www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-15T02:35:50+00:00 www.secnews.physaphae.fr Network World - Magazine Info Hackers are shaping U.S. election coverage with data leaks juicy details found in the emails. For example, Powell called Clinton “greedy” and her rival Donald Trump a “national disgrace.”The incident has security experts worried that hackers are manipulating U.S. media outlets to influence this year's election.To read this article in full or to leave a comment, please click here]]> 2016-09-14T17:09:58+00:00 http://www.networkworld.com/article/3120488/hackers-are-shaping-us-election-coverage-with-data-leaks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=66190 False None None None Network World - Magazine Info Volkswagen is founding a new cybersecurity firm to prevent car hacking broken into by exploiting the remote control key systems.To read this article in full or to leave a comment, please click here]]> 2016-09-14T10:15:41+00:00 http://www.networkworld.com/article/3120279/volkswagen-is-founding-a-new-cybersecurity-firm-to-prevent-car-hacking.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=64506 False None None None Network World - Magazine Info Adobe fixes critical flaws in Flash Player and Digital Editions an advisory.Adobe advises users to update Flash Player version 23.0.0.162 on Windows and Mac or version 11.2.202.635 on Linux. The new version of the Flash Player extended support release, which only receives security patches, is now 18.0.0.375.To read this article in full or to leave a comment, please click here]]> 2016-09-14T09:39:36+00:00 http://www.networkworld.com/article/3120346/adobe-fixes-critical-flaws-in-flash-player-and-digital-editions.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=64273 False Guideline None None Network World - Magazine Info Microsoft releases one of its biggest security updates this year MS16-104 bulletin, Microsoft Edge (MS16-105), Microsoft Office (MS16-107), Microsoft Graphics Component (MS16-106), OLE Automation for VBScript Scripting Engine (MS16-116) and Adobe Flash Player (MS16-117).To read this article in full or to leave a comment, please click here]]> 2016-09-14T07:33:32+00:00 http://www.networkworld.com/article/3120227/microsoft-releases-one-of-its-biggest-security-updates-this-year.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=63871 False None None None Network World - Magazine Info Russian hackers accused of leaking US Olympic athletes\' medical files took credit for the attack and accused American Olympic athletes of doping, of using “dirty methods to win.” Furthermore, the hackers claimed that although the US Olympic team had "played well but not fair,” it had “disgraced its name by tainted victories.”To read this article in full or to leave a comment, please click here]]> 2016-09-14T07:16:00+00:00 http://www.networkworld.com/article/3120174/security/russian-hackers-accused-of-leaking-us-olympic-athletes-medical-files.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=63872 False None APT 28 None Network World - Magazine Info The most secure home computer ever Cold boot attacks, USB exploits,or DMA attacks over FireWire, among other breaches, are all possible if a bad actor can get his or her hands on the hardware.To read this article in full or to leave a comment, please click here]]> 2016-09-14T05:28:00+00:00 http://www.networkworld.com/article/3119758/security/orwl-pc-the-most-secure-home-computer-ever.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=63474 False None None None Network World - Magazine Info Apple Pay coming to 200,000-plus websites, not just in-store or in-app To read this article in full or to leave a comment, please click here]]> 2016-09-14T05:25:00+00:00 http://www.networkworld.com/article/3119896/ios/apple-pay-coming-to-200-000-plus-websites-not-just-in-store-or-in-app.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=63475 False None None None Network World - Magazine Info Google offers $200K for top prize in new Android hack challenge in Windows 10's Edge browser.In the case of multi-exploit entries, Google also departed from the usual contest or bounty rules by encouraging researchers to submit each link in the bug chain as the flaws were uncovered, rather than wait until all were in place and exploitable.To read this article in full or to leave a comment, please click here]]> 2016-09-14T05:22:00+00:00 http://www.networkworld.com/article/3120090/security/google-offers-200k-for-top-prize-in-new-android-hack-challenge.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=63476 False None None None Network World - Magazine Info Microsoft Intune to support Android for Work Google's container technology for mobile application management in a future release of Intune, Microsoft's own enterprise mobility management (EMM) server. The Microsoft blog post gave no timeline.Android for Work, initially released in winter 2015 as part of an Android 5.0 Lollipop update, brought to Android the same level of enterprise-grade protection for mobile apps that had previously been available only to Apple's iOS devices or Samsung's Android devices running Samsung's own Knox technology.To read this article in full or to leave a comment, please click here]]> 2016-09-14T05:19:00+00:00 http://www.networkworld.com/article/3119722/android/microsoft-intune-to-support-android-for-work.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=63477 False None None None Network World - Magazine Info Hackers smear Olympic athletes with data dump of medical files posted Tuesday on a site bearing the name of the hacking group Fancy Bears. “Today we'd like to tell you about the U.S. Olympic team and their dirty methods to win,” said a message on the hackers' site.The World Anti-Doping Agency confirmed it had been hacked and blamed Fancy Bears, a Russian state-sponsored cyber espionage team that is also known as APT 28 -- the very same group that may have recently breached the Democratic National Committee.To read this article in full or to leave a comment, please click here]]> 2016-09-13T17:09:52+00:00 http://www.networkworld.com/article/3119712/hackers-smear-olympic-athletes-with-data-dump-of-medical-files.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=61844 False None APT 28 None Network World - Magazine Info Russian hackers allegedly target the World Anti-Doping Agency statement.To read this article in full or to leave a comment, please click here]]> 2016-09-13T13:54:46+00:00 http://www.networkworld.com/article/3119877/russian-hackers-allegedly-target-the-world-anti-doping-agency.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=61137 False None APT 28 None Network World - Magazine Info Mergers create greater security risk To read this article in full or to leave a comment, please click here]]> 2016-09-13T12:51:00+00:00 http://www.networkworld.com/article/3119668/security/mergers-create-greater-security-risk.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=60899 False None None None Network World - Magazine Info Who knew Edward Snowden would become such a musical inspiration? Snowden-inspired songs emerged from the DIY set in the immediate wake of the leaks back in 2013. But 2016 is shaping up to be another big year with fresh material.The latest Snowden song comes courtesy of Peter Gabriel for the new Oliver Stone biopic featuring Joseph Gordon-Leveitt called "Snowden." Gabriel's song, "The Veil," plays during the end credits of the film, and basically tells the Snowden story, as the former Genesis band member sings about Snowden being a hero to some and a traitor to others.To read this article in full or to leave a comment, please click here]]> 2016-09-13T12:05:00+00:00 http://www.networkworld.com/article/3119771/security/who-knew-edward-snowden-would-become-such-a-musical-inspiration.