Mohan Groble PC in Chicago and a member of Legal Services Link, answers questions about employment contracts.Are employment contracts for IT workers negotiable, or are they one-size-fits-all? The axiom that “everything is negotiable” should be where all IT professionals begin their assessment of proposed employment contracts. However, the IT industry in particular can be especially rigid in its collective enforcement of employment agreements.To read this article in full or to leave a comment, please click here]]> 2017-05-01T05:22:00+00:00 http://www.networkworld.com/article/3193377/careers/career-watch-be-wary-of-it-employment-contracts.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=360462 False None APT 17 None Network World - Magazine Info How the insurance industry could change the game for security Axio Global, a cyber risk company.After the 2013 Target breach, it became very difficult for retailers to get a decent price for cyber insurance unless they had completely switched over to end-to-end encryption, or had a definite plan in place for doing that.To read this article in full or to leave a comment, please click here]]> 2017-05-01T05:18:00+00:00 http://www.networkworld.com/article/3193468/security/how-the-insurance-industry-could-change-the-game-for-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=360463 False None None None Network World - Magazine Info Network monitoring tools: Features users love and hate network monitoring tool that helps them manage the network, identify problems before they cause downtime, and quickly resolve issues when something goes wrong.Five of the top network monitoring products on the market, according to users in the IT Central Station community, are CA Unified Infrastructure Management, SevOne, Microsoft System Center Operations Manager (SCOM), SolarWinds Network Performance Monitor (NPM), and CA Spectrum.To read this article in full or to leave a comment, please click here]]> 2017-05-01T03:51:00+00:00 http://www.networkworld.com/article/3193067/network-management/network-monitoring-tools-features-users-love-and-hate.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=360464 False None None None Network World - Magazine Info New products of the week 5.1.17 Image by HPEOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Bluescape visual collaboration softwarebluescapeImage by bluescapeTo read this article in full or to leave a comment, please click here]]> 2017-05-01T02:17:00+00:00 http://www.networkworld.com/article/3193130/mobile-wireless/new-products-of-the-week-5-1-17.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=360437 True None None None Network World - Magazine Info Hackers leak 10 new Orange Is the New Black episodes after Netflix failed to pay ransom tweeted: “Who is next on the list? FOX, IFC, NAT GEO, and ABC. Oh, what fun we're all going to have. We're not playing games anymore.” Who is next on the list? FOX, IFC, NAT GEO, and ABC. Oh, what fun we're all going to have. We're not playing any games anymore.To read this article in full or to leave a comment, please click here]]> 2017-04-30T08:25:00+00:00 http://www.networkworld.com/article/3193409/security/hackers-leak-10-new-orange-is-the-new-black-episodes-after-netflix-failed-to-pay-ransom.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=360267 False None None None Network World - Magazine Info NSA ends surveillance tactic that pulled in citizens\' emails, texts announced on Friday, stops a controversial tactic that critics said violated U.S. citizens' privacy rights.The practice involved flagging communications where a foreign surveillance target was mentioned, even if that target wasn't involved in the conversation. Friday's announcement means the NSA will stop collecting this data.“Instead, this surveillance will now be limited to only those communications that are directly 'to' or 'from' a foreign intelligence target,” the NSA said in a statement.To read this article in full or to leave a comment, please click here]]> 2017-04-28T16:23:58+00:00 http://www.networkworld.com/article/3193223/security/nsa-ends-surveillance-tactic-that-pulled-in-citizens-emails-texts.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=360268 False None None None Network World - Magazine Info Stealthy Mac malware spies on encrypted browser traffic dubbed OSX/Dok by researchers from Check Point Software Technologies, was distributed via email phishing campaigns to users in Europe.One of the rogue emails was crafted to look as if it was sent by a Swiss government agency warning recipients about apparent errors in their tax returns. The malware was attached to the email as a file called Dokument.zip.What makes OSX/Dok interesting is that it was digitally signed with a valid Apple developer certificate. These certificates are issued by Apple to members of its developer program and are needed to publish applications in the official Mac App Store.To read this article in full or to leave a comment, please click here]]> 2017-04-28T13:33:10+00:00 http://www.networkworld.com/article/3193384/security/stealthy-mac-malware-spies-on-encrypted-browser-traffic.