www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-16T02:18:51+00:00 www.secnews.physaphae.fr Network World - Magazine Info Adobe patches critical vulnerability in ColdFusion application server version 10 update 21 or version 11 update 10, depending on which branch they're using. The ColdFusion 2016 release is not affected, Adobe said in a security advisory.To read this article in full or to leave a comment, please click here]]> 2016-08-31T06:53:10+00:00 http://www.networkworld.com/article/3114525/adobe-patches-critical-vulnerability-in-coldfusion-application-server.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9711 False Guideline None None Network World - Magazine Info Review: SentinelOne blocks and dissects threats To read this article in full or to leave a comment, please click here]]> 2016-08-31T04:40:00+00:00 http://www.networkworld.com/article/3114330/security/review-sentinelone-blocks-and-dissects-threats.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9686 False None None None Network World - Magazine Info Lessons from high-profile IT failures Backup and recovery tools: Users identify the good, bad and ugly ] First, a little background. What ended up being a faulty router took down the entire Southwest Airlines operation for a day on July 21 and caused rippling effects for several days after the original outage. (A fact that might surprise you is that Southwest is by a wide margin the largest domestic carrier of passengers in the United States.) The Dallas Morning News reported the fallout.To read this article in full or to leave a comment, please click here]]> 2016-08-31T04:39:00+00:00 http://www.networkworld.com/article/3114222/backup-recovery/lessons-from-high-profile-it-failures.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9687 False None None None Network World - Magazine Info Dropbox changed passwords after 68M accounts were compromised describing it as a preventive measure and not because there was any indication that their accounts were improperly accessed.To read this article in full or to leave a comment, please click here]]> 2016-08-30T23:45:45+00:00 http://www.networkworld.com/article/3114210/dropbox-changed-passwords-after-68m-accounts-were-compromised.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9652 False None None None Network World - Magazine Info Okta\'s API access product targets the trend toward services Okta API Access Management builds on Okta's existing tools for developers who manage application logins. It lets administrators control how users of those apps access business systems that are surfaced through APIs.To read this article in full or to leave a comment, please click here]]> 2016-08-30T15:30:58+00:00 http://www.networkworld.com/article/3114225/oktas-api-access-product-targets-the-trend-toward-services.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9618 False None None None Network World - Magazine Info 5 commonly misunderstood compliance terms To read this article in full or to leave a comment, please click here]]> 2016-08-30T12:50:00+00:00 http://www.networkworld.com/article/3114137/compliance/5-commonly-misunderstood-compliance-terms.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9595 False None None None Network World - Magazine Info BitTorrent client is found distributing Mac-based malware OSX/Keydnap, which can steal passwords, and noticed that it was spreading through Transmission's official site.Somehow, a version of the BitTorrent client containing the malware had been recently made available on the site, ESET said in a blog post on Tuesday.Transmission has already removed the download, according to ESET. But users who downloaded the client between this past Sunday and Monday should check for signs that their Mac has been comprised.To read this article in full or to leave a comment, please click here]]> 2016-08-30T12:16:25+00:00 http://www.networkworld.com/article/3114129/bittorrent-client-is-found-distributing-mac-based-malware.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9586 False None None None Network World - Magazine Info Okta partners with Google to secure cloud identities To read this article in full or to leave a comment, please click here]]> 2016-08-30T11:31:51+00:00 http://www.networkworld.com/article/3113663/okta-partners-with-google-to-secure-cloud-identities.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9582 False None None None Network World - Magazine Info Attackers deploy rogue proxies on computers to hijack HTTPS traffic To read this article in full or to leave a comment, please click here]]> 2016-08-30T08:09:20+00:00 http://www.networkworld.com/article/3113941/attackers-deploy-rogue-proxies-on-computers-to-hijack-https-traffic.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9534 False None None None Network World - Magazine Info Facebook axed human Trending News editors, algorithm immediately goes full-on FAIL @geraldtbh But Twitter was not the only place McChicken was trending; it was also trending on Facebook because it was going viral.To read this article in full or to leave a comment, please click here]]> 2016-08-30T07:48:00+00:00 http://www.networkworld.com/article/3113676/security/facebook-axed-human-trending-news-editors-algorithm-immediately-goes-full-on-fail.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9525 False None None None Network World - Magazine Info New ransomware threat deletes files from Linux web servers first appeared in November and encrypted files, but did so poorly, allowing researchers to create recovery tools.After attackers hack a web server and deploy FairWare, the ransomware deletes the entire web folder and then asks for two bitcoins (around US$1,150) to restore them, Lawrence Abrams, the founder of tech support forum BleepingComputer.com, said in a blog post.To read this article in full or to leave a comment, please click here]]> 2016-08-30T05:48:42+00:00 http://www.networkworld.com/article/3113998/new-ransomware-threat-deletes-files-from-linux-web-servers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9511 False None None None Network World - Magazine Info Privacy groups complain to FTC about WhatsApp policy changes complaint Monday.WhatsApp said last week it will be sharing some account information of users with Facebook and its companies, including the mobile phone numbers they verified when they registered with WhatsApp. The sharing of information will enable users to see better friend suggestions and more relevant ads on Facebook, it added.To read this article in full or to leave a comment, please click here]]> 2016-08-29T22:19:49+00:00 http://www.networkworld.com/article/3113728/privacy-groups-complain-to-ftc-about-whatsapp-policy-changes.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9468 False None None None Network World - Magazine Info Hackers had a chance to hamper voting by deleting records To read this article in full or to leave a comment, please click here]]> 2016-08-29T17:00:09+00:00 http://www.networkworld.com/article/3113746/hackers-had-a-chance-to-hamper-voting-by-deleting-records.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9448 False None None None Network World - Magazine Info 45% off Dictionary Hidden Book Safe With Lock - Deal Alert read reviews). It's typical list price of $32.99 has been reduced 45% to just $17.99.To read this article in full or to leave a comment, please click here]]> 2016-08-29T14:05:00+00:00 http://www.networkworld.com/article/3113111/gadgets/45-off-dictionary-hidden-book-safe-with-lock-deal-alert.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9429 False None None None Network World - Magazine Info Cybersecurity and VMworld To read this article in full or to leave a comment, please click here]]> 2016-08-29T11:56:00+00:00 http://www.networkworld.com/article/3113395/security/cybersecurity-and-vmworld.