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=60840 False None None None Network World - Magazine Info Sept 2016 Patch Tuesday: Microsoft released 14 security bulletins, rated 7 as critical 14 security bulletins for September, seven of which are rated critical due to remote code execution flaws. Microsoft in all its wisdom didn't regard all RCEs as critical. There's also an “important rated” patch for a publicly disclosed flaw which Microsoft claims isn't a zero-day being exploited. But at least a 10-year-old hole is finally being plugged.Next month marks a significant change as Microsoft says it intends roll out "servicing changes" which include bundled patches; unless things change, not all Windows users will be able to pick and choose specific security updates starting in October.To read this article in full or to leave a comment, please click here]]> 2016-09-13T11:56:00+00:00 http://www.networkworld.com/article/3119772/security/sept-2016-patch-tuesday-microsoft-released-14-security-bulletins-rated-7-as-critical.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=60841 False None None None Network World - Magazine Info Enterprises hope their mobile users pay attention to security Enterprise Mobility Security Goals & Challenges-conducted by Silicon Valley management services provider NetEnrich.To read this article in full or to leave a comment, please click here]]> 2016-09-13T09:25:00+00:00 http://www.networkworld.com/article/3118219/security/enterprises-hope-their-mobile-users-pay-attention-to-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=60270 False None None None Network World - Magazine Info Hackers found 47 new vulnerabilities in 23 IoT devices at DEF CON To read this article in full or to leave a comment, please click here]]> 2016-09-13T08:28:51+00:00 http://www.networkworld.com/article/3118759/hackers-found-47-new-vulnerabilities-in-23-iot-devices-at-def-con.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=59973 False None None None Network World - Magazine Info Apple\'s new Bluetooth security hole Bluetooth instead of wired headphone connectivity will give you nightmares. Part of the problem is the Bluetooth protocol itself; the other problem is that civilians leave it on and accessible. But you've already buttoned down all of that stuff, right? Like others in the tech press, I've taken out my Bluetooth analyzer and watched the count of responding devices in downtown Bloomington, Indiana, near the lab. It's easy to do. To read this article in full or to leave a comment, please click here]]> 2016-09-13T08:21:00+00:00 http://www.networkworld.com/article/3119351/security/apples-new-bluetooth-security-hole.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=59974 False None None None Network World - Magazine Info FTC focuses on combating ransomware The history of ransomware ]FTC Chair Edith Ramirez addressed the issue at a recent forum that the agency convened to examine the spread of ransomware and explore strategies to combat the crime."The spate of ransomware incidents are escalating at an alarming rate," Ramirez says, citing an estimate from the Department of Justice that incidents of ransomware, now averaging some 4,000 a day, have increased 300 percent in the past year.To read this article in full or to leave a comment, please click here]]> 2016-09-13T07:35:00+00:00 http://www.networkworld.com/article/3119603/security/ftc-focuses-on-combating-ransomware.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=59785 False None None None Network World - Magazine Info 6 questions to ask about containers Image by ThinkstockContainer technology promises greater agility and efficiency when it comes to building and deploying applications, a critical ability in this age of zero tolerance for downtime and great expectations for capabilities on demand. But with any new technology comes new risk, and security professionals must be able to accurately determine the risk-reward balance of containers for their organizations. Lars Herrmann, general manager, Integrated Solutions Business Unit at Red Hat, poses six questions CISOs must ask when evaluating container platforms.To read this article in full or to leave a comment, please click here]]> 2016-09-13T06:14:00+00:00 http://www.networkworld.com/article/3119309/cloud-security/6-questions-to-ask-about-containers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=59579 True None None None Network World - Magazine Info Autonomous cars? How about airliners? who tells the BBC:   “So with pilots relying on autopilots for 95% of today's flights, the argument goes, why not make the final 5% – take-off and landing – automated?” says Robinson. “Computers fly ultra-precise, repeatable trajectories, do not fly drunk, do not get tired, do not get distracted and so the thinking goes could be safer than human pilots in the future.”To read this article in full or to leave a comment, please click here]]> 2016-09-13T06:04:00+00:00 http://www.networkworld.com/article/3119688/security/autonomous-cars-how-about-airliners.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=59582 False None None None Network World - Magazine Info Why You Lost Your Windows 10 Product Key 2016-09-13T02:00:00+00:00 http://www.networkworld.com/video/68796/why-you-lost-your-windows-10-product-key#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=58980 False None None None Network World - Magazine Info MySQL zero-day exploit puts some servers at risk of hacking To read this article in full or to leave a comment, please click here]]> 2016-09-12T11:27:29+00:00 http://www.networkworld.com/article/3119115/mysql-zero-day-exploit-puts-some-servers-at-risk-of-hacking.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=55729 False None None None Network World - Magazine Info IDG Contributor Network: Does the NSA have a duty to disclose zero-day exploits? “The Shadow Brokers” published what it claimed were a set of NSA “cyber weapons,” a combination of exploits, both zero day and long past, designed to target routers and firewalls from American manufacturers, including Cisco, Juniper and Fortinet.To read this article in full or to leave a comment, please click here]]> 2016-09-12T07:38:00+00:00 http://www.networkworld.com/article/3118735/security/does-the-nsa-have-a-duty-to-disclose-zero-day-exploits.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=54654 False None None None Network World - Magazine Info Thousands of Seagate NAS boxes host cryptocurrency mining malware To read this article in full or to leave a comment, please click here]]> 2016-09-12T07:15:12+00:00 http://www.networkworld.com/article/3118713/thousands-of-seagate-nas-boxes-host-cryptocurrency-mining-malware.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=54655 False None None None Network World - Magazine Info IDG Contributor Network: Smartphones to get best encryption possible Why smartphone encryption has law enforcement feathers ruffled +To read this article in full or to leave a comment, please click here]]> 2016-09-12T07:08:00+00:00 http://www.networkworld.com/article/3118211/mobile-security/smartphones-to-get-best-encryption-possible.