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=360269 False None None None Network World - Magazine Info Google\'s Chrome will soon start warning you more about HTTP pages Incognito mode, the warnings will appear by default on all HTTP pages visited, not only when the user enters information onto the page.To read this article in full or to leave a comment, please click here]]> 2017-04-28T12:21:56+00:00 http://www.networkworld.com/article/3193139/security/googles-chrome-will-soon-start-warning-you-more-about-http-pages.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=360270 False None None None Network World - Magazine Info TSA: “As you can imagine, live anti-tank rounds are strictly prohibited altogether.” crazy things that the TSA has found in airline travelers checked bags over the past few years but…every once and awhile, something new and cracked turns up.lax TSA/22MM tank round LAX Recently the agency's agents reported that a live 22 MM anti-tank round was discovered by TSA agents in a checked bag at Los Angeles (LAX) airport.To read this article in full or to leave a comment, please click here]]> 2017-04-28T11:39:00+00:00 http://www.networkworld.com/article/3193365/security/tsa-as-you-can-imagine-live-anti-tank-rounds-are-strictly-prohibited-altogether.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=360274 False None None None Network World - Magazine Info Sift Science uses machine learning to help businesses reduce fraud while enhancing the user experience​ here to subscribe.  Companies that provide online transactional services to consumers or other businesses have to be concerned about fraud. Whether it is renting hotel rooms to travelers, selling books to avid readers, arranging shipping services for hard goods, or any of the thousands of other types of sales and services transacted online, the entity behind the online business needs to know if the end user and transaction can be trusted.The credit reporting company Experian says that e-commerce fraud attack rates spiked 33% in 2016 compared to 2015. Experian attributes this increase to the recent switch to EMV (those chip-based credit cards), which drove fraudsters to online card-not-present fraud, and to the vast number of data breaches in which users' online credentials were stolen. The Federal Trade Commission says the number of consumers who reported their stolen data was used for credit card fraud increased from 16% in 2015 to 32% in 2016.To read this article in full or to leave a comment, please click here]]> 2017-04-28T09:21:00+00:00 http://www.networkworld.com/article/3193093/security/sift-science-uses-machine-learning-to-help-businesses-reduce-fraud-without-impacting-the-user-exper.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=360275 False None None None Network World - Magazine Info Network management vulnerability exposes cable modems to hacking they found and dubbed StringBleed.To read this article in full or to leave a comment, please click here]]> 2017-04-28T08:17:14+00:00 http://www.networkworld.com/article/3193131/security/network-management-vulnerability-exposes-cable-modems-to-hacking.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=360276 False None None None Network World - Magazine Info Users have little confidence their company can protect their mobile device To read this article in full or to leave a comment, please click here]]> 2017-04-28T05:09:00+00:00 http://www.networkworld.com/article/3193056/mobile-security/users-have-little-confidence-their-company-can-protect-their-mobile-device.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=360137 False None None None Network World - Magazine Info Cloudflare wants to secure IoT connections to the internet To read this article in full or to leave a comment, please click here]]> 2017-04-27T11:02:29+00:00 http://www.networkworld.com/article/3193005/security/cloudflare-wants-to-secure-iot-connections-to-the-internet.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=359862 False None None None Network World - Magazine Info Advances in multifactor authentication (MFA) technologies phishing texts that asked users to send over their tokens.To read this article in full or to leave a comment, please click here]]> 2017-04-27T10:42:00+00:00 http://www.networkworld.com/article/3192861/security/state-of-the-art-multifactor-authentication-mfa-technologies.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=359863 True None None None Network World - Magazine Info 9 essential tools for the security-conscious mobile worker Image by Kensington, Anonabox, Yubikey The highly digitized and hyper-connected world that we live in today has heightened the security stakes for us all. But if work frequently takes you away from the home office, you have some particular security and privacy concerns.To read this article in full or to leave a comment, please click here]]> 2017-04-27T10:41:00+00:00 http://www.networkworld.com/article/3192985/security/9-essential-tools-for-the-security-conscious-mobile-worker.