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9419 False None None None Network World - Magazine Info FBI warns that hackers are targeting state election systems report by Yahoo News on Monday. Voter registration databases from both Illinois and Arizona were targeted in the hacks, according to the report.In the Illinois case, personal data on 200,000 voters was stolen. In July, an official with the state's board of elections warned on Facebook that the voting system had fallen to a cyberattack, forcing a shutdown.To read this article in full or to leave a comment, please click here]]> 2016-08-29T10:36:10+00:00 http://www.networkworld.com/article/3113452/fbi-warns-that-hackers-are-targeting-state-election-systems.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9394 False None Yahoo None Network World - Magazine Info St Jude calls easily hackable pacemaker claims \'false and misleading\' MedSec revealed remotely exploitable flaws in St. Jude pacemakers and defibrillators to financial research firm Muddy Waters, choosing to profit by how far St. Jude stock fell after the report (pdf) was made public instead of taking a “responsible disclosure” path, St. Jude struck back by basically calling Muddy Waters' claims a bunch of lies.To read this article in full or to leave a comment, please click here]]> 2016-08-29T07:19:00+00:00 http://www.networkworld.com/article/3113059/security/st-jude-calls-easily-hackable-pacemaker-claims-false-and-misleading.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9370 False Guideline None None Network World - Magazine Info IDG Contributor Network: Digify for Gmail: Mission Impossible for your email attachments Box, Dropbox and Google started with. And while these vendors have been moving towards higher-level features, it's fair to say that their start was in the ease-of-use court. At the other end, we have the solutions that are enterprise-focused. These solutions tend towards big, heavy, monolithic structures and myriad levels of control. They're all about ticking the boxes for enterprise security departments, and while they're certainly robust, they're not exactly known for user-friendliness. Indeed, the so-called "Dropbox problem" where enterprises see high levels of nonmandated solution use, came about largely because enterprise solutions are often so awful to use.To read this article in full or to leave a comment, please click here]]> 2016-08-29T07:18:00+00:00 http://www.networkworld.com/article/3111348/email/digify-for-gmail-mission-impossible-for-your-email-attachments.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9371 False None None None Network World - Magazine Info How to stop social media from being the gateway for malware NopSec 2016 State of Vulnerability Risk Management Report found that organizations use inadequate risk evaluation scoring systems. The report claimed that social media -- which often isn't included in any risk evaluation system -- is now a top platform for cybersecurity.So, what's the correlation between social media and the rise in malware?To read this article in full or to leave a comment, please click here]]> 2016-08-29T06:39:00+00:00 http://www.networkworld.com/article/3112779/social-networking/social-media-the-gateway-for-malware.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9358 True None None None Network World - Magazine Info Sophisticated malware possibly tied to recent ATM heists in Thailand reported last week.To read this article in full or to leave a comment, please click here]]> 2016-08-29T06:33:14+00:00 http://www.networkworld.com/article/3113148/sophisticated-malware-possibly-tied-to-recent-atm-heists-in-thailand.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9359 False None None None Network World - Magazine Info New products of the week 8.29.16 Our roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.ASG-Mobius 6.0asgKey features: ASG-Mobius 6.0 is a purpose-built content management system with proven scalability supporting platform, device and data independence. New AWS support enables cloud based solutions, on premise or hybrid implementations. More info.To read this article in full or to leave a comment, please click here]]> 2016-08-29T06:00:00+00:00 http://www.networkworld.com/article/3112962/mobile-wireless/new-products-of-the-week-8-29-16.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9361 False None None None Network World - Magazine Info IDG Contributor Network: IT security\'s reality distortion field data breaches (a whopping 4.7 billion data records worldwide being lost or stolen since 2013) and mounting regulatory and customer pressures around data protection, IT decision makers worldwide continue to ignore reality and rely on the same breach prevention strategies when it comes to protecting customer data and information. Today's IT security professional clearly has a “reality distortion field” when it comes to the effectiveness of perimeter security. According to a recent survey of IT decision makers worldwide, one-third of organizations experienced a data breach in the past 12 months. Yet, while 86 percent of organizations have increased perimeter security spending, 69 percent are not confident their data would be secure if perimeter defenses were breached. This is up from 66 percent in 2015 and 59 percent in 2014. Furthermore, 66 percent believe unauthorized users can access their network, and nearly two in five (16 percent) said unauthorized users could access their entire network.To read this article in full or to leave a comment, please click here]]> 2016-08-29T04:30:00+00:00 http://www.networkworld.com/article/3111985/security/it-securitys-reality-distortion-field.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9338 False None None None Network World - Magazine Info IDG Contributor Network: On-screen security alerts don\'t work How to craft a security awareness program that works +To read this article in full or to leave a comment, please click here]]> 2016-08-29T04:00:00+00:00 http://www.networkworld.com/article/3112566/security/on-screen-security-alerts-dont-work.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9339 False None None None Network World - Magazine Info Review: Top tools for preventing data leaks To read this article in full or to leave a comment, please click here]]> 2016-08-29T03:00:00+00:00 http://www.networkworld.com/article/3112671/security/review-top-tools-for-preventing-data-leaks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9328 False None None None Network World - Magazine Info Top tools for preventing data leaks Image by ThinkstockWe tested data loss prevention (DLP) tools from Comodo, Digital Guardian and Forcepoint. These products are designed to stop protected data from being shared in multiple ways, everything from e-mail attachments to printing to even screen captures. Forcepoint Triton was the most mature, easiest to setup and had the most features. Digital Guardian DLP was able to eliminate almost all false positives and would be a good choice for organizations with huge amounts of intellectual property. Comodo DLP offered a lot of flexibility as well as extras like a VPN, firewall, patch and mobile device manager, making it a good choice for organizations getting up to speed with their overall cybersecurity defenses. Read the full review.To read this article in full or to leave a comment, please click here]]> 2016-08-29T03:00:00+00:00 http://www.networkworld.com/article/3112620/security/top-tools-for-preventing-data-leaks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9329 False None None None Network World - Magazine Info Opera warns 1.7 million Opera Sync users of breach, forces password reset Sync service server. Even if a person didn't check their email, they would have known something was up since Opera forced a password reset for Sync users.Opera announced the breach on Friday. The company said it detected and then “quickly blocked” an attack last week, but “some data, including some of our sync users' passwords and account information, such as login names, may have been compromised.”To read this article in full or to leave a comment, please click here]]> 2016-08-28T07:52:00+00:00 http://www.networkworld.com/article/3112341/security/opera-warns-1-7-million-opera-sync-users-of-breach-forces-password-reset.