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=54656 False None None None Network World - Magazine Info Review: 5 open source alternatives for routers/firewalls To read this article in full or to leave a comment, please click here]]> 2016-09-12T03:00:00+00:00 http://www.networkworld.com/article/3118055/open-source-tools/review-5-open-source-alternatives-for-routers-firewalls.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=53596 True None None None Network World - Magazine Info 5 open source alternatives for routing/firewall Open source software offers an economical and flexible option for deploying basic home, SMB or even enterprise networking. These open source products deliver simple routing and networking features, plus they are combined with security functionality, starting with a basic firewall and possibly including antivirus, antispam and Web filtering. These products can be downloaded and deployed on your own hardware, on a virtual platform, or in the cloud. Many of them sell pre-configured appliances as well. We reviewed five products: ClearOS, DD-WRT, pfSense, Untangle and ZeroShell. We found that ClearOS, pfSense, and Untangle could be appropriate for home use all the way up to the enterprise environment.To read this article in full or to leave a comment, please click here]]> 2016-09-12T03:00:00+00:00 http://www.networkworld.com/article/3118704/open-source-tools/5-open-source-alternatives-for-routing-firewall.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=53595 True None None None Network World - Magazine Info Krebs\' site under attack after alleged owners of DDoS-for-hire service were arrested wrote about vDOS and the two 18-year-old Israeli hackers running the DDoS attack service. In the past two years, the duo launched over 150,000 attacks and made at least $618,000. vDOS had been hacked and Krebs had obtained a copy of the vDOS database.vDOS had paying subscribers with the cost depending upon how many seconds the DDoS attack lasted. Krebs reported, “In just four months between April and July 2016, vDOS was responsible for launching more than 277 million seconds of attack time, or approximately 8.81 years' worth of attack traffic.”To read this article in full or to leave a comment, please click here]]> 2016-09-11T08:48:00+00:00 http://www.networkworld.com/article/3118303/security/krebs-site-under-attack-after-alleged-owners-of-ddos-for-hire-service-were-arrested.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=48919 False None None None Network World - Magazine Info Crafty malware is found targeting U.S. government employees published details on GovRAT, a sophisticated piece of malware that's designed to bypass antivirus tools. It does this by using stolen digital certificates to avoid detection.Through GovRAT, hackers can potentially steal files from a victim's computer, remotely execute commands, or upload other malware to the system.To read this article in full or to leave a comment, please click here]]> 2016-09-09T17:05:50+00:00 http://www.networkworld.com/article/3118768/crafty-malware-is-found-targeting-us-government-employees.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=39547 False None None None Network World - Magazine Info A satisfying tale of sleuthing, justice Christian Hascheck teaches computer science in Vienna, Austria when not working on his own projects, which include a novel grading system. In 2012, he won $500 worth of Apple gift cards for a funny sysadmin story about ferreting out a not terribly sophisticated rogue Wi-Fi operation.Then the move aboard. He tells the story on his blog: Since then I have repeatedly tried to use or sell (the cards) but since I'm not currently living in the US it wasn't possible for me.My last attempt to sell them was via reddit. I know there are a lot of scammers out there, so I thought Bitcoin would be the right choice since the scammer can't just reclaim their money after I gave them the card codes.To read this article in full or to leave a comment, please click here]]> 2016-09-09T09:25:00+00:00 http://www.networkworld.com/article/3118687/security/a-satisfying-tale-of-sleuthing-justice.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=37653 False None None None Network World - Magazine Info Today\'s supercomputers will get blown away by these systems DoE Exascale Computing Project says such high-performance computing systems can make at least a billion billion calculations per second, and will be used to process data for applications such as energy security, economic security, scientific discovery, healthcare and climate/environmental science. The U.S. is shooting to attain such powerful systems by the mid-2020s and China is aiming for 2020.To read this article in full or to leave a comment, please click here]]> 2016-09-09T07:49:00+00:00 http://www.networkworld.com/article/3118340/hardware/todays-supercomputers-will-get-blown-away-by-these-systems.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=37026 False None None None Network World - Magazine Info UK police listened in to 9 percent more calls last year report, compiled by the Interception of Communications Commissioner's Office (IOCCO), covers the surveillance activities of the U.K.'s three main intelligence agencies (MI5, the Secret Intelligence Service, and GCHQ, the Government Communications Headquarters), the tax authority, and a number of police forces.It shows that warrants for the interception of communications rose 9 percent and that authorities continue to collect communications metadata -- information about who called or connected to whom, when, how often -- with abandon. To read this article in full or to leave a comment, please click here]]> 2016-09-09T07:30:49+00:00 http://www.networkworld.com/article/3118257/uk-police-listened-in-to-9-percent-more-calls-last-year.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=37027 False None None None Network World - Magazine Info Xen Project patches serious virtual machine escape flaws reboot some of its servers over the past few days to apply the new patches.To read this article in full or to leave a comment, please click here]]> 2016-09-09T06:25:17+00:00 http://www.networkworld.com/article/3118668/xen-project-patches-serious-virtual-machine-escape-flaws.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=36707 False None None None Network World - Magazine Info This USB stick will fry your unsecured computer creating a USB stick that uses an electrical discharge to fry an unauthorized computer into which it's plugged."When the USB Kill stick is plugged in, it rapidly charges its capacitors from the USB power supply, and then discharges -- all in the matter of seconds," the company said in a news release.usbkill 4 USBKill.com The USB Kill 2.0 stick.To read this article in full or to leave a comment, please click here]]> 2016-09-09T05:19:00+00:00 http://www.networkworld.com/article/3118288/hardware/this-usb-thumb-drive-will-fry-your-unsecured-computer.