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=359864 True None None None Network World - Magazine Info Sensitive data often follows former employees out the door Osterman Research, 69 percent of organizations polled say that they have suffered significant data or knowledge loss resulting from employees who took information resources with them when they left the business.Any form of data loss is a threat to a business, but the report notes that problems can arise both from employees actually taking data with them when they leave, and when departing employees have parked corporate information in locations like cloud storage services that are unknown or inaccessible to their former employer.To read this article in full or to leave a comment, please click here]]> 2017-04-27T10:40:00+00:00 http://www.networkworld.com/article/3192859/security/sensitive-data-often-follows-former-employees-out-the-door.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=359865 False None None None Network World - Magazine Info Failure to communicate helps ransomware prosper ransomware as a criminal business model could be summed up with the iconic line from the prison boss in 1967's “Cool Hand Luke”: “What we got here is a failure to communicate.”That was a recurring theme from those on a “Ransomware Panel” Thursday at SOURCE Boston 2017, moderated by Paul Roberts, founder and editor in chief of The Security Ledger.The communication breakdown occurs at all levels, the panelists said, starting with victims. â–  MORE FROM SOURCE Boston: Cyber infrastructure: Too big to fail, and failing Frank McLaughlin, a Boston Police detective, said when a business gets hit with ransomware, “the police are the last people they want to call, for obvious reasons. It becomes a public record.”To read this article in full or to leave a comment, please click here]]> 2017-04-27T10:38:00+00:00 http://www.networkworld.com/article/3192858/security/failure-to-communicate-helps-ransomware-prosper.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=359869 False None None None Network World - Magazine Info U.S. military wants white-hat hackers to target its cyber security systems HackerOne, which is running the program.+More on Network World: IBM: Financial services industry bombarded by malware, security threats+To read this article in full or to leave a comment, please click here]]> 2017-04-27T09:59:00+00:00 http://www.networkworld.com/article/3192932/security/u-s-military-wants-white-hat-hackers-to-target-its-cyber-security-systems.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=359870 False None None None Network World - Magazine Info Enterprise security technology consolidation Is your company spending on the right security technologies? + So, what's the problem? Point tools aren't really designed to talk with one another, leaving human beings to bridge the communications, intelligence and technology gaps between them. Furthermore, each individual tool requires training, deployment, configuration and ongoing operational support. More tools, more needs.To read this article in full or to leave a comment, please click here]]> 2017-04-27T07:14:00+00:00 http://www.networkworld.com/article/3192874/security/enterprise-security-technology-consolidation.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=359871 False Guideline None None Network World - Magazine Info IBM: Financial services industry bombarded by malware, security threats security watchers at IBM's X Force.The number of financial services records breached skyrocketed 937% in 2016 to more than 200 million. Financial institutions were forced to defend against a 29 percent increase in the number of attacks from 2015, IBM stated.+More on Network World:  IBM: Tax-related spam up 6,000% since Dec.; Darkweb tactics net billions+To read this article in full or to leave a comment, please click here]]> 2017-04-27T06:48:00+00:00 http://www.networkworld.com/article/3192927/security/ibm-financial-services-industry-bombarded-by-malware-security-threats.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=359872 False None None None Network World - Magazine Info Next-gen IoT botnet Hajime nearly 300K strong Mirai botnet that devastated high-profile websites last fall, leading some to think the internet had been broken.Researchers at Kaspersky Lab lured devices infected with the Hajime worm to announce themselves to a Kaspersky honeypot, checked out whether they were actually infected and added them up. They came up with the number 297,499, says Igor Soumenkov, principal researcher at Kaspersky Lab.An earlier estimate by Symantec put the size at tens of thousands. Estimates of the number of infected devices in Mirai botnets have put it about 400,000, but the number of devices that might be infected with the Hajime worm is 1.5 million, says Dale Drew, the CSO of Level 3, which has been building a profile of behavioral classifiers to identify it so it can be blocked.To read this article in full or to leave a comment, please click here]]> 2017-04-27T06:31:00+00:00 http://www.networkworld.com/article/3192925/security/next-gen-iot-botnet-hajime-nearly-300k-strong.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=359873 False Guideline None None Network World - Magazine Info Foiled! 