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9218 False None None None Network World - Magazine Info Medical device security ignites an ethics firestorm To read this article in full or to leave a comment, please click here]]> 2016-08-26T16:33:10+00:00 http://www.networkworld.com/article/3113050/medical-device-security-ignites-an-ethics-firestorm.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9059 False None None None Network World - Magazine Info Got big data? Check out these 100 best practices for keeping it secure Big data is best known for its volume, variety, and velocity -- collectively referred to as the "3 Vs" -- and all three of those traits make security an elusive goal. Targeting companies grappling with that challenge, the Cloud Security Alliance on Friday released a new report offering 100 best practices.As its name would suggest, the CSA focuses on promoting the use of security best practices within the cloud computing world; corporate members include VMware, Microsoft, AWS, and Red Hat. In an earlier report, the CSA broke down big data security risks into a set of the top 10 major challenges. Now, for each of those, it presents 10 best practices designed to help enterprises keep their information safe.To read this article in full or to leave a comment, please click here]]> 2016-08-26T11:31:47+00:00 http://www.networkworld.com/article/3112199/got-big-data-this-report-offers-100-best-practices-for-keeping-it-secure.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9014 False None None None Network World - Magazine Info Distil Networks uses device fingerprints to detect malicious web bots here to subscribe.  Who's that coming to your website? Is it friend or foe? Is it a customer wanting to buy your products, or someone or something wanting to steal your web content? Is it a community member that wants to post a relevant comment, or a spammer intent on planting junk links and content in your open comments section? Is it a real person clicking on an ad, or a web bot driving up fraudulent clicks?Web applications are increasingly being subjected to automated threats such as click fraud, comment spam, content scraping, abusive account creation, and more. These and other illicit or unwanted activities are described in detail in the OWASP Automated Threat Handbook for Web Applications.To read this article in full or to leave a comment, please click here]]> 2016-08-26T09:51:00+00:00 http://www.networkworld.com/article/3112956/security/distil-networks-uses-device-fingerprints-to-detect-malicious-web-bots.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8981 False None None None Network World - Magazine Info 5 security practices hackers say make their lives harder Black Hat USA 2016 conference in Las Vegas earlier this month, Thycotic, a specialist in privileged account management (PAM) solutions, surveyed more than 250 attendees who self-identified as hackers (respondents remained anonymous). Eighty-four percent of respondents identified as white hat hackers - security researchers that help organizations uncover and remediate vulnerabilities. And 15 percent identified as black hat hackers, who penetrate networks with criminal intent.To read this article in full or to leave a comment, please click here]]> 2016-08-26T09:25:00+00:00 http://www.networkworld.com/article/3113045/security/5-security-practices-hackers-say-make-their-lives-harder.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8982 False None None None Network World - Magazine Info Mozilla launches free website security scanning service Dubbed Observatory, the tool was initially built for in-house use by Mozilla security engineer April King, who was then encouraged to expand it and make it available to the whole world.She took inspiration from the SSL Server Test from Qualys' SSL Labs, a widely appreciated scanner that rates a website's SSL/TLS configuration and highlights potential weaknesses. Like Qualys' scanner, Observatory uses a scoring system from 0 to 100 -- with the possibility of extra bonus points -- which translates into grades from F to A+.To read this article in full or to leave a comment, please click here]]> 2016-08-26T08:14:40+00:00 http://www.networkworld.com/article/3112331/mozilla-launches-free-website-security-scanning-service.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8971 False None APT 19 None Network World - Magazine Info Real-life examples test whether you are prepared for a cyberattack ISACA's 2015 Global Cybersecurity Status Report.Incident response is still largely a human response. Multiply an outdated response plan by the many human errors that can innocently occur during response and you have a recipe for potentially cataclysmic results in the threat event aftermath.Use the following tabletop exercises based on today's most disconcerting threats to update your response plan for live action.To read this article in full or to leave a comment, please click here]]> 2016-08-26T05:21:00+00:00 http://www.networkworld.com/article/3112755/it-skills-training/real-life-examples-test-whether-you-are-prepared-for-a-cyberattack.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8938 False None None None Network World - Magazine Info Privacy Shield data transfer agreement now shelters 200 companies Companies must register with the International Trade Administration of the U.S. Department of Commerce to be covered. It's a self-certification process, so the ITA is only checking that the forms are filled in correctly, not that companies are necessarily complying with all 13,894 words of the rules. The Privacy Shield rules are needed to ensure that EU citizens' personal information is afforded the same legal protection in the U.S. as required under EU law.To read this article in full or to leave a comment, please click here]]> 2016-08-26T05:18:00+00:00 http://www.networkworld.com/article/3112699/internet/privacy-shield-data-transfer-agreement-now-shelters-200-companies.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8939 False None None None Network World - Magazine Info Dropbox prompts certain users to change their passwords recently stolen from other websites were used to sign in to a small number of of Dropbox accounts. It said it had contacted the users affected to help them protect their accounts.To read this article in full or to leave a comment, please click here]]> 2016-08-25T23:39:36+00:00 http://www.networkworld.com/article/3112870/dropbox-prompts-certain-users-to-change-their-passwords.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8903 False None None None Network World - Magazine Info U.S. convicts Russian hacker in credit card theft scheme arrested in 2014 after U.S. authorities accused him of installing malicious software on point-of-sale systems in U.S. restaurants .From 2009 to 2013, Seleznev used this scheme to steal credit card data from businesses and send it back to his servers in Ukraine and McLean, Virginia. The stolen data was then sold on the black market, with Seleznev promising that buyers could make fraudulent purchases with them.To read this article in full or to leave a comment, please click here]]> 2016-08-25T15:17:46+00:00 http://www.networkworld.com/article/3112864/us-convicts-russian-hacker-in-credit-card-theft-scheme.