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=36454 False None None None Network World - Magazine Info IDG Contributor Network: Massive solar storm will \'kill\' the internet, says space expert press release.Pelton, who is also a current executive board member of the International Association of Space Safety (IAASS), has published an article in Room: The Space Journal (subscription) on the subject.To read this article in full or to leave a comment, please click here]]> 2016-09-09T04:00:00+00:00 http://www.networkworld.com/article/3117211/internet/massive-solar-storm-will-kill-the-internet-says-space-expert.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=36183 False None None None Network World - Magazine Info Yes, U.S. did hack Elysée Palace in 2012, French ex-spy says To read this article in full or to leave a comment, please click here]]> 2016-09-08T16:13:00+00:00 http://www.networkworld.com/article/3118319/yes-us-did-hack-elyse-palace-in-2012-french-ex-spy-says.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=34031 False None None None Network World - Magazine Info RSA: Expect business as usual now that Dell owns it RSA Amit Yoran Enterprises should expect business as usual from RSA in the wake of its being swept up by Dell this week in the largest tech deal ever, with company executives saying it will retain a good deal of autonomy to carry out its strategic plans.To read this article in full or to leave a comment, please click here]]> 2016-09-08T15:34:00+00:00 http://www.networkworld.com/article/3118358/security/rsa-expect-business-as-usual-now-that-dell-owns-it.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=33860 False None None None Network World - Magazine Info Data hoarders are shining a spotlight on past breaches Vigilante.pw, helped to uncover details about stolen data taken from the popular porn site Brazzers. A copy of almost 800,000 accounts, probably originally hacked back in 2012, fell into his hands.The stolen database is just one of the many Keen has on file, in fact, and each one can involve thousands or even millions of internet accounts. Vigilante.pw continually archives past data breaches as a way to warn the public. To read this article in full or to leave a comment, please click here]]> 2016-09-08T15:18:20+00:00 http://www.networkworld.com/article/3118353/data-hoarders-are-shining-a-spotlight-on-past-breaches.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=33669 False None None None Network World - Magazine Info NuData Security adds \'unspoofable\' dimensions to the identity process   here to subscribe.  In 2012, the social networking site LinkedIn suffered a data breach in which username/password combinations were stolen. Four years later, in 2016, at least 117 million sets of credentials from this breach were available for purchase online. MySpace suffered a similar data breach, and years later 427 million sets of credential were posted online.These events have prompted e-commerce companies that have not suffered a data breach to urge their customers to change their passwords as soon as possible.To read this article in full or to leave a comment, please click here]]> 2016-09-08T14:00:00+00:00 http://www.networkworld.com/article/3118347/security/nudata-security-adds-unspoofable-dimensions-to-the-identity-process.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=33463 False None None None Network World - Magazine Info Closing the incident response gap: Q&A with Sean Convery of ServiceNow To read this article in full or to leave a comment, please click here]]> 2016-09-08T13:39:00+00:00 http://www.networkworld.com/article/3118286/lan-wan/closing-the-incident-response-gap-qa-with-sean-convery-of-servicenow.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=33378 False None None None Network World - Magazine Info Government ill-equipped to thwart cyberwarfare PKWARE, made his annual list of predictions for most likely cyberattacks of the year. Number 3 on the list: The U.S. electrical grid will be attacked. He's been making predictions since 2011, and claims 95 percent accuracy so far (he also predicts that healthcare systems were at risk and that smart watches would be hacked). [ Related: Battling cyberattacks with bombs? ] "This country's infrastructure runs on antiquated technology and systems," he says. "We've already seen an electrical power grid hacked in December of last year in Ukraine," which blacked out 103 cities and partially blacked out an additional 186.To read this article in full or to leave a comment, please click here]]> 2016-09-08T12:10:00+00:00 http://www.networkworld.com/article/3118305/security/government-ill-equipped-to-thwart-cyberwarfare.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=33195 False None None None Network World - Magazine Info Google puts screws to HTTP with new warnings in Chrome post to a company blog Thursday. The plan, Schechter continued, "will take place in gradual steps, based on increasingly stringent criteria."To read this article in full or to leave a comment, please click here]]> 2016-09-08T12:06:00+00:00 http://www.networkworld.com/article/3118304/internet/google-puts-screws-to-http-with-new-warnings-in-chrome.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=33196 False None None None Network World - Magazine Info FBI arrests hackers who allegedly dumped details on government agents To read this article in full or to leave a comment, please click here]]> 2016-09-08T12:01:40+00:00 http://www.networkworld.com/article/3118225/fbi-arrests-hackers-who-allegedly-dumped-details-on-government-agents.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=33197 False None None None Network World - Magazine Info 20% off Kuna Smart Home Security Outdoor Light & Camera - Deal Alert read reviews), and its typical list price of $199 has been reduced 20% to $159. See the discounted Kuna Smart Home Security Light and Camera on Amazon.To read this article in full or to leave a comment, please click here]]> 2016-09-08T11:23:00+00:00 http://www.networkworld.com/article/3117658/home-tech/20-off-kuna-smart-home-security-outdoor-light-and-camera-deal-alert.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=32756 False None None None Network World - Magazine Info Open source algorithm helps spot social media shams Star Trek turns 50!+“Given the rise in popularity of social networks and other web services in recent years, fraudsters have strong incentives to manipulate these services. On several shady websites, anyone can buy fake Facebook page-likes or Twitter followers by the thousands. Yelp, Amazon and TripAdvisor fake reviews are also available for sale, misleading consumers about restaurants, hotels, and other services and products. Detecting and neutralizing these actions is important for companies and consumers alike,” the researchers wrote in a paper outlining their algorithm known as FRAUDAR.To read this article in full or to leave a comment, please click here]]> 2016-09-08T11:16:00+00:00 http://www.networkworld.com/article/3118131/security/open-source-algorithm-helps-spot-social-media-shams.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=32757 False Guideline None None Network World - Magazine Info Cybersecurity Goes Private: McAfee and RSA To read this article in full or to leave a comment, please click here]]> 2016-09-08T11:13:00+00:00 http://www.networkworld.com/article/3118108/security/cybersecurity-goes-private-mcafee-and-rsa.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=32758 False None None None Network World - Magazine Info Google Chrome to start marking HTTP connections as insecure To read this article in full or to leave a comment, please click here]]> 2016-09-08T10:58:07+00:00 http://www.networkworld.com/article/3118060/google-chrome-to-start-marking-http-connections-as-insecure.