15 tricks to hold off the hackers To read this article in full or to leave a comment, please click here]]> 2017-04-27T05:36:00+00:00 http://www.networkworld.com/article/3192850/security/foiled-15-tricks-to-hold-off-the-hackers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=359755 True None None None Network World - Magazine Info 10 ways to achieve ROI on a network solution Image by ThinkstockWith the advent of Bring Your Own Device (BYOD), WLAN network access to customers and visitors and virtualized systems, the demand for IP addresses has exploded. Small companies might have to manage more than 1,000 IP addresses and it is not unusual for larger companies to have 10,000 or more spread across many locations. Setting up and protecting the network infrastructure is a major challenge and needs to be even more sophisticated and dynamic than ever before.To read this article in full or to leave a comment, please click here]]> 2017-04-27T05:31:00+00:00 http://www.networkworld.com/article/3192893/security/10-ways-to-achieve-roi-on-a-network-solution.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=359756 True None None None Network World - Magazine Info Latest OWASP Top 10 looks at APIs, web apps out for public comment from the Open Web Application Security Project, and while most of it remains the same there are a couple of new additions, focusing on protections for web applications and APIs.To make room for the new items, a couple of older ones were either removed or merged into new items.The fact that the list hasn't changed much since its first release in 2003 is both good and bad, said Jeff Williams, CTO and co-founder at Contrast Security.To read this article in full or to leave a comment, please click here]]> 2017-04-27T05:29:00+00:00 http://www.networkworld.com/article/3192849/security/latest-owasp-top-10-looks-at-apis-web-apps.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=359757 False None None None Network World - Magazine Info BlackBerry KeyOne to launch in US and Canada in late May originally had said the phone would go on sale in April, so the delay may disappoint potential users. This could be a bad time to test the patience of potential buyers, as Samsung and LG are both heavily promoting their new flagship handsets, the S8 and G6.To read this article in full or to leave a comment, please click here]]> 2017-04-27T03:05:01+00:00 http://www.networkworld.com/article/3192832/smartphones/blackberry-keyone-to-launch-in-us-and-canada-in-late-may.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=359761 False None None None Network World - Magazine Info Juniper finds its head in the clouds; security is another story full transcript of the call here]. “The cloud is a massive paradigm shift that is reshaping all industries, and I'm excited about the opportunity we have in front of us.”To read this article in full or to leave a comment, please click here]]> 2017-04-26T14:29:00+00:00 http://www.networkworld.com/article/3192765/security/juniper-finds-its-head-in-the-clouds-security-is-another-story.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=359487 False None None None Network World - Magazine Info Ransomware attacks are taking a greater toll on victim\'s wallets report.In addition, the security firm has been detecting more ransomware infection attempts. In 2016, the figure jumped by 36 percent from the year prior.  That doesn't bode well for the public. Ransomware is notorious for taking over computers, and essentially holding them hostage. To do so, the malicious coding encrypts all the data inside, and then demands a fee, usually in bitcoin, in exchange for releasing the machine.To read this article in full or to leave a comment, please click here]]> 2017-04-26T13:58:00+00:00 http://www.networkworld.com/article/3192785/security/ransomware-attacks-are-taking-a-greater-toll-on-victims-wallets.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=359488 False None None None Network World - Magazine Info Companion mobile app exposed Hyundai cars to potential hijacking Blue Link is a subscription-based technology that's available for many Hyundai car models released after 2012. It allows car owners to remotely locate their vehicles in case of theft, to remotely unlock them if they lose or misplace their keys, and even to remotely start or stop their engine when they're parked and locked.To read this article in full or to leave a comment, please click here]]> 2017-04-26T12:09:21+00:00 http://www.networkworld.com/article/3192590/security/companion-mobile-app-exposed-hyundai-cars-to-potential-hijacking.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=359489 False None None None Network World - Magazine Info IDG Contributor Network: MasterCard puts a finger on fraud MasterCard intends to address that with its newly introduced card with a built-in fingerprint sensor.This new MasterCard gives customers the option of using a single digit rather than a PIN. It's a very impressive development, particularly since it works with existing chip readers.