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8851 False None None None Network World - Magazine Info Apple patches iOS security flaws found in spyware targeting activist research at Toronto-based Citizen Lab and mobile security firm Lookout -- focus on spyware that targeted Ahmed Mansoor, an activist in the United Arab Emirates.Earlier this month, Mansoor received an SMS text message on his iPhone claiming to offer “new secrets” about tortured detainees in his country. However, inside the message was a link that, once clicked, can infect an iPhone with spyware, using three zero-day exploits of iOS, the research found.To read this article in full or to leave a comment, please click here]]> 2016-08-25T12:55:41+00:00 http://www.networkworld.com/article/3112730/apple-patches-ios-security-flaws-found-in-spyware-targeting-activist.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8824 False None None None Network World - Magazine Info Apple patches iOS against potent zero-day spyware attack a blog post by Lookout Security, which, along with Citizen Lab, unearthed the vulnerabilities and Pegasus.To read this article in full or to leave a comment, please click here]]> 2016-08-25T12:33:00+00:00 http://www.networkworld.com/article/3112728/security/apple-patches-ios-against-potent-zero-day-spyware-attack.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8825 False None None None Network World - Magazine Info So your company\'s been hacked: How to handle the aftermath Inspired eLearning Tyler Cohen Wood is cyber security advisor to elearning company Inspired eLearning, and was previously a Defense Intelligence Agency cyber deputy division chief.To read this article in full or to leave a comment, please click here]]> 2016-08-25T08:14:00+00:00 http://www.networkworld.com/article/3112676/security/so-your-company-s-been-hacked-how-to-handle-the-aftermath.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8776 True Guideline None None Network World - Magazine Info Cisco starts patching firewall devices against NSA-linked exploit was released earlier this month together with other exploits by one or more individuals who use the name Shadow Brokers. The files were provided as a sample of a larger Equation group toolset the Shadow Brokers outfit has put up for auction.To read this article in full or to leave a comment, please click here]]> 2016-08-25T06:56:07+00:00 http://www.networkworld.com/article/3112417/cisco-starts-patching-firewall-devices-against-nsa-linked-exploit.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8762 False None None None Network World - Magazine Info IDG Contributor Network: Hack the vote: How attackers could meddle in November\'s elections recent hacks targeting the Democratic National Committee and the Democratic Congressional Campaign Committee.Attack attribution aside (I shared my thoughts on that topic in last month's blog), these data breaches raise the question of whether attackers could actually impact an election's outcome.To read this article in full or to leave a comment, please click here]]> 2016-08-25T06:44:00+00:00 http://www.networkworld.com/article/3112041/security/hack-the-vote-how-attackers-could-meddle-in-november-s-elections.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8754 False Guideline None None Network World - Magazine Info New collision attacks against triple-DES, Blowfish break HTTPS sessions To read this article in full or to leave a comment, please click here]]> 2016-08-25T05:35:00+00:00 http://www.networkworld.com/article/3112669/security/new-collision-attacks-against-triple-des-blowfish-break-https-sessions.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8738 False None None None Network World - Magazine Info Experts challenge Skyhigh\'s patent for cloud-based encryption gateway announced today that it has received a patent for its technology, which moves that encryption gateway into a hosted environment.Enterprises looking to protect sensitive data stored in cloud services can funnel user traffic through on-premises encryption gateways that allow them to keep control of their encryption keys. Moving the encryption process to Skyhigh's servers allows for easier access by remote employees, mobile users, business partners, or customers, said Rajiv Gupta, Skyhigh's CEO. He says the company offers these encryption gateways in various locations, allowing customers to comply with data residency and privacy laws.To read this article in full or to leave a comment, please click here]]> 2016-08-25T05:33:00+00:00 http://www.networkworld.com/article/3112628/cloud-computing/experts-challenge-skyhighs-patent-for-cloud-based-encryption-gateway.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8740 False None None None Network World - Magazine Info Facebook, Google, Twitter lax on terrorists\' misuse of their sites, say UK MPs report released early Thursday in the U.K. by the Home Affairs Committee appointed by the House of Commons.To read this article in full or to leave a comment, please click here]]> 2016-08-24T20:38:13+00:00 http://www.networkworld.com/article/3112307/facebook-google-twitter-lax-on-terrorists-misuse-of-their-sites-say-uk-mps.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8679 False None None None Network World - Magazine Info Passwords stolen from Mail.Ru were old, the company says recently discovered hack were old and invalid, the Russian internet company said Wednesday.“The security of our users wasn't compromised in any way,” a Mail.Ru spokeswoman said in an interview.The hack targeted forums for game projects that the company has acquired over the years. These include subdomains at cfire.mail.ru, parapa.mail.ru and tanks.mail.ru. Hackers stole passwords of users who participated in the forums.However, the company said the stolen passwords were legacy data. None of them were related to current email accounts or other Mail.Ru services.To read this article in full or to leave a comment, please click here]]> 2016-08-24T17:07:14+00:00 http://www.networkworld.com/article/3112344/passwords-stolen-from-mailru-were-old-the-company-says.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8661 False None None None Network World - Magazine Info This Android botnet relies on Twitter for its commands To read this article in full or to leave a comment, please click here]]> 2016-08-24T15:58:41+00:00 http://www.networkworld.com/article/3112171/this-android-botnet-relies-on-twitter-for-its-commands.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8653 False None None None Network World - Magazine Info Security Sessions: The pitfalls of security awareness training 2016-08-24T13:49:00+00:00 http://www.networkworld.com/video/68376/security-sessions-the-pitfalls-of-security-awareness-training#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8634 False None None None Network World - Magazine Info When your government hacks you face an attack ostensibly from their own government, just the largest.Just as the U.S. government has taken Huwaei to task for an accusation of hidden code benefiting the Chinese government, other governments across the planet now know that their Cisco infrastructure can be cracked open-and no, it's not easy, and requires an additional step of having hacked in from some place else.To read this article in full or to leave a comment, please click here]]> 2016-08-24T13:01:00+00:00 http://www.networkworld.com/article/3112065/security/when-your-government-hacks-you.