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=32759 False None None None Network World - Magazine Info Security an afterthought in connected home, wearable devices Online Trust Alliance (OTA) today announced that all of the problems could have been easily avoided. "In this rush to bring connected devices to market, security and privacy is often being overlooked," Craig Spiezle, executive director and president of the OTA, said in a statement today. "If businesses do not make a systematic change, we risk seeing the weaponization of these devices and an erosion of consumer confidence impacting the IoT industry on a whole due to their security and privacy shortcomings."To read this article in full or to leave a comment, please click here]]> 2016-09-08T08:47:00+00:00 http://www.networkworld.com/article/3117739/security/security-an-afterthought-in-connected-home-wearable-devices.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=32078 False None None None Network World - Magazine Info Canada-EU counter-terror data exchange is illegal, says top EU judge To read this article in full or to leave a comment, please click here]]> 2016-09-08T07:40:36+00:00 http://www.networkworld.com/article/3117796/canada-eu-counter-terror-data-exchange-is-illegal-says-top-eu-judge.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=31805 False None None None Network World - Magazine Info IDG Contributor Network: Implementing secure WANs in the cloud age To read this article in full or to leave a comment, please click here]]> 2016-09-08T06:32:00+00:00 http://www.networkworld.com/article/3117598/lan-wan/implementing-secure-wans-in-the-cloud-age.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=31575 False None None None Network World - Magazine Info A USB device is all it takes to steal credentials from locked PCs found out that all it takes to copy an OS account password hash from a locked Windows computer is to plug in a special USB device for a few seconds. The hash can later be cracked or used directly in some network attacks.For his attack, Fuller used a flash-drive-size computer called USB Armory that costs $155, but the same attack can be pulled off with cheaper devices, like the Hak5 LAN Turtle, which costs $50.To read this article in full or to leave a comment, please click here]]> 2016-09-08T06:12:18+00:00 http://www.networkworld.com/article/3117788/a-usb-device-is-all-it-takes-to-steal-credentials-from-locked-pcs.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=31576 False None None None Network World - Magazine Info IDG Contributor Network: People know they shouldn\'t click on links but do it anyway 10 companies that can help you fight phishing +To read this article in full or to leave a comment, please click here]]> 2016-09-08T06:09:00+00:00 http://www.networkworld.com/article/3117213/security/people-know-they-shouldnt-click-on-links-but-do-it-anyway.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=31577 False None None None Network World - Magazine Info Security Sessions: Why security training matters for all IT staff 2016-09-08T06:00:00+00:00 http://www.networkworld.com/video/68535/security-sessions-why-security-training-matters-for-all-it-staff#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=31589 False None None None Network World - Magazine Info Rugged devops: Build security into software development To read this article in full or to leave a comment, please click here]]> 2016-09-08T05:25:00+00:00 http://www.networkworld.com/article/3118029/application-development/rugged-devops-adding-security-to-software-development.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=31217 True Guideline None None Network World - Magazine Info Top EU court hedges on question of hyperlinking legality in Playboy case To read this article in full or to leave a comment, please click here]]> 2016-09-08T04:14:00+00:00 http://www.networkworld.com/article/3117838/internet/top-eu-court-hedges-on-question-of-hyperlinking-legality-in-playboy-case.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=31220 False None None None Network World - Magazine Info John McAfee\'s company could spoil the party for Intel\'s new venture Intel Security business as a separate cybersecurity company in which Intel shareholders would hold 49 percent of the equity with the balance held by the investment firm. Intel would also receive US$3.1 billion in cash. The new company would be named McAfee.To read this article in full or to leave a comment, please click here]]> 2016-09-07T23:52:56+00:00 http://www.networkworld.com/article/3117829/john-mcafee-s-company-could-spoil-the-party-for-intel-s-new-venture.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=30039 False None None None Network World - Magazine Info Intel spinout: McAfee is back To read this article in full or to leave a comment, please click here]]> 2016-09-07T15:51:00+00:00 http://www.networkworld.com/article/3117764/security/intel-spinout-mcafee-is-back.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=28390 False Guideline None None Network World - Magazine Info Election exploits: What you need to know [infographic] To read this article in full or to leave a comment, please click here]]> 2016-09-07T14:48:00+00:00 http://www.networkworld.com/article/3117643/security/election-exploits-what-you-need-to-know-infographic.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=28202 False None Yahoo None Network World - Magazine Info Why quantum computing has the cybersecurity world white-knuckled report published Monday.To read this article in full or to leave a comment, please click here]]> 2016-09-07T14:21:49+00:00 http://www.networkworld.com/article/3117724/why-quantum-computing-has-the-cybersecurity-world-white-knuckled.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=28089 False None None None Network World - Magazine Info Intel sells off majority stake in McAfee unit scratch their heads.Intel is best known as a chipmaker, but at the time it was also hoping to improve  security around its products. PC security was a major concern back then, said Nathan Brookwood, principal analyst at Insight 64. But now cyberthreats are moving to target the cloud and servers.To read this article in full or to leave a comment, please click here]]> 2016-09-07T14:13:40+00:00 http://www.networkworld.com/article/3117617/intel-sells-off-majority-stake-in-mcafee-unit.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=28090 False None None None Network World - Magazine Info US must beef up its cyber muscle, Trump says repeatedly criticized in the IT community for a lack of a tech policy agenda, called for new investments in cybersecurity during a speech focused on military programs. The businessman didn't put a dollar figure on the new cybersecurity investments but mentioned them as part of a proposed multibillion-dollar expansion of the U.S. military.To read this article in full or to leave a comment, please click here]]> 2016-09-07T11:42:56+00:00 http://www.networkworld.com/article/3117234/us-must-beef-up-its-cyber-muscle-trump-says.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=27549 False None None None Network World - Magazine Info IDG Contributor Network: Building an insider threat program that works – Part I To read this article in full or to leave a comment, please click here]]> 2016-09-07T10:52:00+00:00 http://www.networkworld.com/article/3113487/security/building-an-insider-threat-program-that-works-part-i.