+ Also on Network World: Google's Trust API: Bye-bye passwords, hello biometrics? + The card gives new meaning to the title “cardholder” as the customer must physically hold the card during the transaction. There's a fingerprint sensor on the face of the card that syphons enough power from the chip reader to read and validate a fingerprint. If dirt, sweat or other factors prevent validation, the transaction can be completed with a PIN.To read this article in full or to leave a comment, please click here]]> 2017-04-26T10:36:00+00:00 http://www.networkworld.com/article/3192544/security/mastercard-puts-a-finger-on-fraud.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=359490 False None None None Network World - Magazine Info McAfee: Wave of Shamoon cyberattacks being coordinated by a single group To read this article in full or to leave a comment, please click here]]> 2017-04-26T10:14:00+00:00 http://www.networkworld.com/article/3192705/security/mcafee-wave-of-shamoon-cyberattacks-being-coordinated-by-a-single-group.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=359494 False None None None Network World - Magazine Info Report: Top 25 IT security products IT Central Station, which collects reviews from verified enterprise IT product users, has compiled a report that identifies 25 top-rated products in security categories such as cloud security, firewalls, security information and event management (SIEM), application security and internet of things (IoT) security.IT Central Station selected the product leaders in each security category. The report uses a scoring methodology based on a combination of buyer interest, the number of reviews (at least 10), and the average rating in those reviews.To read this article in full or to leave a comment, please click here]]> 2017-04-26T10:13:00+00:00 http://www.networkworld.com/article/3192543/security/report-top-25-it-security-products.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=359496 False Guideline None None Network World - Magazine Info Security-as-a-service model gains traction 451 Research."The security challenge for mid-tier businesses is multi-dimensional," Daniel Cummins, analyst at 451 Research, said in a statement. "For these businesses, everything seems to be increasing - attack frequency, compliance requirements, complexity, costs and the number of security products that need to be managed. Cloud-based security-as-a-service offers potentially significant advantages in terms of simplicity and access to security that may prove to be less complex and expensive than traditional approaches."To read this article in full or to leave a comment, please click here]]> 2017-04-26T10:13:00+00:00 http://www.networkworld.com/article/3192546/security/security-as-a-service-model-gains-traction.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=359495 False None None None Network World - Magazine Info IDG Contributor Network: Cyber crime as a service forces changes in information security DDoS-for-hire services thrive despite closure of major marketplace + Major companies (think Fortune 500 organizations) understand that cyber crime as a service has changed how they handle defense. But for organizations still maturing their defensive measures, here's what the transformation of cyber crime into an industry means for how you approach information security.  To read this article in full or to leave a comment, please click here]]> 2017-04-26T07:14:00+00:00 http://www.networkworld.com/article/3192400/security/cyber-crime-as-a-service-forces-changes-in-information-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=359497 False None None None Network World - Magazine Info Drunken man arrested for assaulting 300-lb. K5 security robot Knightscope's K5 Autonomous Data Machine in a parking lot, he was arrested and stands accused of “prowling and public intoxication.”Knightscope told ABC7, “It's a testament to the technology that police caught the aggressor and booked in him jail.”To read this article in full or to leave a comment, please click here]]> 2017-04-26T06:57:00+00:00 http://www.networkworld.com/article/3192650/security/drunken-man-arrested-after-assaulting-300lb-k5-security-robot.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=359498 False None Prowli None Network World - Magazine Info Russian hackers use OAuth, fake Google apps to phish users Fancy Bear or Pawn Storm, has been carrying out the attack with its favored tactic of sending out phishing emails, Trend Micro said in a report Tuesday. To read this article in full or to leave a comment, please click here]]> 2017-04-25T17:54:20+00:00 http://www.networkworld.com/article/3192469/security/russian-hackers-use-oauth-fake-google-apps-to-phish-users.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=358660 False None APT 28 None Network World - Magazine Info Old Windows Server machines can still fend off hacks. Here\'s how paint a bulls-eye on computers running Windows Server 2003, according to security researchers.“I can teach my mom how to use some of these exploits,” said Jake Williams, founder of Rendition Infosec, a security provider. “They are not very complicated at all.”Experts are urging affected businesses to upgrade to the latest Windows OSes, which offer security patches that can address the threat.To read this article in full or to leave a comment, please click here]]> 2017-04-25T16:11:50+00:00 http://www.networkworld.com/article/3192435/security/old-windows-server-machines-can-still-fend-off-hacks-heres-how.