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8621 False None None None Network World - Magazine Info Hackers tap vBulletin vulnerability to break into 27 million more accounts LeakedSource, a repository for data breaches.  About 25 million accounts of those accounts were from cfire.mail.ru, parapa.mail.ru, and tanks.mail.ru, all of them Russian language games. Another 1 million were tied to gaming titles from Funcom, including The Secret World and Age of Conan. The stolen data includes email addresses and hashed passwords that can be easily cracked.To read this article in full or to leave a comment, please click here]]> 2016-08-24T11:17:33+00:00 http://www.networkworld.com/article/3112044/hackers-tap-vbulletin-vulnerability-to-break-into-27-million-more-accounts.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8612 False None None 2.0000000000000000 Network World - Magazine Info Telegram\'s encryption stymies French police but pleases their bosses over 100 million monthly users of its secure messaging app, but it was the action of just one of them -- Normandy church attacker Adel Kermiche -- that prompted French interior minister Bernard Cazeneuve to call on Tuesday for investigators to be allowed to eavesdrop on Telegram users' conversations.To read this article in full or to leave a comment, please click here]]> 2016-08-24T10:38:11+00:00 http://www.networkworld.com/article/3111818/telegrams-end-to-end-encryption-is-frustrating-french-police-but-winning-over-their-bosses.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8600 False None None None Network World - Magazine Info French submarine builder\'s documents leak: A case of hacking for economic espionage? DCNS, a French submarine builder, has allegedly been hacked – potentially for economic espionage reasons – and 22,400 pages of “secret” documents pertaining to its Scorpene-class submarine have been leaked.The Australian published redacted portions of the leaked documents, claiming to have seen thousands of pages outlining highly sensitive details about systems, sensors, specifications, tech manuals, stealth capabilities, antennae models, electromagnetic and infrared data, conditions under which the periscope can be used and more. The leaked documents reportedly detail “the entire secret combat capability of the six Scorpene-class submarines that French shipbuilder DCNS has designed for the Indian Navy.”To read this article in full or to leave a comment, please click here]]> 2016-08-24T09:59:00+00:00 http://www.networkworld.com/article/3112032/security/french-submarine-builders-documents-leak-a-case-of-hacking-for-economic-espionage.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8601 False None None None Network World - Magazine Info Startup IDVector anonymizes like Tor To read this article in full or to leave a comment, please click here]]> 2016-08-24T09:48:00+00:00 http://www.networkworld.com/article/3111930/security/startup-idvector-anonymizes-like-tor.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8585 False None None None Network World - Magazine Info 19% of shoppers would abandon a retailer that\'s been hacked 2016 KPMG Consumer Loss Barometer report surveyed 448 consumers in the U.S. and found that 19% would abandon a retailer entirely over a hack. Another 33% said that fears their personal information would be exposed would keep them from shopping at the breached retailer for more than three months.The study also looked at 100 cybersecurity executives and found that 55% said they haven't spent money on cybersecurity in the past yearand 42% said their company didn't have a leader in charge of information security.To read this article in full or to leave a comment, please click here]]> 2016-08-24T04:34:00+00:00 http://www.networkworld.com/article/3111944/malware-cybercrime/19-shoppers-would-abandon-a-retailer-thats-been-hacked.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8523 False Guideline None None Network World - Magazine Info Who gets to telecommute once Zika\'s bite comes closer? Zika and paid little attention to the headlines about it.“I don't really respond to dramatization and felt that things were possibly being blown out of proportion,” said Stephens. “I'm a statistician at heart and only listen to numbers, so when my quant-minded OB-GYN shared the figures with me, this threat became a lot more real."To read this article in full or to leave a comment, please click here]]> 2016-08-24T04:26:00+00:00 http://www.networkworld.com/article/3111906/disaster-recovery/as-zika-looms-a-question-arises-who-gets-to-telecommute.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8524 True None None None Network World - Magazine Info A deeper look at business impact of a cyberattack To read this article in full or to leave a comment, please click here]]> 2016-08-24T04:22:00+00:00 http://www.networkworld.com/article/3111925/malware-cybercrime/a-deeper-look-at-business-impact-of-a-cyberattack.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8525 False None Deloitte None Network World - Magazine Info NYT says Moscow bureau was targeted by cyberattack newspaper said Tuesday evening. It quoted a spokeswoman for the newspaper as saying that it had not hired outside firms to investigate the attempted breach.Earlier in the day, CNN reported that the FBI and other U.S. security agencies were investigating attacks by hackers, thought to be working for Russian intelligence, that targeted reporters at the New York Times and other U.S. news organizations. CNN quoted unnamed U.S. officials briefed on the matter.To read this article in full or to leave a comment, please click here]]> 2016-08-23T23:27:36+00:00 http://www.networkworld.com/article/3111805/nyt-says-moscow-bureau-was-targeted-by-cyberattack.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8454 False None None 5.0000000000000000 Network World - Magazine Info Ashley Madison misled users with a fake security award massive data breach.On Monday, privacy officials in Canada and Australia found that the Canadian adultery website used deceptive and confusing practices to make customers think the service was secure.Privacy authorities from both countries have been investigating Ashley Madison following last year's hack, which exposed personal data on 36 million users, including names, credit card numbers, and in some cases, their sexual fantasies. To read this article in full or to leave a comment, please click here]]> 2016-08-23T14:42:20+00:00 http://www.networkworld.com/article/3111410/ashley-madison-misled-users-with-a-fake-security-award.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8351 False None None None Network World - Magazine Info Imperva: Application layer DDoS attacks are on the rise. DDoS Threat Landscape Report 2015-2016” released today.Application layer attacks can be measured in responses per second required from the application targeted, and they generally require less volume than network layer attacks to succeed, the report says. That means they require fewer botnet resources, if botnets are the platform from which the attack is launched.To read this article in full or to leave a comment, please click here]]> 2016-08-23T04:36:00+00:00 http://www.networkworld.com/article/3110653/security/imperva-application-layer-ddos-attacks-are-on-the-rise.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8325 False None None None Network World - Magazine Info Republicans subpoena three tech companies over Clinton emails said in the subpoenas. For example, Datto provided an online backup system that eventually began storing Clinton's emails off site.To read this article in full or to leave a comment, please click here]]> 2016-08-22T16:34:25+00:00 http://www.networkworld.com/article/3110568/republicans-subpoena-three-tech-companies-over-clinton-emails.