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=27105 False Guideline None None Network World - Magazine Info Security firm faces lawsuit with stock tanking tactic ethical firestorm when it publicized allegations that pacemakers and other devices from St. Jude Medical were insecure and open to hacks. Pointing out flaws is nothing new in the security industry. But MedSec took the unusual step of trying to profit from the research by betting against St. Jude Medical. To do so, it partnered with investment firm Muddy Waters Capital to short the stock.To read this article in full or to leave a comment, please click here]]> 2016-09-07T10:49:00+00:00 http://www.networkworld.com/article/3117610/security-firm-faces-lawsuit-with-stock-tanking-tactic.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=27106 False None None None Network World - Magazine Info IDG Contributor Network: HashiCorp slurps up cash to deliver DevOps goodness HashiCorp-an important, but little-known DevOps vendor. The company manages a host of open-source tools, all of which tick of different parts of the application and infrastructure lifecycle. + Also on Network World: The shift to DevOps requires a new approach to security +To read this article in full or to leave a comment, please click here]]> 2016-09-07T09:35:00+00:00 http://www.networkworld.com/article/3116154/application-development/hashicorp-slurps-up-cash-to-deliver-devops-goodness.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=26876 False Guideline None None Network World - Magazine Info VMware NSX gains traction as a security tool purchase software-defined networking (SDN) startup Nicira. The acquisition changed the face of VMware, as it created a big rift between itself and long-time data center partner Cisco. The product, now known as NSX, put VMware squarely in the next-generation network market with one of the top start-ups.+ Also on Network World: NSX, and its new chief, take center stage at VMWorld +To read this article in full or to leave a comment, please click here]]> 2016-09-07T09:24:00+00:00 http://www.networkworld.com/article/3117625/security/vmware-nsx-gains-traction-as-a-security-tool.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=26877 False None None None Network World - Magazine Info \'Stupid simple\' attack can steal credentials from locked Windows and Mac computers mubix, for spending part of his Labor Day weekend figuring out how to use a spoofed USB Ethernet adapter to steal credentials from logged in but locked Windows and Mac computers. It works!!! Muhahahahah I can steal credentials from a locked computer. Muahahahhahahahah pic.twitter.com/9l3d0tvs8i- Rob Fuller (@mubix) September 4, 2016 Fuller did not use a zero-day; although the attack is “stupid simple” and “should not work,” it does work because most computers automatically install Play-and-Play USB devices. “Even if a system is locked out, the device still gets installed.” There may be restrictions on what devices can be installed when the box is a locked state, but he said, “Ethernet/LAN is definitely on the white list.”To read this article in full or to leave a comment, please click here]]> 2016-09-07T07:22:00+00:00 http://www.networkworld.com/article/3117059/security/stupid-simple-attack-can-steal-credentials-from-locked-windows-and-mac-computers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=26494 False None None None Network World - Magazine Info Google Safe Browsing gives more details to compromised website owners To read this article in full or to leave a comment, please click here]]> 2016-09-07T06:18:14+00:00 http://www.networkworld.com/article/3117289/google-safe-browsing-gives-more-details-to-compromised-website-owners.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=26311 False None None None Network World - Magazine Info New tech can help catch spearphishing attacks GreatHorn. "There are no attachments. There's nothing in the email that's misspelled. My signature line was copied from my real emails."The text of the email was totally something that a CEO might say."Hi Caitlin," the message said, addressing the company's controller, Caitlin McLaughlin. "Are you available to process an outgoing payment today? Let me know and I will send the payment details as soon as I receive it from the consultant shortly; I am traveling and this is urgent."To read this article in full or to leave a comment, please click here]]> 2016-09-07T04:26:00+00:00 http://www.networkworld.com/article/3117253/malware-cybercrime/new-tech-can-help-catch-spearphishing-attacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=25802 False None None None Network World - Magazine Info OPM hack was avoidable, says congressional report said Jason Chaffetz, chairman of the committee in an interview to CNN.Saying that he thinks that the attack came from overseas, Chaffetz, a Republican representative from Utah, did not name any country, saying it was classified information. After the hack there was speculation that it had been done by the Chinese.To read this article in full or to leave a comment, please click here]]> 2016-09-06T23:56:10+00:00 http://www.networkworld.com/article/3117348/opm-hack-was-avoidable-says-congressional-report.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=24785 False None None None Network World - Magazine Info Lessons learned from WordPress attacks Analyzing real WordPress hacking attempts +They initially made contact with some IPs located conveniently in Russia, then lots of syn traffic, and interesting session waits and listens. It took about two minutes before the sites cratered from resource drainage, and the errantly injected processes dominated then effectively cratered the servers from their intended use.To read this article in full or to leave a comment, please click here]]> 2016-09-06T12:49:00+00:00 http://www.networkworld.com/article/3117110/security/lessons-learned-from-wordpress-attacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=22192 False None None None Network World - Magazine Info Google\'s 3-level Android patch could cause confusion To read this article in full or to leave a comment, please click here]]> 2016-09-06T10:00:01+00:00 http://www.networkworld.com/article/3116930/googles-3-level-android-patch-could-cause-confusion.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=21511 False Guideline None None Network World - Magazine Info British Airways blamed glitch for long check-in delays teething problems.”At first, BA claimed the glitch causing check-in delays was not a worldwide problem, but a “patchy” problem. Yet, the glitch in the check-in system affected more than people in the UK; travelers took to Twitter to complain about long delays in at least San Diego, Chicago, Atlanta, San Francisco, Rome, Las Vegas, Phoenix, Vancouver, the Bahamas, D.C., Seattle, Zurich, and Mexico City.To read this article in full or to leave a comment, please click here]]> 2016-09-06T09:45:00+00:00 http://www.networkworld.com/article/3116203/security/british-airways-blamed-glitch-for-long-check-in-delays.