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=358661 False None None None Network World - Magazine Info Security certificates gone wrong To read this article in full or to leave a comment, please click here]]> 2017-04-25T11:50:00+00:00 http://www.networkworld.com/article/3192356/security/security-certificates-gone-wrong.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=358662 False None None None Network World - Magazine Info How your company needs to train workers in cybersecurity National Cyber Security Alliance, a group that promotes education on the safe and secure use of the internet. The group's members include such major technology companies as Cisco, Facebook, Google, Intel and Microsoft.To read this article in full or to leave a comment, please click here]]> 2017-04-25T10:17:00+00:00 http://www.networkworld.com/article/3192355/security/how-your-company-needs-to-train-workers-in-cybersecurity.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=358663 False None None None Network World - Magazine Info Cisco switch taps into Time Sensitive Ethernet; software bolsters industrial network mgmt. Ethernet: Are there worlds left to conquer?+To read this article in full or to leave a comment, please click here]]> 2017-04-25T09:26:00+00:00 http://www.networkworld.com/article/3192353/cisco-subnet/cisco-switch-taps-into-time-sensitive-ethernet-software-bolsters-industrial-network-mgmt.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=358676 False None None None Network World - Magazine Info Cybersecurity skills shortage impact on technology innovation Information Systems Security Association (ISSA). In a survey of 437 cybersecurity professionals and ISSA members: 29% of cybersecurity professionals said the global cybersecurity skills shortage has had a significant impact on their organization. Another 40% said the global cybersecurity skills shortage has impacted their organization “somewhat.” When asked to identify the impact of the cybersecurity skills shortage: 54% said it increased the cybersecurity staff's workload 35% said their organization had to hire and train junior staff rather than hire people with the appropriate level of experience necessary 35% said the cybersecurity skills shortage has created a situation whereby the infosec team hasn't had time to learn or use its security technologies to their full potential While the cybersecurity skills shortage endures, the industry itself remains white hot. According to a recent Bloomberg business article, the cybersecurity industry is expected to grow about 7% a year through 2019 to reach $46 billion in valuation.To read this article in full or to leave a comment, please click here]]> 2017-04-25T07:52:00+00:00 http://www.networkworld.com/article/3192345/security/cybersecurity-skills-shortage-impact-on-technology-innovation.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=358677 False None None None Network World - Magazine Info Respond to ransomware in three steps: secure, assess, recover To read this article in full or to leave a comment, please click here]]> 2017-04-25T07:50:00+00:00 http://www.networkworld.com/article/3192175/security/respond-to-ransomware-in-three-steps-secure-assess-recover.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=358678 False None None None Network World - Magazine Info Webroot deletes Windows files and causes serious problems for users continued on the Webroot community forum -- 14 pages and counting. The company came up with a manual fix to address the issue, but many users still had problems recovering their affected systems.The problem is what's known in the antivirus industry as a "false positive" -- a case where a clean file is flagged as malicious and is blocked or deleted. False positive incidents can range in impact from merely annoying -- for example, when a program cannot run anymore -- to crippling, where the OS itself is affected and no longer boots.To read this article in full or to leave a comment, please click here]]> 2017-04-25T07:19:01+00:00 http://www.networkworld.com/article/3192304/security/webroot-deletes-windows-files-and-causes-serious-problems-for-users.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=358679 False None None None Network World - Magazine Info Chaos for customers: Webroot flags Windows as malware and Facebook as phishing site 13 minutes yesterday afternoon, flagged crucial Windows system files as malicious, causing chaos and 15 pages of customer complaints so far.The havoc began after Webroot flagged some Windows system files as the malware Win32.Trojan.Gen and moved key system files to quarantine. As legit files were shuffled around, thousands upon thousands of Webroot customers experienced OS errors or crashed Windows systems.To read this article in full or to leave a comment, please click here]]> 2017-04-25T07:19:00+00:00 http://www.networkworld.com/article/3192285/security/chaos-for-customers-webroot-flagged-windows-as-malware-and-facebook-as-phishing-site.