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8294 False None None None Network World - Magazine Info Researchers create 3D faces from online photos to defeat face authentication systems Virtual U: Defeating Face Liveness Detection by Building Virtual Models from Your Public Photos” (pdf), the researchers called “the ability of an adversary to recover an individual's facial characteristics through online photos” an “immediate and very serious threat.” The team devised an attack which can bypass “existing defenses of liveness detection and motion consistency.”To read this article in full or to leave a comment, please click here]]> 2016-08-21T08:33:00+00:00 http://www.networkworld.com/article/3109899/security/researchers-create-3d-faces-from-online-photos-to-defeat-face-authentication-systems.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8249 False None None None Network World - Magazine Info Shared code in Snowden leaks and NSA breach support hackers\' claims hacked a cyberespionage team linked to the U.S. spy agency when they released a group of sample files earlier this week. Similarities between the Shadow Broker files and information in documents leaked by Snowden give credence to the claims by the anonymous hacking group.Fourteen files in the Shadow Brokers leak contain a 16-character string, "ace02468bdf13579," that NSA operatives used to track their use of one malware program, The Intercept reported Friday. That tracking string was described in an NSA manual for implanting malware originally leaked by Snowden, The Intercept reported.To read this article in full or to leave a comment, please click here]]> 2016-08-19T09:24:59+00:00 http://www.networkworld.com/article/3109574/shared-code-in-snowden-leaks-and-nsa-breach-support-hackers-claims.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8197 False None None None Network World - Magazine Info The NSA\'s hoard of cyber weapons makes some experts nervous hacking tools that may have been stolen from the NSA.An anonymous group called the Shadow Brokers has posted the samples online and is auctioning off the rest, claiming they contain cyber weapons that rival the Stuxnet computer worm.Experts say the whole matter points to the danger of the NSA hoarding cyber weapons: they could fall into the wrong hands.To read this article in full or to leave a comment, please click here]]> 2016-08-18T17:30:10+00:00 http://www.networkworld.com/article/3109201/the-nsas-hoard-of-cyber-weapons-makes-some-experts-nervous.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8158 False None None None Network World - Magazine Info Alleged NSA data dump contain hacking tools rarely seen Shadow Brokers posted them online.To read this article in full or to leave a comment, please click here]]> 2016-08-17T17:20:50+00:00 http://www.networkworld.com/article/3109309/alleged-nsa-data-dump-contain-hacking-tools-rarely-seen.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8107 False None None None Network World - Magazine Info Microsoft to end decades-old pick-a-patch practice in Windows 7 post to a company blog. "[But] this resulted in fragmentation where different PCs could have a different set of updates installed leading to multiple potential problems."To read this article in full or to leave a comment, please click here]]> 2016-08-17T05:41:00+00:00 http://www.networkworld.com/article/3108451/computers/microsoft-to-end-decades-old-pick-a-patch-practice-in-windows-7.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8074 False Guideline None None Network World - Magazine Info Cerber ransomware rakes in cash by recruiting unskilled hackers new report.To read this article in full or to leave a comment, please click here]]> 2016-08-16T06:00:02+00:00 http://www.networkworld.com/article/3107963/cerber-ransomware-rakes-in-cash-by-recruiting-unskilled-hackers.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8028 False None None None Network World - Magazine Info Microsoft\'s .Net Framework will get its own Patch Tuesday the Windows Monthly Rollup, which does the same thing for the Windows OS.Both rollups were unveiled on Monday and will be available on Patch Tuesday each month, according to Microsoft.[ Solve your Win10 installation headaches with our Windows 10 Installation Superguide. Download it today! | Stay up on key Microsoft technologies with the Windows newsletter. ] "The .Net Framework Monthly Rollup is a single install that updates each supported .Net Framework version on a machine to its latest respective update level," said Microsoft's Stacey Haffner. "Each monthly rollup supersedes the last one, so you if you've missed the last few months of updates, you only need to install the latest rollup to update to the latest update level." The rollup installs only security and reliability updates, not a new version of .Net Framework.To read this article in full or to leave a comment, please click here]]> 2016-08-16T05:50:00+00:00 http://www.networkworld.com/article/3107975/windows/microsofts-net-framework-will-get-its-own-patch-tuesday.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8029 False None None None Network World - Magazine Info How 3 fintech startups are shaking up security To read this article in full or to leave a comment, please click here]]> 2016-08-16T05:49:00+00:00 http://www.networkworld.com/article/3107974/security/how-3-fintech-startups-are-shaking-up-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8030 False None None None Network World - Magazine Info RiskSense lands $7M for assessment service Tim Greene RiskSense CEO Srinivas MukkamalaTo read this article in full or to leave a comment, please click here]]> 2016-08-16T05:28:00+00:00 http://www.networkworld.com/article/3108169/security/risksense-lands-7m-for-assessment-service.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8031 False None None None Network World - Magazine Info Much ado about the ransomware scourge ransomware on Sept. 7.“With alarming frequency, ransomware hackers are sneaking into consumer and business computers, encrypting files containing photos, documents and other important data, and then demanding a ransom in exchange for the key needed to decrypt the files. Consumers, businesses, and government agencies are falling prey to these schemes, including hospitals whose servers may contain sensitive patient data. New forms of ransomware encrypt files of website operators, threatening not only their files containing stored data, but the very files needed to operate their websites. Other variants of ransomware are now targeting files on mobile devices,” the FTC wrote.To read this article in full or to leave a comment, please click here]]> 2016-08-15T11:02:00+00:00 http://www.networkworld.com/article/3107120/security/much-ado-about-the-ransomware-scourge.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=8003 False None None None Network World - Magazine Info HEI Hotels reports point-of-sale terminals breach To read this article in full or to leave a comment, please click here]]> 2016-08-14T20:07:55+00:00 http://www.networkworld.com/article/3107277/hei-hotels-reports-point-of-sale-terminals-breach.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=7977 False None None None Network World - Magazine Info Guccifer 2.0 takes credit for hacking another Democratic committee blog, and is promising journalists "exclusive materials" if they contact him directly.Although Guccifer 2.0 claims to be a lone hacktivist, some security experts believe he's actually a persona created by Russian government hackers who want to influence the U.S. presidential election.To read this article in full or to leave a comment, please click here]]> 2016-08-12T19:28:35+00:00 http://www.networkworld.com/article/3106920/guccifer-20-takes-credit-for-hacking-another-democratic-committee.