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=21307 False None None None Network World - Magazine Info US investigates Russia for attempting to hack the election report in the Washington Post. Investigators do not have "definitive" proof of a Russian operation, but there is "significant concern," the Post quoted an anonymous senior intelligence official as saying.To read this article in full or to leave a comment, please click here]]> 2016-09-06T08:02:22+00:00 http://www.networkworld.com/article/3116894/us-investigates-russia-for-attempting-to-hack-the-election.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=21104 False None None None Network World - Magazine Info Stealthy, tricky to remove rootkit targets Linux systems on ARM and x86 To read this article in full or to leave a comment, please click here]]> 2016-09-06T06:47:22+00:00 http://www.networkworld.com/article/3116082/stealthy-tricky-to-remove-rootkit-targets-linux-systems-on-arm-and-x86.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=20761 False None None None Network World - Magazine Info Essential certifications for smart security pros How to rethink security for the new world of IT. | Discover how to secure your systems with InfoWorld's Security newsletter. ] Every certification I've gained took focused, goal-oriented study -- which employers view favorably, as they do with college degrees. More important, I picked up many new skills and insights in IT security while studying for each certification test. I also gained new perspectives on even familiar information I thought I had already mastered. I became a better employee and thinker because of all the certifications I have studied for and obtained. You will too.To read this article in full or to leave a comment, please click here]]> 2016-09-06T03:00:00+00:00 http://www.networkworld.com/article/3116808/security/essential-certifications-for-smart-security-pros.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=20435 False None None None Network World - Magazine Info Obama aims to avoid a \'cycle of escalation\' in cyberattacks by countries To read this article in full or to leave a comment, please click here]]> 2016-09-05T22:08:29+00:00 http://www.networkworld.com/article/3115860/obama-aims-to-avoid-a-cycle-of-escalation-in-cyberattacks-by-countries.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=19458 False None None None Network World - Magazine Info OpenOffice coders debate retiring the project an email to project contributors last week.To read this article in full or to leave a comment, please click here]]> 2016-09-05T09:31:48+00:00 http://www.networkworld.com/article/3116142/openoffice-coders-debate-retiring-the-project.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=17976 False None None None Network World - Magazine Info Vacations of the future Dr. Ray Kurweil, have predicted, “We will spend considerable time in virtual and augmented realities allowing us to visit with each other even if hundreds of miles apart. We'll even be able to touch each other.”To read this article in full or to leave a comment, please click here]]> 2016-09-05T09:01:00+00:00 http://www.networkworld.com/article/3116140/security/vacations-of-the-future.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=17977 False None None None Network World - Magazine Info Sophos false positive detection ruins weekend for some Windows users a support article.To read this article in full or to leave a comment, please click here]]> 2016-09-05T05:15:29+00:00 http://www.networkworld.com/article/3116133/sophos-false-positive-detection-ruins-weekend-for-some-windows-users.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=17486 False None None None Network World - Magazine Info OurMine hacked Variety, power-spammed subscribers said was later removed, but the hacking collective's antics didn't stop there. Variety's subscribers were hammered with spam.To read this article in full or to leave a comment, please click here]]> 2016-09-04T08:32:00+00:00 http://www.networkworld.com/article/3115741/security/ourmine-hacked-variety-power-spammed-subscribers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=15837 False None None None Network World - Magazine Info A mystery user breached an email account on Clinton\'s server newly released files about its investigation of Clinton's use of a private email server when she was the U.S. secretary of state.The affected email account belonged to a member of Bill Clinton's staff. In January 2013, an unknown user managed to log in to the account and browse email folders and attachments.To read this article in full or to leave a comment, please click here]]> 2016-09-02T13:59:29+00:00 http://www.networkworld.com/article/3115708/a-mystery-user-breached-an-email-account-on-clintons-server.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=12236 False None None None Network World - Magazine Info Point-of-sale data breaches have now reached the cloud retailers and hotels have been targeted by hackers, who typically install malware into the point-of-sale systems to steal credit card numbers.To read this article in full or to leave a comment, please click here]]> 2016-09-02T11:42:12+00:00 http://www.networkworld.com/article/3116086/point-of-sale-data-breaches-have-now-reached-the-cloud.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=12002 False None None None Network World - Magazine Info VMworld: My Cybersecurity-Centric Impressions blog, I wrote about what I was anticipating as far as cybersecurity for VMworld.  Now that I'm back from Vegas, it's time for me to report on how reality aligned with my expectations.1.      NSX penetration.  It seems like VMware has made progress in terms of NSX market penetration over the past year.  At VMworld 2015, VMware talked about around 1,000 production environments for NSX while at VMworld 2016, VMware mentioned somewhere between 1,700 to 2,000 production NSX customers.  Still a small percentage of the total VMware installed base but at least 70% growth year-over-year.  Yes, some of these customers are likely just getting started or are using NSX on an extremely limited basis, but I still see good progress happening as more and more organizations begin playing with and using NSX.  VMware describes three primary uses for NSX:  Disaster recovery, security, and network operations automation.  It is worth noting that around 60% to 70% of NSX deployment is skewed toward security use cases. To read this article in full or to leave a comment, please click here]]> 2016-09-02T09:06:00+00:00 http://www.networkworld.com/article/3115851/security/vmworld-my-cybersecurity-centric-impressions.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=11513 False None None None Network World - Magazine Info Suspect arrested in 5-year-old kernel.org breach To read this article in full or to leave a comment, please click here]]> 2016-09-02T08:38:22+00:00 http://www.networkworld.com/article/3116018/suspect-arrested-in-5-year-old-kernelorg-breach.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=11341 False None None None Network World - Magazine Info Apple quashes 3 zero-days with emergency Mac update To read this article in full or to leave a comment, please click here]]> 2016-09-02T06:55:00+00:00 http://www.networkworld.com/article/3116044/macs/apple-quashes-3-zero-days-with-emergency-mac-update.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=11150 False None None None Network World - Magazine Info Your strategy for dealing with web bots has to take into accout business context To read this article in full or to leave a comment, please click here]]> 2016-09-02T06:37:00+00:00 http://www.networkworld.com/article/3115847/security/your-strategy-for-dealing-with-web-bots-has-to-take-into-accout-business-context.