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=358680 False None None None Network World - Magazine Info Systemic cybersecurity crisis looms How CISOs should address their boards about security + There is a widespread notion that cybersecurity is one more hurdle for executives to deal with that drains company resources. Cisco surveyed more than 1,000 executives, and 74 percent of participants said the main purpose of cybersecurity is to reduce risk rather than enable growth. This ideology that cybersecurity is costly, hinders productivity and is maintained based on a company decision maker's level of paranoia is not just inaccurate, it is harmful. As a result, many organizations underinvest in their cybersecurity programs, implementing minimal security measures that may be obsolete in a few short years as cyber threats evolve and new attack vectors emerge.To read this article in full or to leave a comment, please click here]]> 2017-04-25T07:03:00+00:00 http://www.networkworld.com/article/3192150/security/systemic-cybersecurity-crisis-looms.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=358681 False None None None Network World - Magazine Info IDG Contributor Network: Twistlock leverages the container opportunity to score big funding Finding and protecting the crown jewels + One interesting area is that of security as it relates to containerized applications. One vendor doing good work in the space is Twistlock. Twistlock describes itself as the industry's first enterprise security suite for containers. Twistlock's technology addresses risks on the host and within the application of the container. In doing so, it gives enterprises the ability to consistently enforce security policies, monitor and audit activity, and identify and isolate threats in a container or cluster of containers. Twistlock's stated mission is to provide a full, enterprise-grade security stack for containers so organizations can confidently adopt and maximize the benefits of containers in their production environment.To read this article in full or to leave a comment, please click here]]> 2017-04-25T06:00:00+00:00 http://www.networkworld.com/article/3191616/application-development/twistlock-leverages-the-container-opportunity-to-score-big-funding.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=358572 False None None None Network World - Magazine Info IDG Contributor Network: How CISOs should address their boards about security How to survive in the CISO hot seat + Board members want a high-level picture of the threat landscape and a checklist of the measures you've taken and policies you've adopted to protect the organization. Your job is to provide the board with perspective and not necessarily details. A scorecard or checklist can be an effective visual and a good starting point for a discussion of the organization's security measures. It lets you provide a high-level overview, and it gives you a road map for diving into details if the board asks for more information.To read this article in full or to leave a comment, please click here]]> 2017-04-25T05:09:00+00:00 http://www.networkworld.com/article/3190649/security/how-cisos-should-address-their-boards-about-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=358573 False None None None Network World - Magazine Info What to ask when selecting application security solutions Image by ThinkstockThere are many factors to consider when making an application security purchasing decision, and the pressure is on organizations now more than ever to improve their security risk management preparedness. In fact, more than 80 percent of security attacks target software applications, with application vulnerabilities as the No.1 cyber-attack target. Organizations need a comprehensive application security toolkit to stay secure throughout the product lifecycle, and need to address key questions that can help them determine the right tools to address security risks.To read this article in full or to leave a comment, please click here]]> 2017-04-25T04:27:00+00:00 http://www.networkworld.com/article/3192146/application-security/what-to-ask-when-selecting-application-security-solutions.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=358574 True None None None Network World - Magazine Info How CISOs find their perfect job CISOs, dismissed from previous jobs, get handed new opportunities time and time again.To read this article in full or to leave a comment, please click here]]> 2017-04-25T04:26:00+00:00 http://www.networkworld.com/article/3192145/careers/how-cisos-find-their-perfect-job.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=358575 False None None None Network World - Magazine Info Hipchat resets user passwords after possible breach blog post. But this happened in no more than 0.05 percent of the cases, each of which involved a domain URL, such as company.hipchat.com.HipChat didn't say how many users may have been affected by the incident. The passwords that may have been exposed would also be difficult to crack, the company said. The data is hashed, or obscured, with the bcrypt algorithm, which transforms the passwords into a set of random-looking characters. For added security, HipChat "salted" each password with a random value before hashing it.To read this article in full or to leave a comment, please click here]]> 2017-04-24T18:08:20+00:00 http://www.networkworld.com/article/3192224/security/hipchat-resets-user-passwords-after-possible-breach.