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=7967 False None None None Network World - Magazine Info IDG Contributor Network: Cybersecurity skills crisis creating vulnerabilities Closing the cybersecurity talent gap, one woman at a time +To read this article in full or to leave a comment, please click here]]> 2016-08-12T05:43:00+00:00 http://www.networkworld.com/article/3106853/security/cybersecurity-skills-crisis-creating-vulnerabilities.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=7857 False None None None Network World - Magazine Info Pakistan cybercrime law scares by its vagueness copy of the bill on the website of the Digital Rights Foundation.To read this article in full or to leave a comment, please click here]]> 2016-08-12T04:42:48+00:00 http://www.networkworld.com/article/3106823/pakistan-cybercrime-law-scares-by-its-vagueness.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=7858 False None None None Network World - Magazine Info Millions of Volkswagens can be broken into with a wireless hack new paper.  That alone isn't enough to break into a car -- the master key has to be combined with a unique code generated by each remote key device. But the researchers also devised a way to do that, assembling a piece of radio hardware costing around $40.To read this article in full or to leave a comment, please click here]]> 2016-08-11T16:45:09+00:00 http://www.networkworld.com/article/3106855/millions-of-volkswagens-can-be-broken-into-with-a-wireless-hack.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=7859 False None None None Network World - Magazine Info \'Golden keys\' that unlock Windows\' Secure Boot protection discovered @never_released and @TheWack0lian on Twitter recently announced in a blog post that malicious actors can bypass Windows' Secure Boot feature on vulnerable machines, as first reported by ZDNet.To read this article in full or to leave a comment, please click here]]> 2016-08-11T10:26:00+00:00 http://www.networkworld.com/article/3106300/windows/golden-keys-that-unlock-windows-secure-boot-protection-uncovered.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=7860 False None None None Network World - Magazine Info Four free tools for handling Amazon Web Services security incident response Black Hat: 9 free security tools for defense & attacking+To read this article in full or to leave a comment, please click here]]> 2016-08-11T10:22:00+00:00 http://www.networkworld.com/article/3106729/security/four-free-tools-for-handling-amazon-web-services-security-incident-response.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=7864 False None None None Network World - Magazine Info Twitter is not liable for ISIS activity on its service, judge rules against Twitter, Google and Facebook for allegedly providing material support to terrorists by providing them a forum for propaganda, fund raising and recruitment.To read this article in full or to leave a comment, please click here]]> 2016-08-11T05:27:00+00:00 http://www.networkworld.com/article/3106748/internet/twitter-is-not-liable-for-isis-activity-on-its-service-judge-rules.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=7865 False None None None Network World - Magazine Info 6 shocking gaps in your data security strategy Image by Steve TraynorDespite billions of dollars invested in cybersecurity, businesses lose critical data daily. We've secured our organizations like fortresses, building layers of walls around networks, applications, storage containers, identity, and devices. But when an unhappy employee moves high-value designs onto a USB drive or sends important email attachment outside the “secure” network, those walls crumble the moment we need them the most.To read this article in full or to leave a comment, please click here]]> 2016-08-11T05:18:00+00:00 http://www.networkworld.com/article/3106745/security/6-shocking-gaps-in-your-data-security-strategy.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=7866 False None None None Network World - Magazine Info Samsung both denies and admits mobile payment vulnerability responded with a statement calling the report "simply not true." "Samsung Pay is safe, secure and consumers can be assured that there is no known risk associated to using our payment service," the company said. But then, in a separate, more detailed document, Samsung admitted that it is possible to capture a token, but said that it was extremely difficult to do so.To read this article in full or to leave a comment, please click here]]> 2016-08-11T05:16:00+00:00 http://www.networkworld.com/article/3106764/mobile-security/samsung-both-denies-and-admits-mobile-payment-vulnerability.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=7867 False None None None Network World - Magazine Info Developers need secure coding environments 2016-08-11T03:00:00+00:00 http://www.networkworld.com/video/68016/developers-need-secure-coding-environments#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=7868 False None None None Network World - Magazine Info In terms of spam, Donald Trump is beating Hillary Clinton hands down analysis from Proofpoint.The security firm scanned the subject line of emails received by its customers in June and July looking for occurrences of "trump" or "clinton," and found that the Republican nominee appeared in 169 times as many emails as his Democratic opponent.To read this article in full or to leave a comment, please click here]]> 2016-08-10T16:15:28+00:00 http://www.networkworld.com/article/3106248/in-terms-of-spam-donald-trump-is-beating-hillary-clinton-hands-down.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=7869 False None None None Network World - Magazine Info Install Windows 10 with privacy settings 2016-08-09T00:00:00+00:00 http://www.networkworld.com/video/68155/install-windows-10-with-privacy-settings#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=7870 False None None None Network World - Magazine Info How to prevent potential HTTPS URL hijacking To read this article in full or to leave a comment, please click here]]> 2016-08-04T10:56:00+00:00 http://www.networkworld.com/article/3104629/security/how-to-prevent-potential-https-url-hijacking.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=7871 False None None None Network World - Magazine Info How to prepare for a data breach   here to subscribe.  Michael Bruemmer's team is busy these days, and that's both good news and bad news for companies like yours. Bruemmer heads up the Data Breach Resolution group at Experian. This team provides the call center, notification and identity theft protection services to clients following a data breach.Over a span of 12 years, this arm of Experian has serviced nearly 17,000 breaches. In 2015, the group serviced 3,550 different incidents, from small breaches that affected just a few hundred people, to the headline-making breaches that affected tens of millions. The fact that Experian has been involved in responding to so many breaches is the bad news I alluded to.To read this article in full or to leave a comment, please click here]]> 2016-07-14T10:02:00+00:00 http://www.networkworld.com/article/3095715/security/how-to-prepare-for-a-data-breach.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9902 False None None None Network World - Magazine Info Review: Promisec goes the extra step to secure PCs To read this article in full or to leave a comment, please click here]]> 2016-07-13T05:21:00+00:00 http://www.networkworld.com/article/3094853/security/review-promisec-goes-the-extra-step-to-secure-pcs.