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=10837 False None None None Network World - Magazine Info Microsoft bug bounty program adds .NET Core and ASP.NET Core To read this article in full or to leave a comment, please click here]]> 2016-09-02T05:33:26+00:00 http://www.networkworld.com/article/3115768/microsoft-bug-bounty-program-adds-net-core-and-aspnet-core.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=10557 False None None None Network World - Magazine Info Iris scans as ID grow in use technology as well as the Windows 10 Mobile-based HP Elite X3.To read this article in full or to leave a comment, please click here]]> 2016-09-01T12:32:00+00:00 http://www.networkworld.com/article/3115331/security/iris-scans-as-id-grow-in-use.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9879 False None None None Network World - Magazine Info Regular password changes make things worse “time to rethink mandatory password changes.” To read this article in full or to leave a comment, please click here]]> 2016-09-01T12:29:00+00:00 http://www.networkworld.com/article/3115346/security/regular-password-changes-make-things-worse.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9880 False None None None Network World - Magazine Info FairWare ransomware infects servers through exposed Redis instances dubbed the new threat FairWare.To read this article in full or to leave a comment, please click here]]> 2016-09-01T11:08:38+00:00 http://www.networkworld.com/article/3115244/fairware-ransomware-infects-servers-through-exposed-redis-instances.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9881 False None None None Network World - Magazine Info Romanian hacker Guccifer sentenced to 52 months in US prison To read this article in full or to leave a comment, please click here]]> 2016-09-01T10:46:58+00:00 http://www.networkworld.com/article/3114693/romanian-hacker-guccifer-sentenced-to-52-months-in-us-prison.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9882 False Guideline None None Network World - Magazine Info Last.fm breach from 2012 affected 43 million users LeakedSource, a repository for data breaches that obtained a copy of the stolen data. Included in the trove are users' names, email addresses and passwords secured with an aging hashing algorithm called MD5, LeakedSource reported in a blog post on Thursday.Last.fm hasn't responded so far to a request for comment. The music service reported the breach four years ago and asked all its users to change their passwords immediately. It never made clear how many accounts were affected, however, or the hashing method it used to secure the passwords.To read this article in full or to leave a comment, please click here]]> 2016-09-01T10:21:27+00:00 http://www.networkworld.com/article/3114720/lastfm-breach-from-2012-affected-43-million-users.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9894 False None None None Network World - Magazine Info Keezel\'s wireless device protects hotel Wi-Fi , home IoT connections To read this article in full or to leave a comment, please click here]]> 2016-09-01T08:09:44+00:00 http://www.networkworld.com/article/3114802/keezels-wireless-device-protects-hotel-wi-fi-home-iot-connections.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9895 False None None None Network World - Magazine Info Why these victims decided not to pay the ransom Image by Andy ArmstrongWhen ransomware locks down a computer or an entire system at your organization, what do you do? If you get an email from a hacker threatening a DDoS attack that will level your website, how do you respond?To read this article in full or to leave a comment, please click here]]> 2016-09-01T07:34:00+00:00 http://www.networkworld.com/article/3114691/security/why-these-victims-decided-not-to-pay-the-ransom.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9896 False None None None Network World - Magazine Info Toshiba hopes cloudless smartphone backup will have a bright future To read this article in full or to leave a comment, please click here]]> 2016-09-01T07:13:47+00:00 http://www.networkworld.com/article/3115047/toshiba-hopes-cloudless-smartphone-backup-will-have-a-bright-future.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9897 False None None None Network World - Magazine Info Why your smartphone is sicker than a room full of snotty toddlers To read this article in full or to leave a comment, please click here]]> 2016-09-01T05:56:00+00:00 http://www.networkworld.com/article/3113717/security/why-your-smartphone-is-sicker-than-a-room-full-of-snotty-toddlers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9898 False None None None Network World - Magazine Info The Dropbox data breach is a warning to update passwords reaching the Internet.In a notice to users, Spotify said their credentials may have been compromised in a leak involving another service, if they used the same password for both.“Spotify has not experienced a security breach and our user records are secure,” the company said in an email. The password reset is merely a precaution, it said.To read this article in full or to leave a comment, please click here]]> 2016-08-31T14:39:23+00:00 http://www.networkworld.com/article/3114724/the-dropbox-data-breach-is-a-warning-to-update-passwords.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9797 False None None None Network World - Magazine Info 10 under-the-radar software products users love G2 Crowd, an online platform hosting more than 100,000 user reviews, has shared its list of top mid-market software products as rated by users of such tools based on how much they like the software and would recommend it to others. While you might be familiar with some of the products on this list, you won't find much in the way from the highest profile software companies, such as Microsoft and Salesforce.com. “Like the majority of smaller organizations, mid-market companies [51 to 1,000 employees] require software products that are sophisticated but not too pricey, and also easy to use,” says Michael Fauscette, chief research officer at G2 Crowd.To read this article in full or to leave a comment, please click here]]> 2016-08-31T11:27:00+00:00 http://www.networkworld.com/article/3114606/network-management/10-under-the-radar-software-products-users-love.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9773 False None None None Network World - Magazine Info 1,650lb 3D printed aircraft tool sets Guinness World Record The hottest 3D printing projects+To read this article in full or to leave a comment, please click here]]> 2016-08-31T09:16:00+00:00 http://www.networkworld.com/article/3114569/hardware/1-650lb-3d-printed-aircraft-tool-sets-guinness-world-record.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9745 False None None 4.0000000000000000 Network World - Magazine Info Defense Department needs to embrace open source or military will lose tech superiority pdf).To read this article in full or to leave a comment, please click here]]> 2016-08-31T07:44:00+00:00 http://www.networkworld.com/article/3114476/security/defense-department-needs-to-embrace-open-source-or-military-will-lose-tech-superiority.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9720 False None None None