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=358407 False None None None Network World - Magazine Info Customers roast Microsoft over security bulletins\' demise Janelle 322 in a support forum where Microsoft urged customers to post thoughts on the change. "I now have to manually transcribe this information to my spreadsheet to disseminate to my customers. You have just added 8 hours to my workload. Thanks for nothing."To read this article in full or to leave a comment, please click here]]> 2017-04-24T14:57:00+00:00 http://www.networkworld.com/article/3192184/security/customers-roast-microsoft-over-security-bulletins-demise.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=358408 False None None None Network World - Magazine Info 7 patch management practices guaranteed to help protect your data To read this article in full or to leave a comment, please click here]]> 2017-04-24T13:59:00+00:00 http://www.networkworld.com/article/3192124/security/7-patch-management-practices-guaranteed-to-help-protect-your-data.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=358409 False None None None Network World - Magazine Info More Windows PCs infected with NSA backdoor DoublePulsar Shadow Brokers leaked the hacking tools on April 14.DoublePulsar infection rate climbing Two different sets of researchers scanning for the DoublePulsar implant saw a significant bump in the number of infected Windows PCs over the weekend.For example, Dan Tentler, CEO of the Phobos Group, suggested that Monday would not be a good day for many people, as his newest scan showed about 25 percent of all vulnerable and publicly exposed SMB machines are infected.To read this article in full or to leave a comment, please click here]]> 2017-04-24T07:50:00+00:00 http://www.networkworld.com/article/3191945/security/number-of-windows-pcs-infected-with-nsa-backdoor-doublepulsar-continues-to-rise.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=358410 False None None None Network World - Magazine Info Bring Your Own Authentication is upending online security practices To read this article in full or to leave a comment, please click here]]> 2017-04-24T07:37:00+00:00 http://www.networkworld.com/article/3191964/security/bring-your-own-authentication-is-upending-online-security-practices.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=358423 False Guideline None None Network World - Magazine Info Russian man receives longest-ever prison sentence in the US for hacking To read this article in full or to leave a comment, please click here]]> 2017-04-24T06:44:16+00:00 http://www.networkworld.com/article/3191830/security/russian-man-receives-longest-ever-prison-sentence-in-the-us-for-hacking.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=358424 False None None None Network World - Magazine Info 11 technologies developers should explore now career development guide for developers. | The art of programming is changing rapidly. We help you navigate what's hot in programming and what's going cold. | Keep up with hot topics in programming with InfoWorld's App Dev Report newsletter. ] If you're interested in expanding your developer's toolkit, check out these trending domains-and our tips on how to get ahead by getting started with them.To read this article in full or to leave a comment, please click here]]> 2017-04-24T04:54:00+00:00 http://www.networkworld.com/article/3191805/application-development/11-technologies-developers-should-explore-now.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=358337 False None None None Network World - Magazine Info FAQ: What is blockchain and how can it help business? already looking to include it as part of their services.To read this article in full or to leave a comment, please click here]]> 2017-04-24T04:50:00+00:00 http://www.networkworld.com/article/3191844/security/faq-what-is-blockchain-and-how-can-it-help-business.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=358338 False None None None Network World - Magazine Info Healthcare records for sale on Dark Web DataBreaches.net. The group noticed such things as dates of admission, whether the patients are on methadone, their doctors and counselors, and dosing information.In the DataBreaches.net blog, the hacker “Return,” who they think is Russian, described how he compromised the Man Alive clinic: “With the help of the social engineer, applied to one of the employees. Word file with malicious code was downloaded.”To read this article in full or to leave a comment, please click here]]> 2017-04-24T04:45:00+00:00 http://www.networkworld.com/article/3191804/security/healthcare-records-for-sale-on-dark-web.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=358339 False None None None