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9886 False None None None Network World - Magazine Info How to secure your router and home network To read this article in full or to leave a comment, please click here]]> 2016-07-08T11:03:12+00:00 http://www.networkworld.com/article/3093358/how-to-secure-your-router-and-home-network.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9903 False None None None Network World - Magazine Info 4 tools for managing firewall rules Misconfigurations, unused rules and conflicting rules can cause firewalls to fail in their crucial missions. Firewall security management products can help security managers monitor compliance, orchestrate device policies, optimize rules and manage firewall changes. According to the IT Central Station user community, the most important criteria to consider when choosing firewall security management software are visibility for network devices, scalability, and ensured security and compliance.To read this article in full or to leave a comment, please click here]]> 2016-07-07T10:03:00+00:00 http://www.networkworld.com/article/3092410/network-security/4-tools-for-managing-firewall-rules.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9887 False None None None Network World - Magazine Info How to remove your Windows 10 password 2016-07-07T09:17:00+00:00 http://www.networkworld.com/video/67135/how-to-remove-your-windows-10-password#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9904 False None None None Network World - Magazine Info 8 ingredients of an effective disaster recovery plan Atlantis Computing.“Electrical fires, broken water pipes, failed air conditioning units [and rogue monkeys] can cause just as much damage,” he says. And while “business executives might think they're safe based on their geographic location,” it's important to remember that “day-to-day threats can destroy data [and] ruin a business,” too, he says. That's why it is critical for all businesses to have a disaster recovery (DR) plan.To read this article in full or to leave a comment, please click here]]> 2016-07-05T07:26:00+00:00 http://www.networkworld.com/article/3091768/disaster-recovery/8-ingredients-of-an-effective-disaster-recovery-plan.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9905 False None None None Network World - Magazine Info 10 cutting-edge tools that take endpoint security to a new level we wrote last fall in our review of Carbon Black and Cylance, there are two basic approaches: hunting (looking for some odd behavior) and sifting and gathering particular trends or activities (which has its roots in traditional anti-virus).To read this article in full or to leave a comment, please click here]]> 2016-07-05T03:00:00+00:00 http://www.networkworld.com/article/3089361/endpoint-protection/10-cutting-edge-tools-that-take-endpoint-security-to-a-new-level.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9891 False None None None Network World - Magazine Info 7 trends in advanced endpoint protection To read this article in full or to leave a comment, please click here]]> 2016-07-05T03:00:00+00:00 http://www.networkworld.com/article/3089858/endpoint-protection/7-trends-in-advanced-endpoint-protection.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9890 False None None None Network World - Magazine Info 10 advanced endpoint protection tools The days of simple endpoint protection based on traditional anti-malware tools are over. There are now advanced endpoint detection and response (EDR) tools that go beyond proactive monitoring and endpoint protection. They evaluate threats in a larger ecosystem, combining the best aspects from network intrusion detection and examining the individual process level on each computer. That is a tall order, and the 10 products tested are all very capable. However, no one product does everything. You will have to make compromises, depending on what other security tools you already have installed and the skill levels of your staff. Here are capsule reviews of 10 advanced endpoint protection products (see the full review):To read this article in full or to leave a comment, please click here]]> 2016-07-05T03:00:00+00:00 http://www.networkworld.com/article/3090093/endpoint-protection/top-10-advanced-endpoint-protection-tools.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9888 False None None None Network World - Magazine Info How to buy endpoint security products testing of 10 endpoint security products, we found that no one product does everything. You will have to make compromises, depending on what other security tools you already have installed and the skill levels of your staff. While there is no single product that can suit all situations, endpoint configurations and IT requirements, there are a few key things to consider in your purchase:1. Going agent or agentless. A few of the products we tested don't require endpoint agents, but the trade off is that you will need to setup LDAP or clean up your Active Directory domain and make use of network switch SNMP management and other connections to your network fabric.To read this article in full or to leave a comment, please click here]]> 2016-07-05T03:00:00+00:00 http://www.networkworld.com/article/3089964/endpoint-protection/how-to-buy-endpoint-security-products.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9889 False None None None Network World - Magazine Info A look inside the Microsoft Local Administrator Password Solution To read this article in full or to leave a comment, please click here]]> 2016-06-23T03:36:00+00:00 http://www.networkworld.com/article/3087592/security/a-look-inside-the-microsoft-local-administrator-password-solution.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9906 False None None None Network World - Magazine Info Five signs an attacker is already in your network To read this article in full or to leave a comment, please click here]]> 2016-06-16T14:15:00+00:00 http://www.networkworld.com/article/3085141/network-security/five-signs-an-attacker-is-already-in-your-network.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9907 False None None None Network World - Magazine Info How to embrace the benefits of shadow IT 4 ways to apply SLAs to shadow IT ]To read this article in full or to leave a comment, please click here]]> 2016-06-02T13:04:00+00:00 http://www.networkworld.com/article/3078518/leadership-management/how-to-embrace-the-benefits-of-shadow-it.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9908 False Guideline None 2.0000000000000000 Network World - Magazine Info How millennial tech grads should tailor their resumes 2016 IT Industry Outlook report, which surveyed 673 IT industry companies in the U.S., Canada and the U.K., and found that millennials have certain skills businesses are clamoring for in the coming year.“Recent grads have grown up in an age of evolving technologies, particularly the Internet Age. They've not only developed a unique way of problem solving and critical thinking, but they are also acutely aware of new technologies that may increase operational efficiency in a business,” says Gene Richardson, COO of Experts Exchanges.To read this article in full or to leave a comment, please click here]]> 2016-06-02T13:01:00+00:00 http://www.networkworld.com/article/3078563/careers/how-millennial-tech-grads-should-tailor-their-resumes.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9909 False None None 3.0000000000000000 Network World - Magazine Info IDG Contributor Network: How to use Anycast to provide high availability to a RADIUS server To read this article in full or to leave a comment, please click here]]> 2016-05-25T09:58:00+00:00 http://www.networkworld.com/article/3074954/security/how-to-use-anycast-to-provide-high-availability-to-a-radius-server.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=9910 False None None 4.0000000000000000